Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
new policy.scr.exe

Overview

General Information

Sample name:new policy.scr.exe
Analysis ID:1502158
MD5:01e7e40055d24780359493decf90ac21
SHA1:b59b66a3af3a9920b7de22975997a1ec1e4d5528
SHA256:3a5134cc11c7c47b7268e7bf6bf1556c5ff5044af54b7931cae652bfd8d83717
Tags:exeNanoCoreRAT
Infos:

Detection

Nanocore, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected Nanocore Rat
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: NanoCore
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected Nanocore RAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates autostart registry keys with suspicious names
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Potentially Suspicious Malware Callback Communication
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • new policy.scr.exe (PID: 7496 cmdline: "C:\Users\user\Desktop\new policy.scr.exe" MD5: 01E7E40055D24780359493DECF90AC21)
    • new policy.scr.exe (PID: 7784 cmdline: "C:\Users\user\Desktop\new policy.scr.exe" MD5: 01E7E40055D24780359493DECF90AC21)
      • WerFault.exe (PID: 7516 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7784 -s 1336 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • Networks!.exe (PID: 8108 cmdline: "C:\Users\user\AppData\Roaming\Networks!.exe" MD5: 01E7E40055D24780359493DECF90AC21)
    • Networks!.exe (PID: 5868 cmdline: "C:\Users\user\AppData\Roaming\Networks!.exe" MD5: 01E7E40055D24780359493DECF90AC21)
  • Networks!.exe (PID: 7180 cmdline: "C:\Users\user\AppData\Roaming\Networks!.exe" MD5: 01E7E40055D24780359493DECF90AC21)
    • Networks!.exe (PID: 3720 cmdline: "C:\Users\user\AppData\Roaming\Networks!.exe" MD5: 01E7E40055D24780359493DECF90AC21)
  • cleanup
{"C2 url": ["airlineagancy.casacam.net"], "Port": "7076", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
{"Version": "1.2.2.0", "Mutex": "7065c9a5-e7ef-4b4a-9ad2-3b36dc82", "Group": "JksonN", "Domain1": "jacksonnnn233.theworkpc.com", "Domain2": "", "Port": 65535, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6ca8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6d45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6e5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x6b1a:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
    • 0x16e3:$a1: NanoCore.ClientPluginHost
    • 0x175f:$a2: NanoCore.ClientPlugin
    • 0x16fd:$b9: IClientLoggingHost
    00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmpNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
    • 0x16e3:$x1: NanoCore.ClientPluginHost
    • 0x171c:$x2: IClientNetworkHost
    00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
    • 0x175f:$x2: NanoCore.ClientPlugin
    • 0x16e3:$x3: NanoCore.ClientPluginHost
    • 0x1775:$i3: IClientNetwork
    • 0x16fd:$i6: IClientLoggingHost
    • 0x171c:$i7: IClientNetworkHost
    • 0x1491:$s1: ClientPlugin
    • 0x1768:$s1: ClientPlugin
    00000007.00000002.2303284343.000000000297D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
      • 0x59eb:$a1: NanoCore.ClientPluginHost
      • 0x5ad5:$a2: NanoCore.ClientPlugin
      • 0x732e:$b7: LogClientException
      • 0x6941:$b8: PipeExists
      • 0x5a05:$b9: IClientLoggingHost
      Click to see the 115 entries
      SourceRuleDescriptionAuthorStrings
      6.2.Networks!.exe.4a592f0.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        3.2.new policy.scr.exe.59e4629.11.raw.unpackJoeSecurity_NanocoreYara detected Nanocore RATJoe Security
          3.2.new policy.scr.exe.59e4629.11.raw.unpackWindows_Trojan_Nanocore_d8c4e3c5unknownunknown
          • 0xb184:$a1: NanoCore.ClientPluginHost
          • 0xb14f:$a2: NanoCore.ClientPlugin
          • 0x100ca:$b1: get_BuilderSettings
          • 0x10039:$b7: LogClientException
          • 0xb19e:$b9: IClientLoggingHost
          3.2.new policy.scr.exe.59e4629.11.raw.unpackNanocore_RAT_Gen_2Detetcs the Nanocore RATFlorian Roth
          • 0xb184:$x1: NanoCore.ClientPluginHost
          • 0xb1b1:$x2: IClientNetworkHost
          3.2.new policy.scr.exe.59e4629.11.raw.unpackMALWARE_Win_NanoCoreDetects NanoCoreditekSHen
          • 0xb14f:$x2: NanoCore.ClientPlugin
          • 0xb184:$x3: NanoCore.ClientPluginHost
          • 0xb143:$i2: IClientData
          • 0xb165:$i3: IClientNetwork
          • 0xb174:$i5: IClientDataHost
          • 0xb19e:$i6: IClientLoggingHost
          • 0xb1b1:$i7: IClientNetworkHost
          • 0xb1c4:$i8: IClientUIHost
          • 0xb1d2:$i9: IClientNameObjectCollection
          • 0xb1ee:$i10: IClientReadOnlyNameObjectCollection
          • 0xaf41:$s1: ClientPlugin
          • 0xb158:$s1: ClientPlugin
          • 0x10179:$s6: get_ClientSettings
          Click to see the 202 entries

          AV Detection

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\new policy.scr.exe, ProcessId: 7784, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

          E-Banking Fraud

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\new policy.scr.exe, ProcessId: 7784, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

          System Summary

          barindex
          Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 78.159.112.29, DestinationIsIpv6: false, DestinationPort: 65535, EventID: 3, Image: C:\Users\user\Desktop\new policy.scr.exe, Initiated: true, ProcessId: 7784, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49732
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Networks!.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\new policy.scr.exe, ProcessId: 7496, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Networks!

          Stealing of Sensitive Information

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\new policy.scr.exe, ProcessId: 7784, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat

          Remote Access Functionality

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\new policy.scr.exe, ProcessId: 7784, TargetFilename: C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
          Timestamp:2024-08-31T09:52:51.945139+0200
          SID:2046914
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:51.945139+0200
          SID:2816718
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-08-31T09:52:51.945139+0200
          SID:2822326
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:52.225710+0200
          SID:2025019
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:10.373760+0200
          SID:2025019
          Severity:1
          Source Port:53341
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:47.258163+0200
          SID:2025019
          Severity:1
          Source Port:53349
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:04.358576+0200
          SID:2025019
          Severity:1
          Source Port:53340
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:26.186842+0200
          SID:2046914
          Severity:1
          Source Port:49736
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:26.186842+0200
          SID:2822326
          Severity:1
          Source Port:49736
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:33.570041+0200
          SID:2046914
          Severity:1
          Source Port:49738
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:33.570041+0200
          SID:2822326
          Severity:1
          Source Port:49738
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:32.391052+0200
          SID:2025019
          Severity:1
          Source Port:49738
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:10.085937+0200
          SID:2046914
          Severity:1
          Source Port:53341
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:10.085937+0200
          SID:2822326
          Severity:1
          Source Port:53341
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:32.583546+0200
          SID:2046914
          Severity:1
          Source Port:49738
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:32.583546+0200
          SID:2822326
          Severity:1
          Source Port:49738
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:45.898179+0200
          SID:2046914
          Severity:1
          Source Port:53337
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:45.898179+0200
          SID:2822326
          Severity:1
          Source Port:53337
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:37.309593+0200
          SID:2025019
          Severity:1
          Source Port:53347
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:51.647127+0200
          SID:2025019
          Severity:1
          Source Port:53350
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:39.007469+0200
          SID:2025019
          Severity:1
          Source Port:49739
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:40.488029+0200
          SID:2025019
          Severity:1
          Source Port:49739
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:56.975054+0200
          SID:2025019
          Severity:1
          Source Port:53339
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:15.115651+0200
          SID:2025019
          Severity:1
          Source Port:53343
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:09.084125+0200
          SID:2025019
          Severity:1
          Source Port:53341
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:40.248701+0200
          SID:2855924
          Severity:1
          Source Port:49737
          Destination Port:7076
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:58.248252+0200
          SID:2025019
          Severity:1
          Source Port:53339
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:54:31.726853+0200
          SID:2853193
          Severity:1
          Source Port:49737
          Destination Port:7076
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:21.268246+0200
          SID:2025019
          Severity:1
          Source Port:53344
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:18.308341+0200
          SID:2025019
          Severity:1
          Source Port:49732
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:09.089003+0200
          SID:2046914
          Severity:1
          Source Port:53341
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:09.089003+0200
          SID:2822326
          Severity:1
          Source Port:53341
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:33.707425+0200
          SID:2025019
          Severity:1
          Source Port:49738
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:45.043283+0200
          SID:2025019
          Severity:1
          Source Port:53337
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:42.181451+0200
          SID:2025019
          Severity:1
          Source Port:53348
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:22.732899+0200
          SID:2025019
          Severity:1
          Source Port:53344
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:57.992081+0200
          SID:2046914
          Severity:1
          Source Port:53339
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:57.992081+0200
          SID:2822326
          Severity:1
          Source Port:53339
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:27.296509+0200
          SID:2025019
          Severity:1
          Source Port:53345
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:50.934010+0200
          SID:2046914
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:50.934010+0200
          SID:2822326
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:16.431919+0200
          SID:2025019
          Severity:1
          Source Port:53343
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:50.927566+0200
          SID:2025019
          Severity:1
          Source Port:53338
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:03.039239+0200
          SID:2025019
          Severity:1
          Source Port:53340
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:22.567721+0200
          SID:2046909
          Severity:1
          Source Port:65535
          Destination Port:53344
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-08-31T09:52:25.215778+0200
          SID:2025019
          Severity:1
          Source Port:49736
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:42.226462+0200
          SID:2046914
          Severity:1
          Source Port:53348
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:42.226462+0200
          SID:2822326
          Severity:1
          Source Port:53348
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:27.203037+0200
          SID:2046914
          Severity:1
          Source Port:49736
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:27.203037+0200
          SID:2822326
          Severity:1
          Source Port:49736
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:04.054663+0200
          SID:2046914
          Severity:1
          Source Port:53340
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:04.054663+0200
          SID:2822326
          Severity:1
          Source Port:53340
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:20.056405+0200
          SID:2046914
          Severity:1
          Source Port:49732
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:20.056405+0200
          SID:2822326
          Severity:1
          Source Port:49732
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:26.924955+0200
          SID:2025019
          Severity:1
          Source Port:49736
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:46.335004+0200
          SID:2025019
          Severity:1
          Source Port:53337
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:16.085785+0200
          SID:2046914
          Severity:1
          Source Port:53343
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:16.085785+0200
          SID:2822326
          Severity:1
          Source Port:53343
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:56.991962+0200
          SID:2046914
          Severity:1
          Source Port:53339
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:56.991962+0200
          SID:2822326
          Severity:1
          Source Port:53339
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:32.160686+0200
          SID:2025019
          Severity:1
          Source Port:53346
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:19.054786+0200
          SID:2046914
          Severity:1
          Source Port:49732
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:19.054786+0200
          SID:2822326
          Severity:1
          Source Port:49732
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:39.835725+0200
          SID:2046914
          Severity:1
          Source Port:49739
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:52:39.835725+0200
          SID:2822326
          Severity:1
          Source Port:49739
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:22.088477+0200
          SID:2046914
          Severity:1
          Source Port:53344
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-31T09:53:22.088477+0200
          SID:2822326
          Severity:1
          Source Port:53344
          Destination Port:65535
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: new policy.scr.exeAvira: detected
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
          Source: C:\Users\user\AppData\Roaming\Networks!.exeAvira: detection malicious, Label: HEUR/AGEN.1323683
          Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: NanoCore {"Version": "1.2.2.0", "Mutex": "7065c9a5-e7ef-4b4a-9ad2-3b36dc82", "Group": "JksonN", "Domain1": "jacksonnnn233.theworkpc.com", "Domain2": "", "Port": 65535, "KeyboardLogging": "Enable", "RunOnStartup": "Disable", "RequestElevation": "Disable", "BypassUAC": "Disable", "ClearZoneIdentifier": "Enable", "ClearAccessControl": "Disable", "SetCriticalProcess": "Disable", "PreventSystemSleep": "Enable", "ActivateAwayMode": "Disable", "EnableDebugMode": "Disable", "RunDelay": 0, "ConnectDelay": 4000, "RestartDelay": 5000, "TimeoutInterval": 5000, "KeepAliveTimeout": 30000, "MutexTimeout": 5000, "LanTimeout": 2500, "WanTimeout": 8000, "BufferSize": "ffff0000", "MaxPacketSize": "0000a000", "GCThreshold": "0000a000", "UseCustomDNS": "Enable", "PrimaryDNSServer": "8.8.8.8", "BackupDNSServer": "8.8.4.4"}
          Source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["airlineagancy.casacam.net"], "Port": "7076", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
          Source: C:\Users\user\AppData\Roaming\Networks!.exeReversingLabs: Detection: 55%
          Source: C:\Users\user\AppData\Roaming\Networks!.exeVirustotal: Detection: 56%Perma Link
          Source: new policy.scr.exeReversingLabs: Detection: 55%
          Source: new policy.scr.exeVirustotal: Detection: 56%Perma Link
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\Networks!.exeJoe Sandbox ML: detected
          Source: new policy.scr.exeJoe Sandbox ML: detected
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpackString decryptor: airlineagancy.casacam.net
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpackString decryptor: 7076
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpackString decryptor: <123456789>
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpackString decryptor: <Xwormmm>
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpackString decryptor: XWorm V5.6
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpackString decryptor: USB.exe
          Source: new policy.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: new policy.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E6B000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.0000000003F81000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1883175138.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Networks!.exe, 00000006.00000002.2239294193.0000000005FB3000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E6B000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.0000000003F81000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1883175138.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Networks!.exe, 00000006.00000002.2239294193.0000000005FB3000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: protobuf-net.pdbSHA256}Lq source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: protobuf-net.pdb source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: new policy.scr.exe, 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\ARM\Desktop\ncsource\Plugins\CorePlugin\CoreClientPlugin\obj\Release\CoreClientPlugin.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05C0D780
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then jmp 05D56B5Ch0_2_05D56AD8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then jmp 05D5D260h0_2_05D5D1A0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then jmp 05D5D260h0_2_05D5D1A8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then jmp 05D56B5Ch0_2_05D56AC8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]3_2_077510B3
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]3_2_07756D10
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 4x nop then lea esp, dword ptr [ebp-08h]3_2_07756D00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 02B52E8Ah6_2_02B530BD
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h6_2_02B51A00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h6_2_02B51A08
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h6_2_02B519B9
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 02B52E8Ah6_2_02B52FD9
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 02B52E8Ah6_2_02B52DB0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 02B52E8Ah6_2_02B52DC0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h6_2_05C4D780
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 05D96B5Ch6_2_05D96AD8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 05D9D260h6_2_05D9D1A8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 05D9D260h6_2_05D9D1A0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 05D96B5Ch6_2_05D96AC8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 00F12E8Ah7_2_00F130BD
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 00F12E8Ah7_2_00F13138
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h7_2_00F119B9
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h7_2_00F11A00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h7_2_00F11A08
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 00F12E8Ah7_2_00F12DC0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 00F12E8Ah7_2_00F12DB0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 00F12E8Ah7_2_00F12FD9
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h7_2_057FD780
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 05946B5Ch7_2_05946AD8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 0594D260h7_2_0594D1A0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 0594D260h7_2_0594D1A8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 4x nop then jmp 05946B5Ch7_2_05946AC8

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:49732 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:49738 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:49736 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:49739 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53337 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49737 -> 78.159.112.29:7076
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:49739 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:49739 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:49736 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53337 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:49736 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53337 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53344 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53339 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53339 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53344 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53344 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53341 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046909 - Severity 1 - ET MALWARE NanoCore RAT Keepalive Response 1 : 78.159.112.29:65535 -> 192.168.2.4:53344
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53348 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53339 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:49738 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:49738 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53345 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53341 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53347 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53349 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53340 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53341 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53348 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53348 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53340 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53340 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49737 -> 78.159.112.29:7076
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53346 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53350 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53338 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53338 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53338 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2025019 - Severity 1 - ET MALWARE Possible NanoCore C2 60B : 192.168.2.4:53343 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2816718 - Severity 1 - ETPRO MALWARE NanoCore RAT Keep-Alive Beacon : 192.168.2.4:53338 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:49732 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:49732 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2046914 - Severity 1 - ET MALWARE NanoCore RAT CnC 7 : 192.168.2.4:53343 -> 78.159.112.29:65535
          Source: Network trafficSuricata IDS: 2822326 - Severity 1 - ETPRO MALWARE NanoCore RAT CnC 19 : 192.168.2.4:53343 -> 78.159.112.29:65535
          Source: Malware configuration extractorURLs: airlineagancy.casacam.net
          Source: Malware configuration extractorURLs:
          Source: Malware configuration extractorURLs: jacksonnnn233.theworkpc.com
          Source: global trafficTCP traffic: 192.168.2.4:49732 -> 78.159.112.29:65535
          Source: Joe Sandbox ViewASN Name: LEASEWEB-DE-FRA-10DE LEASEWEB-DE-FRA-10DE
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: jacksonnnn233.theworkpc.com
          Source: global trafficDNS traffic detected: DNS query: airlineagancy.casacam.net
          Source: global trafficDNS traffic detected: DNS query: 56.126.166.20.in-addr.arpa
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://google.com
          Source: new policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmp, airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.0000000002511000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.00000000029B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp, Networks!.exe, 00000006.00000002.2232333043.0000000004BA7000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2324492421.00000000047C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1869683888.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.0000000002986000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
          Source: new policy.scr.exe, 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: RegisterRawInputDevicesmemstr_a586111e-f

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTR

          System Summary

          barindex
          Source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7790000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7790000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7790000.18.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 9.2.Networks!.exe.3e7b15e.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 9.2.Networks!.exe.3e7b15e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 9.2.Networks!.exe.3e7b15e.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7920000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7920000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7920000.22.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7920000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7920000.22.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7920000.22.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7930000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7930000.23.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7930000.23.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.77b0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.77b0000.20.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.77b0000.20.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.440a4ff.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.440a4ff.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.440a4ff.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7720000.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7720000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7720000.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7770000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7770000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7770000.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.77a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.77a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.77a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.44f2776.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.44f2776.4.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.44f2776.4.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7790000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7790000.18.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7790000.18.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.77d0000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.77d0000.21.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.77d0000.21.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7730000.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7730000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7730000.15.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 2.0.airlineagancy.casacam.net 7076.exe.280000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 3.2.new policy.scr.exe.5980000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.5980000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.5980000.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.new policy.scr.exe.3252f80.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.43f7444.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.43f7444.9.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.43f7444.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.328f8ec.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.328f8ec.2.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.328f8ec.2.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.77b0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.77b0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.77b0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7720000.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7720000.14.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7720000.14.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7930000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7930000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7930000.23.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.4559c86.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.4559c86.3.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.4559c86.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7730000.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7730000.15.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7730000.15.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7980000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7980000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7980000.27.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.3289e68.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.3289e68.1.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.3289e68.1.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7770000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7770000.17.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7770000.17.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.77d0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.77d0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.77d0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7950000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7950000.25.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7950000.25.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.4405860.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.4405860.6.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.4405860.6.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7980000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7980000.27.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7980000.27.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7760000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7760000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7760000.16.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.43f7444.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.43f7444.9.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.43f7444.9.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.4550e57.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.4550e57.7.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.4550e57.7.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.795e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.795e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.795e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.4559c86.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.4559c86.3.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.4559c86.3.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.4405860.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.4405860.6.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.4405860.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.7954c9f.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.7954c9f.24.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.7954c9f.24.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000002.00000000.1859765201.0000000000282000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000009.00000002.2363417540.0000000003E7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detetcs the Nanocore RAT Author: Florian Roth
          Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects NanoCore Author: ditekSHen
          Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTRMatched rule: NanoCore Author: Kevin Breen <kevin@techanarchy.net>
          Source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTRMatched rule: detect Nanocore in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Networks!.exe PID: 3720, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 Author: unknown
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5FBD0 NtResumeThread,0_2_05D5FBD0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5E6E0 NtProtectVirtualMemory,0_2_05D5E6E0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5FBC8 NtResumeThread,0_2_05D5FBC8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5E6DB NtProtectVirtualMemory,0_2_05D5E6DB
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9FBD0 NtResumeThread,6_2_05D9FBD0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9E6E0 NtProtectVirtualMemory,6_2_05D9E6E0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9FBC8 NtResumeThread,6_2_05D9FBC8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9E6DB NtProtectVirtualMemory,6_2_05D9E6DB
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594FBD0 NtResumeThread,7_2_0594FBD0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594E6E0 NtProtectVirtualMemory,7_2_0594E6E0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594FBC8 NtResumeThread,7_2_0594FBC8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594E6D9 NtProtectVirtualMemory,7_2_0594E6D9
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_013D6BC80_2_013D6BC8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_013DB1780_2_013DB178
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_013D6BB80_2_013D6BB8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_013D76380_2_013D7638
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_053505F80_2_053505F8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_053505E80_2_053505E8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E7C480_2_059E7C48
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E00400_2_059E0040
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E6E880_2_059E6E88
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E00060_2_059E0006
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E7C380_2_059E7C38
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E80480_2_059E8048
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E67100_2_059E6710
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E67200_2_059E6720
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E12900_2_059E1290
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E12A00_2_059E12A0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059E82000_2_059E8200
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05BF2CF10_2_05BF2CF1
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05BF30870_2_05BF3087
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05BF43680_2_05BF4368
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5B9280_2_05D5B928
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D598B00_2_05D598B0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5E4580_2_05D5E458
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D52EB80_2_05D52EB8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5B9180_2_05D5B918
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D598A00_2_05D598A0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5E44B0_2_05D5E44B
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D59C030_2_05D59C03
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5AE100_2_05D5AE10
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D5AE000_2_05D5AE00
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05E7EFA00_2_05E7EFA0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05E7FB000_2_05E7FB00
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05E7D0880_2_05E7D088
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05E600400_2_05E60040
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05E600060_2_05E60006
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeCode function: 2_2_00007FFD9BAC6D692_2_00007FFD9BAC6D69
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeCode function: 2_2_00007FFD9BAC5FB92_2_00007FFD9BAC5FB9
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588E5D83_2_0588E5D8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_058834713_2_05883471
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588DE003_2_0588DE00
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588F1F03_2_0588F1F0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588B0983_2_0588B098
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588B0A83_2_0588B0A8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588FAD03_2_0588FAD0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_077554B83_2_077554B8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0775E3F83_2_0775E3F8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0775DB283_2_0775DB28
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_07755A003_2_07755A00
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_077598503_2_07759850
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0775D7E03_2_0775D7E0
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0775A5263_2_0775A526
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0775A4683_2_0775A468
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_077554A83_2_077554A8
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_077559F13_2_077559F1
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0775E8F83_2_0775E8F8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B26BC86_2_02B26BC8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B2B1786_2_02B2B178
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B26BBF6_2_02B26BBF
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B2765B6_2_02B2765B
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B59EF06_2_02B59EF0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B5E7076_2_02B5E707
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B56A106_2_02B56A10
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B5E9E56_2_02B5E9E5
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B59EE16_2_02B59EE1
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B5ECB06_2_02B5ECB0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B5ECAE6_2_02B5ECAE
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A200406_2_05A20040
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A27C486_2_05A27C48
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A26E886_2_05A26E88
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A2003B6_2_05A2003B
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A27C386_2_05A27C38
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A267206_2_05A26720
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A267106_2_05A26710
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A212A06_2_05A212A0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A212906_2_05A21290
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A282006_2_05A28200
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05C32D506_2_05C32D50
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05C330876_2_05C33087
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05C343686_2_05C34368
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9B9286_2_05D9B928
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D998B06_2_05D998B0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9E4586_2_05D9E458
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D92EB86_2_05D92EB8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9B9186_2_05D9B918
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D998A06_2_05D998A0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9E44B6_2_05D9E44B
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D99C036_2_05D99C03
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9AE106_2_05D9AE10
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D9AE006_2_05D9AE00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05EBEFA06_2_05EBEFA0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05EBFB006_2_05EBFB00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05EBD0886_2_05EBD088
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05EA00406_2_05EA0040
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05EA00216_2_05EA0021
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00DF6BC87_2_00DF6BC8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00DFB1787_2_00DFB178
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00DF6BB87_2_00DF6BB8
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00DF735D7_2_00DF735D
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F19EF07_2_00F19EF0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F1E7077_2_00F1E707
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F1E9E57_2_00F1E9E5
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F16A107_2_00F16A10
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F1ECB07_2_00F1ECB0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F1ECAF7_2_00F1ECAF
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F19EE17_2_00F19EE1
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D7C487_2_055D7C48
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D00407_2_055D0040
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D6E887_2_055D6E88
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D00067_2_055D0006
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D7C387_2_055D7C38
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D67107_2_055D6710
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D67207_2_055D6720
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D82007_2_055D8200
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D12907_2_055D1290
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055D12A07_2_055D12A0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057E43687_2_057E4368
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057E2CF17_2_057E2CF1
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057E0F1A7_2_057E0F1A
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057EB5AF7_2_057EB5AF
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057E30877_2_057E3087
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594B9287_2_0594B928
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_059498B07_2_059498B0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594E4587_2_0594E458
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594B9187_2_0594B918
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_059498A07_2_059498A0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05949C037_2_05949C03
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594304A7_2_0594304A
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594E44A7_2_0594E44A
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594AE107_2_0594AE10
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_0594AE007_2_0594AE00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05A6EFA07_2_05A6EFA0
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05A6FB007_2_05A6FB00
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05A6D0887_2_05A6D088
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05A500077_2_05A50007
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05A500407_2_05A50040
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7784 -s 1336
          Source: new policy.scr.exe, 00000000.00000002.1883536648.0000000005510000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCpshapibpvz.dll" vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCpshapibpvz.dll" vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E6B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCpshapibpvz.dll" vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000003F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1877031081.0000000003F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOwjefxd.exe0 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1869683888.0000000002F81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1883175138.00000000052F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000002.1862029930.0000000000DCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs new policy.scr.exe
          Source: new policy.scr.exe, 00000000.00000000.1641044218.0000000000992000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameOwjefxd.exe0 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll" vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreBase.dll< vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.0000000004268000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll@ vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNetworkClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCoreClientPlugin.dll" vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSecurityClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2870782033.000000000798E000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.0000000004281000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameManagementClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameToolsClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2859613130.0000000005C30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNanoCoreStressTester.dll< vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPluginNew.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameLzma#.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceExClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMyClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAForge.Video.DirectShow.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNAudio.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameFileBrowserClient.dllT vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2870061029.0000000007978000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSurveillanceClientPlugin.dll4 vs new policy.scr.exe
          Source: new policy.scr.exe, 00000003.00000002.2831215910.0000000001528000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs new policy.scr.exe
          Source: new policy.scr.exeBinary or memory string: OriginalFilenameOwjefxd.exe0 vs new policy.scr.exe
          Source: new policy.scr.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7790000.18.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7790000.18.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7790000.18.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 9.2.Networks!.exe.3e7b15e.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 9.2.Networks!.exe.3e7b15e.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 9.2.Networks!.exe.3e7b15e.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7920000.22.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7920000.22.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7920000.22.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7920000.22.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7920000.22.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7920000.22.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7930000.23.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7930000.23.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7930000.23.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.77b0000.20.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.77b0000.20.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.77b0000.20.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.440a4ff.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.440a4ff.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.440a4ff.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7720000.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7720000.14.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7720000.14.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.new policy.scr.exe.3252f80.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 3.2.new policy.scr.exe.7770000.17.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7770000.17.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7770000.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.77a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.77a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.77a0000.19.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.4550e57.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.44f2776.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.44f2776.4.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.44f2776.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7790000.18.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7790000.18.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7790000.18.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.77d0000.21.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.77d0000.21.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.77d0000.21.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7730000.15.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7730000.15.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7730000.15.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 2.0.airlineagancy.casacam.net 7076.exe.280000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 3.2.new policy.scr.exe.5980000.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.5980000.10.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.5980000.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.new policy.scr.exe.3252f80.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.43f7444.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.43f7444.9.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.43f7444.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.44f2776.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.328f8ec.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.328f8ec.2.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.328f8ec.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.77b0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.77b0000.20.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.77b0000.20.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7720000.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7720000.14.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7720000.14.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7930000.23.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7930000.23.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7930000.23.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.4559c86.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.4559c86.3.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.4559c86.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7730000.15.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7730000.15.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7730000.15.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7980000.27.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7980000.27.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7980000.27.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.3289e68.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.3289e68.1.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.3289e68.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.3289e68.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7770000.17.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7770000.17.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7770000.17.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7950000.25.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7950000.25.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.77d0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.77d0000.21.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.77d0000.21.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7950000.25.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7950000.25.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7950000.25.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.4405860.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.4405860.6.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.4405860.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7980000.27.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7980000.27.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7980000.27.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7760000.16.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7760000.16.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7760000.16.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.43f7444.9.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.43f7444.9.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.43f7444.9.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.4550e57.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.4550e57.7.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.4550e57.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.795e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.795e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.795e8a4.26.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.4559c86.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.4559c86.3.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.4559c86.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.4405860.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.4405860.6.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.4405860.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.7954c9f.24.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.7954c9f.24.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.7954c9f.24.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.328f8ec.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000002.00000000.1859765201.0000000000282000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000009.00000002.2363417540.0000000003E7B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Nanocore_RAT_Gen_2 date = 2016-04-22, hash1 = 755f49a4ffef5b1b62f4b5a5de279868c0c1766b528648febf76628f1fe39050, author = Florian Roth, description = Detetcs the Nanocore RAT, score = https://www.sentinelone.com/blogs/teaching-an-old-rat-new-tricks/
          Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_NanoCore author = ditekSHen, description = Detects NanoCore
          Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTRMatched rule: NanoCore date = 2014/04, filetype = exe, author = Kevin Breen <kevin@techanarchy.net>, maltype = Remote Access Trojan, ref = http://malwareconfig.com/stats/NanoCore
          Source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTRMatched rule: Nanocore author = JPCERT/CC Incident Response Group, description = detect Nanocore in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Networks!.exe PID: 3720, type: MEMORYSTRMatched rule: Windows_Trojan_Nanocore_d8c4e3c5 reference_sample = b2262126a955e306dc68487333394dc08c4fbd708a19afeb531f58916ddb1cfd, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Nanocore, fingerprint = e5c284f14c1c650ef8ddd7caf314f5318e46a811addc2af5e70890390c7307d4, id = d8c4e3c5-8bcc-43d2-9104-fa3774282da5, last_modified = 2021-08-23
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
          Source: airlineagancy.casacam.net 7076.exe.0.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
          Source: airlineagancy.casacam.net 7076.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: airlineagancy.casacam.net 7076.exe.0.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
          Source: classification engineClassification label: mal100.troj.evad.winEXE@12/9@19/1
          Source: C:\Users\user\Desktop\new policy.scr.exeFile created: C:\Users\user\AppData\Roaming\Networks!.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeMutant created: \Sessions\1\BaseNamedObjects\BGCigTdLypaes6Nr
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMutant created: NULL
          Source: C:\Users\user\Desktop\new policy.scr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{7065c9a5-e7ef-4b4a-9ad2-3b36dc826073}
          Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7516:64:WilError_03
          Source: C:\Users\user\Desktop\new policy.scr.exeFile created: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeJump to behavior
          Source: new policy.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: new policy.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\new policy.scr.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: new policy.scr.exeReversingLabs: Detection: 55%
          Source: new policy.scr.exeVirustotal: Detection: 56%
          Source: C:\Users\user\Desktop\new policy.scr.exeFile read: C:\Users\user\Desktop\new policy.scr.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\new policy.scr.exe "C:\Users\user\Desktop\new policy.scr.exe"
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe "C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe"
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Users\user\Desktop\new policy.scr.exe "C:\Users\user\Desktop\new policy.scr.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7784 -s 1336
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe "C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe" Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Users\user\Desktop\new policy.scr.exe "C:\Users\user\Desktop\new policy.scr.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: avicap32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: msvfw32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: mscoree.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptsp.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: rsaenh.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptbase.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: amsi.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: userenv.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: msasn1.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: gpapi.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: mscoree.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: kernel.appcore.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: version.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: vcruntime140_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: ucrtbase_clr0400.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: uxtheme.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: windows.storage.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: wldp.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: profapi.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptsp.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: rsaenh.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: cryptbase.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: amsi.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: userenv.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: msasn1.dll
          Source: C:\Users\user\AppData\Roaming\Networks!.exeSection loaded: gpapi.dll
          Source: C:\Users\user\Desktop\new policy.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: new policy.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: new policy.scr.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: new policy.scr.exeStatic file information: File size 2360320 > 1048576
          Source: new policy.scr.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x22f000
          Source: new policy.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E6B000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.0000000003F81000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1883175138.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Networks!.exe, 00000006.00000002.2239294193.0000000005FB3000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\MyNanoCore RemoteScripting\MyClientPlugin\obj\Debug\MyClientPluginNew.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E6B000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.0000000003F81000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1883175138.00000000052F0000.00000004.08000000.00040000.00000000.sdmp, Networks!.exe, 00000006.00000002.2239294193.0000000005FB3000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.00000000029B4000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: protobuf-net.pdbSHA256}Lq source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: protobuf-net.pdb source: new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\Liam\Documents\Visual Studio 2013\Projects\NanoCoreStressTester\NanoCoreStressTester\obj\Debug\NanoCoreStressTester.pdb source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\Liam\Downloads\NanoCoreSwiss\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: G:\Users\Andy\Documents\Visual Studio 2013\Projects\NanocoreBasicPlugin\NanoCoreBase\obj\Debug\NanoCoreBase.pdb source: new policy.scr.exe, 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: P:\Visual Studio Projects\Projects 15\NanoNana\MyClientPlugin\obj\Debug\MyClientPlugin.pdb source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\ARM\Desktop\ncsource\Plugins\CorePlugin\CoreClientPlugin\obj\Release\CoreClientPlugin.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp
          Source: Binary string: C:\Users\Cole\Documents\Visual Studio 2013\Projects\FileBrowserPlugin\FileBrowserClient\obj\Debug\FileBrowserClient.pdb source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
          Source: new policy.scr.exe, ParamCreatorObject.cs.Net Code: MapSingleton System.AppDomain.Load(byte[])
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Messages.cs.Net Code: Memory
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
          Source: Yara matchFile source: 6.2.Networks!.exe.4a592f0.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 7.2.Networks!.exe.46792f0.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.5af0000.16.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.4d192f0.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.4af4e70.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.49e0650.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.2303284343.000000000297D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1884977634.0000000005AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2324492421.0000000004679000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2232333043.0000000004A59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1869683888.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTR
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_059EB76B pushfd ; retf 0_2_059EB76E
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05BFD170 push 8B6C5ADFh; iretd 0_2_05BFD175
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05BFD320 pushad ; retf 0_2_05BFD321
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05C0328E push edi; iretd 0_2_05C03291
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05D570FA push eax; retf 0_2_05D570FB
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 0_2_05E67F92 push 00000031h; retf 0_2_05E67F94
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588D88F push DA0588D1h; ret 3_2_0588D8C9
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0588D8CB push ss; ret 3_2_0588D8D1
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_07757F28 push esp; ret 3_2_07757F29
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_02B546C4 push edx; iretd 6_2_02B546D2
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05A2B76B pushfd ; retf 6_2_05A2B76E
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05C3D170 push 8B6C56DFh; iretd 6_2_05C3D175
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05C3D320 pushad ; retf 6_2_05C3D321
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05C4328E push edi; iretd 6_2_05C43291
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 6_2_05D970FA push eax; retf 6_2_05D970FB
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_00F146BF push edx; iretd 7_2_00F146D2
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_05590D72 push eax; iretd 7_2_05590D1D
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_055DB76B pushfd ; retf 7_2_055DB76E
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057ED170 push 8B6C9BDFh; iretd 7_2_057ED175
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057ED320 pushad ; retf 7_2_057ED321
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_057F328E push edi; iretd 7_2_057F3291
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 7_2_059470FA push eax; retf 7_2_059470FB
          Source: C:\Users\user\AppData\Roaming\Networks!.exeCode function: 9_2_05A073CD push FFFFFF8Bh; iretd 9_2_05A073CF
          Source: C:\Users\user\Desktop\new policy.scr.exeFile created: C:\Users\user\AppData\Roaming\Networks!.exeJump to dropped file
          Source: C:\Users\user\Desktop\new policy.scr.exeFile created: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\new policy.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Networks!Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Networks!Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Networks!Jump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\new policy.scr.exeFile opened: C:\Users\user\Desktop\new policy.scr.exe:Zone.Identifier read attributes | deleteJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
          Source: new policy.scr.exe, 00000000.00000002.1869683888.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 1330000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 2F80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 1330000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 5E80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 5C10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeMemory allocated: 2470000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeMemory allocated: 1A510000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 1500000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 3200000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: 5200000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 1040000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 2CC0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 5EC0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 5C50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: DF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: F10000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 5A70000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 5800000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: BC0000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 26F0000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 2610000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 13F0000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 2E30000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory allocated: 4E30000 memory reserve | memory write watch
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Networks!.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeWindow / User API: threadDelayed 4580Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeWindow / User API: threadDelayed 5192Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeWindow / User API: threadDelayed 5225Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeWindow / User API: threadDelayed 4600Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeWindow / User API: foregroundWindowGot 696Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeWindow / User API: foregroundWindowGot 923Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe TID: 8076Thread sleep count: 38 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe TID: 8076Thread sleep time: -35048813740048126s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe TID: 8080Thread sleep count: 4580 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe TID: 8080Thread sleep count: 5192 > 30Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exe TID: 7856Thread sleep time: -22136092888451448s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exe TID: 3120Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\Networks!.exe TID: 7448Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\Networks!.exeThread delayed: delay time: 922337203685477
          Source: Networks!.exe, 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
          Source: new policy.scr.exe, 00000000.00000002.1884717220.0000000005A4B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: Networks!.exe, 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
          Source: new policy.scr.exe, 00000003.00000002.2862345788.00000000066BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: airlineagancy.casacam.net 7076.exe, 00000002.00000002.4091977760.00000000007B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_0145D01C LdrInitializeThunk,3_2_0145D01C
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: airlineagancy.casacam.net 7076.exe.0.dr, Messages.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, NativeMethods.csReference to suspicious API methods: OpenProcessToken(hProcess, desiredAccess, out var TokenHandle)
          Source: 0.2.new policy.scr.exe.4ed2b40.4.raw.unpack, ResourceReferenceValue.csReference to suspicious API methods: NativeMethods.LoadLibrary(ResourceFilePath)
          Source: C:\Users\user\Desktop\new policy.scr.exeMemory written: C:\Users\user\Desktop\new policy.scr.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory written: C:\Users\user\AppData\Roaming\Networks!.exe base: 700000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeMemory written: C:\Users\user\AppData\Roaming\Networks!.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe "C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe" Jump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeProcess created: C:\Users\user\Desktop\new policy.scr.exe "C:\Users\user\Desktop\new policy.scr.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeProcess created: C:\Users\user\AppData\Roaming\Networks!.exe "C:\Users\user\AppData\Roaming\Networks!.exe"Jump to behavior
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.00000000033E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q<
          Source: new policy.scr.exe, 00000003.00000002.2865661587.000000000714B000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager(
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003403000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q|>@
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q6k
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003430000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qD
          Source: airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.000000000269E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000339E000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.00000000034EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qH
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qx5f
          Source: airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.000000000269E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003451000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q4
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000034EA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qXGO
          Source: new policy.scr.exe, 00000003.00000002.2862287242.000000000669C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q4Ck
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000036FA000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q8
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000034AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q</N
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035C4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q\
          Source: airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.000000000269E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003739000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.00000000037DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q`
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000036FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qHq
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000037D9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qd
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003536000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003516000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.000000000340A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q,mk
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000037B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q,#}
          Source: new policy.scr.exe, 00000003.00000002.2879812341.0000000007ECC000.00000004.00000010.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2879987019.000000000800C000.00000004.00000010.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2832562480.000000000181E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerManager
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q,Me
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qP
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qhgo
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qT
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.00000000036FA000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003739000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager0~S
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.00000000037B9000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.00000000037DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qX
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003511000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qP'Q
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003511000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q|
          Source: airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.000000000269E000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003536000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003516000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003739000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qdXt
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003536000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qHQU
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qvd
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q4Zo
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^ql
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qTQd
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000332F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qp
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^ql\a
          Source: new policy.scr.exe, 00000003.00000002.2865122228.0000000006D8E000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Program ManagerR
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qtGe
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qt
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qx
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000339E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q$':
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q,-u
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000037DD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003739000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qLv{
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003554000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qH1X
          Source: new policy.scr.exe, 00000003.00000002.2835253359.000000000368F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q,-k
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003536000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.000000000340A000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerlB^q
          Source: airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.000000000269E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000037B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q(B|
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003566000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^q("W
          Source: new policy.scr.exe, 00000003.00000002.2835253359.00000000035E8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLR^qT9`
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Users\user\Desktop\new policy.scr.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeQueries volume information: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Users\user\Desktop\new policy.scr.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\new policy.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Users\user\AppData\Roaming\Networks!.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Users\user\AppData\Roaming\Networks!.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Users\user\AppData\Roaming\Networks!.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Users\user\AppData\Roaming\Networks!.exe VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\Networks!.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
          Source: C:\Users\user\Desktop\new policy.scr.exeCode function: 3_2_07758C68 GetSystemTimes,3_2_07758C68
          Source: C:\Users\user\Desktop\new policy.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiVirusProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM AntiSpywareProduct
          Source: C:\Users\user\Desktop\new policy.scr.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT DisplayName FROM FirewallProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.new policy.scr.exe.3252f80.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.airlineagancy.casacam.net 7076.exe.280000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.3252f80.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000000.1859765201.0000000000282000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: airlineagancy.casacam.net 7076.exe PID: 7764, type: MEMORYSTR
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, type: DROPPED

          Remote Access Functionality

          barindex
          Source: new policy.scr.exe, 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Class10gdelegate0_0gclass0_0gstruct0_0gclass1_0gclass2_0gclass3_0class9_0smethod_0type_0contextValue_0string_0ulong_0bool_0gparam_0cultureInfo_0lastInputInfo_0stringBuilder_0resourceManager_0timer_0uintptr_0memoryStatus_0object_0uint_0ushort_0iclientDataHost_0iclientNetworkHost_0iclientAppHost_0GDelegate0GClass0GStruct0Class11gdelegate0_1class1_1smethod_1string_1ulong_1bool_1cultureInfo_1intptr_1object_1uint_1Class1`1IEnumerable`1ContextValue`1IEnumerator`1List`1GClass1Class12Int32class1_2smethod_2ulong_2intptr_2int_2KeyValuePair`2Dictionary`2GClass2Class13class1_3smethod_3GClass3Class14smethod_4Class4Class15method_5Class5Class16method_6Class6Class17method_7Class7Class18method_8Class8Class19method_9Class9<Module>System.IOTvalue__GetFirstRunDataProjectDatamscorlibSystem.Collections.GenericMicrosoft.VisualBasicGetWindowThreadProcessIdGetProcessByIdAddConnectionStateChangedConnectionFailedPipeClosedPipeCreatedget_BytesReceivedSynchronizedCoreCommandSystemCommandConnectionCommandRoundGetMethodmethodNetworkInterfaceStackTraceCreateInstancedefaultInstanceDivideGetHashCodeget_UnicodeAddRangeChangeBuildingHostCacheEndInvokeBeginInvokeIDisposableRuntimeMethodHandleGetModuleHandleRuntimeTypeHandleGetTypeFromHandleGetProcessHandleToSingleAvailablePageFileTotalPageFileset_WindowStyleProcessWindowStyleget_NameGetApplicationExecutableNameGetClientExecutableNameGetRandomFileNameGetFileNameget_FullNameget_ProcessNameGetNameAssemblyNameGetApplicationFriendlyNameGetClientFriendlyNameStackFrameGetFrameDateTimeOneCombineCommandTypeCheckForSyncLockOnValueTypeget_DeclaringTypeNanoCoreMethodBaseApplicationBaseApplicationSettingsBaseDisposeUpdateMulticastDelegateEditorBrowsableStateCompilerGeneratedAttributeGuidAttributeGeneratedCodeAttributeDebuggerNonUserCodeAttributeDebuggableAttributeEditorBrowsableAttributeComVisibleAttributeAssemblyTitleAttributeStandardModuleAttributeHideModuleNameAttributeAssemblyTrademarkAttributeDebuggerHiddenAttributeAssemblyFileVersionAttributeMyGroupCollectionAttributeAssemblyDescriptionAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCopyrightAttributeCLSCompliantAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeset_UseShellExecuteByteget_Valueset_ValueLookupPrivilegeValueGetObjectValueGetValueMoveRemoveget_SizeInitializeSizeOfSystem.ThreadingEncodingToStringMathget_ExecutablePathGetTempPathobjAsyncCallbackTimerCallbackcallbackIClientNetworkTotalPhysicalAvailablePhsyicalMarshalDecimalMicrosoft.VisualBasic.MyServices.InternalAvailableVirtualTotalVirtualAvailableExVirtualSystem.ComponentModelHandleConnectionCommandUninstalladvapi32.dllkernel32.dlluser32.dllCoreClientPlugin.dllObjectFlowControlget_Itemset_ItemSystemEnumBooleanget_MetadataTokenOpenProcessTokenGetPublicKeyTokenMinNanoCore.ClientPluginCoreClientPluginGetIsRunningAsAdminApplicationSystem.Net.NetworkInformationUnicastIPAddressInformationSystem.ConfigurationSystem.GlobalizationSystem.ReflectionUnicastIPAddressInformationCollectionIClientNameObject
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreBase.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreBaseClientPluginCommandHandlerResourcesNanoCoreBase.My.ResourcesMySettingsMySettingsPropertyCommandsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketHandleCommandHandleCommandOpenWebsiteHandleCommandMessageBoxSwapMouseButtonfSwapuser32.dllHandleCommandMouseSwapHandleCommandMouseUnswapmciSendStringlpszCommandlpszReturnStringcchReturnLengthhwndCallbackwinmm.dllmciSendStringAHandleCommandCDTrayHandleCommandCDTrayCloseSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__OpenWebsiteMessageBoxCDTrayCDTrayCloseMouseSwapMouseUnswapSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeSendToServerParamArrayAttributeStringProcessStartSystem.Windows.FormsDialogResultShowConversionsReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedNanoCoreBase.Resources.resourcesDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeNanoCoreBase.dll+set CDAudio door open/set CDAudio door closed-NanoCoreBase.Resources3
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
          Source: new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
          Source: new policy.scr.exe, 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: Class10gdelegate0_0gclass0_0gstruct0_0gclass1_0gclass2_0gclass3_0class9_0smethod_0type_0contextValue_0string_0ulong_0bool_0gparam_0cultureInfo_0lastInputInfo_0stringBuilder_0resourceManager_0timer_0uintptr_0memoryStatus_0object_0uint_0ushort_0iclientDataHost_0iclientNetworkHost_0iclientAppHost_0GDelegate0GClass0GStruct0Class11gdelegate0_1class1_1smethod_1string_1ulong_1bool_1cultureInfo_1intptr_1object_1uint_1Class1`1IEnumerable`1ContextValue`1IEnumerator`1List`1GClass1Class12Int32class1_2smethod_2ulong_2intptr_2int_2KeyValuePair`2Dictionary`2GClass2Class13class1_3smethod_3GClass3Class14smethod_4Class4Class15method_5Class5Class16method_6Class6Class17method_7Class7Class18method_8Class8Class19method_9Class9<Module>System.IOTvalue__GetFirstRunDataProjectDatamscorlibSystem.Collections.GenericMicrosoft.VisualBasicGetWindowThreadProcessIdGetProcessByIdAddConnectionStateChangedConnectionFailedPipeClosedPipeCreatedget_BytesReceivedSynchronizedCoreCommandSystemCommandConnectionCommandRoundGetMethodmethodNetworkInterfaceStackTraceCreateInstancedefaultInstanceDivideGetHashCodeget_UnicodeAddRangeChangeBuildingHostCacheEndInvokeBeginInvokeIDisposableRuntimeMethodHandleGetModuleHandleRuntimeTypeHandleGetTypeFromHandleGetProcessHandleToSingleAvailablePageFileTotalPageFileset_WindowStyleProcessWindowStyleget_NameGetApplicationExecutableNameGetClientExecutableNameGetRandomFileNameGetFileNameget_FullNameget_ProcessNameGetNameAssemblyNameGetApplicationFriendlyNameGetClientFriendlyNameStackFrameGetFrameDateTimeOneCombineCommandTypeCheckForSyncLockOnValueTypeget_DeclaringTypeNanoCoreMethodBaseApplicationBaseApplicationSettingsBaseDisposeUpdateMulticastDelegateEditorBrowsableStateCompilerGeneratedAttributeGuidAttributeGeneratedCodeAttributeDebuggerNonUserCodeAttributeDebuggableAttributeEditorBrowsableAttributeComVisibleAttributeAssemblyTitleAttributeStandardModuleAttributeHideModuleNameAttributeAssemblyTrademarkAttributeDebuggerHiddenAttributeAssemblyFileVersionAttributeMyGroupCollectionAttributeAssemblyDescriptionAttributeCompilationRelaxationsAttributeAssemblyProductAttributeAssemblyCopyrightAttributeCLSCompliantAttributeAssemblyCompanyAttributeRuntimeCompatibilityAttributeset_UseShellExecuteByteget_Valueset_ValueLookupPrivilegeValueGetObjectValueGetValueMoveRemoveget_SizeInitializeSizeOfSystem.ThreadingEncodingToStringMathget_ExecutablePathGetTempPathobjAsyncCallbackTimerCallbackcallbackIClientNetworkTotalPhysicalAvailablePhsyicalMarshalDecimalMicrosoft.VisualBasic.MyServices.InternalAvailableVirtualTotalVirtualAvailableExVirtualSystem.ComponentModelHandleConnectionCommandUninstalladvapi32.dllkernel32.dlluser32.dllCoreClientPlugin.dllObjectFlowControlget_Itemset_ItemSystemEnumBooleanget_MetadataTokenOpenProcessTokenGetPublicKeyTokenMinNanoCore.ClientPluginCoreClientPluginGetIsRunningAsAdminApplicationSystem.Net.NetworkInformationUnicastIPAddressInformationSystem.ConfigurationSystem.GlobalizationSystem.ReflectionUnicastIPAddressInformationCollectionIClientNameObject
          Source: new policy.scr.exe, 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: new policy.scr.exe, 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCoreStressTester.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainNanoCoreStressTesterClientPluginHTTPFloodSlowLorisSYNFloodTCPNanoCoreStressTester.FloodUDPSendSynCommandHandlerResourcesNanoCoreStressTester.My.ResourcesMySettingsMySettingsPropertyCommandsMethodsMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostIClientDataHostDataHostClientGUIDSendCommandparamsInitializePluginNanoCore.ClientPluginIClientNetwork_networkhost_loggingHost_DataHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketStartHostToAttackArrayUploadDataSiteUserAgentRefererValuesGeneratecodelengthSystem.ThreadingThreadThreadsPortToAttackTimeToAttackThreadstoUseThreadsEndedattacksAttackRunningFloodnewHostnewPortnewTimenewThreadslolStopSlowlorisStressThreadStart_floodingJob_floodingThreadSystem.NetIPEndPoint_ipEo_synClassHostIsEnabledPortSuperSynSocketsStartSuperSynStopSuperSynSystem.Net.SocketsSocketClientIPPacketsPacketSizeMaxPacketsStopFloodmPacketspSize_sockipEosuperSynSockets__1IAsyncResultOnConnectarSendFloodingstopHTTPBytesSentSYNConnectionsHTTPDataSentMethodTargetAddressTargetStatusupdateBytesnewSYNFloodHandleDDOSCommandHandleStopCommandSystem.TimersElapsedEventArgsbytesTimerElapsedsourceeHandleHTTPCommandHandleSlowlorisCommandHandleTCPCommandHandleUDPCommandHandleSYNCommandSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CultureValueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsEnumvalue__sendStressCommandupdateStatusColumnstopStressCommandHTTPSlowlorisSYNSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeExceptionSendToServerProjectDataSetProjectErrorClearProjectErrorTimerNanoCoreIClientNameObjectCollectionget_VariablesGetValueset_Intervalset_EnabledElapsedEventHandleradd_ElapsedParamArrayAttributeRandomGuidStringIsNullOrEmptyArgumentNullExceptionArgumentOutOfRangeExce
          Source: new policy.scr.exe, 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationMyClientPlugin.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainMyClientPluginClientPluginMiscCommandHandlerCommandTypeMiscCommandMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleMiscCommandHandleMiscCommandMessageInterpretRecievedcommandtodoloopkeysEnumvalue__MessageStringExceptionMicrosoft.VisualBasic.CompilerServicesOperatorsCompareStringServerComputerMicrosoft.VisualBasic.MyServicesRegistryProxyget_RegistryMicrosoft.Win32RegistryKeyget_LocalMachineConcatInt32SetValueProjectDataSetProjectErrorClearProjectErrorget_LengthStandardModuleAttributeSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeDebuggableAttributeDebuggingModesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeMyClientPlugin.dll'DisableWebcamLights
          Source: new policy.scr.exe, 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: new policy.scr.exe, 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationFileBrowserClient.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1ClientMainFileBrowserClientClientPluginCommandHandlersResourcesFileBrowserClient.My.ResourcesMySettingsMySettingsPropertyFunctionsCommandTypesMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceNanoCore.ClientPluginHostIClientLoggingHostLoggingHostIClientNetworkHostNetworkHostCurrentDirectoryInitializePluginNanoCore.ClientPluginIClientNetwork_loggingHost_networkHostBuildingHostCacheConnectionFailedhostportConnectionStateChangedconnectedPipeClosedpipeNamePipeCreatedReadPacketparamsHandleCreateDirectoryremoteDirHandleDeleteFileremoteFileisDirectoryHandleOpenFileHandleReceiveFilelocalFileHandleRenameFilenewFileNameHandleSetCurrentDirectorypathHandleDeleteHandleDownloadHandleDrivesHandleFilesHandleGetCurrentDirectoryHandleMachineNameHandleOpenHandleSetCurrentDirectoryPacketHandleUploadHandleRenameHandleCreateSendCurrentDirectorySendDrivesSendFileSendFilesSendMachineNameSystem.ResourcesResourceManagerresourceManSystem.GlobalizationCultureInforesourceCultureget_ResourceManagerget_Cultureset_CulturevalueCultureSystem.ConfigurationApplicationSettingsBasedefaultInstanceget_DefaultDefaultget_SettingsSettingsSystem.Collections.GenericList`1RemoteFilesRemoteFoldersRemoteDrivesEnumerateRemoteFilesEnumerateRemoteDrivesLogMessagemessageEnumvalue__MachineNameDrivesFilesGetCurrentDirectorySetCurrentDirectoryDownloadUploadOpenDeleteCreateDirectoryRenameSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerNonUserCodeAttributeDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeEnvironmentSpecialFolderGetFolderPathStringFormatSystem.IODirectoryDirectoryInfoProjectDataExceptionSetProjectErrorClearProjectErrorFileLogClientExceptionProcessStartConvertFromBase64StringWriteAllBytesMoveSendToServerConversionsToBooleanInt32NewLateBindingLateIndexGetEnumeratorEmptyGetEnumeratorget_CurrentTrimConcatMoveNextIDisposableDisposeReadAllBytesToBase64StringIsNullOrEmptyget_MachineNameToUpperget_UserNameReferenceEqualsSystem.ReflectionAssemblyget_AssemblyCompilerGeneratedAttributeSettingsBaseSynchronizedFileInfoFileSystemInfoget_FullNameContainsGetDirectoriesget_NameAddGetF
          Source: new policy.scr.exe, 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Networks!.exe, 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHostIClientUIHostIClientLoggingHostIClientAppHostIClientNameObjectCollectionNanoCoreIClientReadOnlyNameObjectCollectionClientInvokeDelegateMicrosoft.VisualBasic.ApplicationServicesApplicationBase.ctorMicrosoft.VisualBasic.DevicesComputerSystemObject.cctorget_Computerm_ComputerObjectProviderget_Applicationm_AppObjectProviderUserget_Userm_UserObjectProviderget_WebServicesm_MyWebServicesObjectProviderApplicationWebServicesEqualsoGetHashCodeTypeGetTypeToStringCreate__Instance__TinstanceDispose__Instance__get_GetInstanceMicrosoft.VisualBasic.MyServices.InternalContextValue`1m_ContextGetInstanceReadPacketpipeNameparamsPipeCreatedPipeClosedConnectionStateChangedconnectedConnectionFailedhostportBuildingHostCacheVariableChangednameClientSettingChangedPluginUninstallingClientUninstallingget_Variablesget_ClientSettingsget_BuilderSettingsVariablesClientSettingsBuilderSettingsget_ConnectedClosePipePipeExistsRebuildHostCacheAddHostEntryDisconnectSendToServercompressConnectedInvokemethodstateLogClientMessagemessageExceptionLogClientExceptionexsiteRestartShutdownDisableProtectionRestoreProtectionUninstallEntryExistsSystem.Collections.GenericKeyValuePair`2GetEntriesGetValuedefaultValueSetValuevalueRemoveValueMulticastDelegateTargetObjectTargetMethodIAsyncResultAsyncCallbackBeginInvokeDelegateCallbackDelegateAsyncStateEndInvokeDelegateAsyncResultSystem.ComponentModelEditorBrowsableAttributeEditorBrowsableStateSystem.CodeDom.CompilerGeneratedCodeAttributeSystem.DiagnosticsDebuggerHiddenAttributeMicrosoft.VisualBasic.CompilerServicesStandardModuleAttributeHideModuleNameAttributeSystem.ComponentModel.DesignHelpKeywordAttributeSystem.Runtime.CompilerServicesRuntimeHelpersGetObjectValueRuntimeTypeHandleGetTypeFromHandleActivatorCreateInstanceMyGroupCollectionAttributeget_Valueset_ValueSystem.Runtime.InteropServicesComVisibleAttributeParamArrayAttributeCompilationRelaxationsAttributeRuntimeCompatibilityAttributeSystem.ReflectionAssemblyFileVersionAttributeGuidAttributeAssemblyTrademarkAttributeAssemblyCopyrightAttributeAssemblyProductAttributeAssemblyCompanyAttributeAssemblyDescriptionAttributeAssemblyTitleAttributeClientPluginClientPlugin.dll
          Source: Networks!.exe, 00000009.00000002.2363417540.0000000003E7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: NanoCore.ClientPluginHost
          Source: Networks!.exe, 00000009.00000002.2363417540.0000000003E7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: <Module>mscorlibMicrosoft.VisualBasicMyApplicationNanoCore.MyMyComputerMyProjectMyWebServicesThreadSafeObjectProvider`1IClientNetworkNanoCore.ClientPluginIClientDataIClientAppIClientDataHostNanoCore.ClientPluginHostIClientNetworkHost
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e4629.11.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.37445bd.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373b15e.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.700000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.275a4e8.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.59e0000.12.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.42c7788.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.Networks!.exe.373ff94.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.Networks!.exe.60b5958.13.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.new policy.scr.exe.3255830.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7784, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 8108, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 7180, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: Networks!.exe PID: 5868, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.new policy.scr.exe.3252f80.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.0.airlineagancy.casacam.net 7076.exe.280000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.new policy.scr.exe.3252f80.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000000.1859765201.0000000000282000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: new policy.scr.exe PID: 7496, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: airlineagancy.casacam.net 7076.exe PID: 7764, type: MEMORYSTR
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, type: DROPPED
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          11
          Input Capture
          1
          System Time Discovery
          Remote Services11
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Native API
          1
          Scheduled Task/Job
          112
          Process Injection
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          File and Directory Discovery
          Remote Desktop Protocol11
          Input Capture
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Scheduled Task/Job
          11
          Registry Run Keys / Startup Folder
          1
          Scheduled Task/Job
          2
          Obfuscated Files or Information
          Security Account Manager14
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Remote Access Software
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
          Registry Run Keys / Startup Folder
          2
          Software Packing
          NTDS311
          Security Software Discovery
          Distributed Component Object ModelInput Capture1
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets2
          Process Discovery
          SSHKeylogging11
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Masquerading
          Cached Domain Credentials131
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items131
          Virtualization/Sandbox Evasion
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Hidden Files and Directories
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502158 Sample: new policy.scr.exe Startdate: 31/08/2024 Architecture: WINDOWS Score: 100 41 airlineagancy.casacam.net 2->41 43 56.126.166.20.in-addr.arpa 2->43 49 Suricata IDS alerts for network traffic 2->49 51 Found malware configuration 2->51 53 Malicious sample detected (through community Yara rule) 2->53 55 18 other signatures 2->55 8 new policy.scr.exe 1 6 2->8         started        12 Networks!.exe 2 2->12         started        14 Networks!.exe 2 2->14         started        signatures3 process4 file5 31 C:\Users\user\AppData\Roaming31etworks!.exe, PE32 8->31 dropped 33 C:\...\airlineagancy.casacam.net 7076.exe, PE32 8->33 dropped 35 C:\Users\...35etworks!.exe:Zone.Identifier, ASCII 8->35 dropped 57 Detected Nanocore Rat 8->57 59 Creates autostart registry keys with suspicious names 8->59 61 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->61 16 new policy.scr.exe 10 8->16         started        21 airlineagancy.casacam.net 7076.exe 2 8->21         started        63 Antivirus detection for dropped file 12->63 65 Multi AV Scanner detection for dropped file 12->65 67 Machine Learning detection for dropped file 12->67 23 Networks!.exe 12->23         started        69 Injects a PE file into a foreign processes 14->69 25 Networks!.exe 14->25         started        signatures6 process7 dnsIp8 37 airlineagancy.casacam.net 78.159.112.29, 49732, 49736, 49737 LEASEWEB-DE-FRA-10DE Germany 16->37 39 jacksonnnn233.theworkpc.com 16->39 29 C:\Users\user\AppData\Roaming\...\run.dat, Non-ISO 16->29 dropped 45 Detected Nanocore Rat 16->45 47 Hides that the sample has been downloaded from the Internet (zone.identifier) 16->47 27 WerFault.exe 16->27         started        file9 signatures10 process11

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          new policy.scr.exe55%ReversingLabsByteCode-MSIL.Trojan.Leonem
          new policy.scr.exe56%VirustotalBrowse
          new policy.scr.exe100%AviraHEUR/AGEN.1323683
          new policy.scr.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe100%AviraHEUR/AGEN.1305769
          C:\Users\user\AppData\Roaming\Networks!.exe100%AviraHEUR/AGEN.1323683
          C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Networks!.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\Networks!.exe55%ReversingLabsByteCode-MSIL.Trojan.Leonem
          C:\Users\user\AppData\Roaming\Networks!.exe56%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          jacksonnnn233.theworkpc.com2%VirustotalBrowse
          airlineagancy.casacam.net1%VirustotalBrowse
          56.126.166.20.in-addr.arpa1%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
          https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
          https://github.com/mgravell/protobuf-net0%Avira URL Cloudsafe
          https://github.com/mgravell/protobuf-neti0%Avira URL Cloudsafe
          https://github.com/mgravell/protobuf-netJ0%Avira URL Cloudsafe
          jacksonnnn233.theworkpc.com0%Avira URL Cloudsafe
          http://google.com0%Avira URL Cloudsafe
          airlineagancy.casacam.net0%Avira URL Cloudsafe
          https://github.com/mgravell/protobuf-neti0%VirustotalBrowse
          https://github.com/mgravell/protobuf-net0%VirustotalBrowse
          jacksonnnn233.theworkpc.com2%VirustotalBrowse
          airlineagancy.casacam.net1%VirustotalBrowse
          https://github.com/mgravell/protobuf-netJ0%VirustotalBrowse
          http://google.com1%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          jacksonnnn233.theworkpc.com
          78.159.112.29
          truetrueunknown
          airlineagancy.casacam.net
          78.159.112.29
          truetrueunknown
          56.126.166.20.in-addr.arpa
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          true
            unknown
            jacksonnnn233.theworkpc.comtrue
            • 2%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            airlineagancy.casacam.nettrue
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://github.com/mgravell/protobuf-netnew policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://github.com/mgravell/protobuf-netinew policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            https://stackoverflow.com/q/14436606/23354new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1869683888.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.0000000002986000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://github.com/mgravell/protobuf-netJnew policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmp, Networks!.exe, 00000006.00000002.2232333043.0000000004BA7000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2324492421.00000000047C7000.00000004.00000800.00020000.00000000.sdmpfalse
            • 0%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://google.comnew policy.scr.exe, 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmpfalse
            • 1%, Virustotal, Browse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namenew policy.scr.exe, 00000000.00000002.1869683888.0000000003260000.00000004.00000800.00020000.00000000.sdmp, airlineagancy.casacam.net 7076.exe, 00000002.00000002.4094137301.0000000002511000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000006.00000002.2215379715.0000000002E09000.00000004.00000800.00020000.00000000.sdmp, Networks!.exe, 00000007.00000002.2303284343.00000000029B4000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://stackoverflow.com/q/11564914/23354;new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://stackoverflow.com/q/2152978/23354new policy.scr.exe, 00000000.00000002.1877031081.0000000004E21000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, new policy.scr.exe, 00000000.00000002.1885309360.0000000005B90000.00000004.08000000.00040000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            78.159.112.29
            jacksonnnn233.theworkpc.comGermany
            28753LEASEWEB-DE-FRA-10DEtrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1502158
            Start date and time:2024-08-31 09:51:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 9m 54s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:14
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:new policy.scr.exe
            Detection:MAL
            Classification:mal100.troj.evad.winEXE@12/9@19/1
            EGA Information:
            • Successful, ratio: 85.7%
            HCA Information:
            • Successful, ratio: 87%
            • Number of executed functions: 533
            • Number of non-executed functions: 20
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Execution Graph export aborted for target airlineagancy.casacam.net 7076.exe, PID 7764 because it is empty
            • Not all processes where analyzed, report is missing behavior information
            • Report size exceeded maximum capacity and may have missing behavior information.
            • Report size exceeded maximum capacity and may have missing disassembly code.
            • Report size getting too big, too many NtDeviceIoControlFile calls found.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            03:52:17API Interceptor126524x Sleep call for process: new policy.scr.exe modified
            03:52:25API Interceptor13181923x Sleep call for process: airlineagancy.casacam.net 7076.exe modified
            08:52:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Networks! C:\Users\user\AppData\Roaming\Networks!.exe
            08:52:28AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Networks! C:\Users\user\AppData\Roaming\Networks!.exe
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            78.159.112.29Accelya NDC SPRK.scr.exeGet hashmaliciousNanocoreBrowse
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              LEASEWEB-DE-FRA-10DEAccelya NDC SPRK.scr.exeGet hashmaliciousNanocoreBrowse
              • 78.159.112.29
              http://tradingbotsreviews.comGet hashmaliciousUnknownBrowse
              • 217.20.112.104
              warmcookie.bin.dllGet hashmaliciousUnknownBrowse
              • 185.49.69.41
              https://auth-start-treizor.github.io/Get hashmaliciousUnknownBrowse
              • 217.20.112.104
              Endermanch@SecurityDefender.exeGet hashmaliciousBdaejecBrowse
              • 78.159.97.210
              counter.exeGet hashmaliciousBdaejecBrowse
              • 37.1.197.107
              https://amour-adventure.com/wdMpjN?x=ZGF2ZXByb3NlZWRAZ29uZHRjLmNvbQ==&y=z241147_947Get hashmaliciousUnknownBrowse
              • 178.162.199.80
              th7ywlKawL.exeGet hashmaliciousRemcosBrowse
              • 78.159.112.21
              Mille raisons de venir.scr.exeGet hashmaliciousNanocore, HVNCBrowse
              • 78.159.112.21
              92.249.48.47-skid.sh4-2024-07-20T09_04_17.elfGet hashmaliciousMirai, MoobotBrowse
              • 212.95.52.206
              No context
              No context
              Process:C:\Users\user\AppData\Roaming\Networks!.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1216
              Entropy (8bit):5.34331486778365
              Encrypted:false
              SSDEEP:24:MLUE4K5E4KH1qE4x84qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHxviYHKh3oPtHo6hAHKzea
              MD5:7B709BC412BEC5C3CFD861C041DAD408
              SHA1:532EA6BB3018AE3B51E7A5788F614A6C49252BCF
              SHA-256:733765A1599E02C53826A4AE984426862AA714D8B67F889607153888D40BBD75
              SHA-512:B35CFE36A1A40123FDC8A5E7C804096FF33F070F40CBA5812B98F46857F30BA2CE6F86E1B5D20F9B6D00D6A8194B8FA36C27A0208C7886512877058872277963
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):33280
              Entropy (8bit):5.5954216145255655
              Encrypted:false
              SSDEEP:768:oRPD9OQhx/BV3Tw4flzVFE9jCkOjhFba:od9OW/V3U4fnFE9jCkOjnG
              MD5:85992141E0054144793B0767444AA3E0
              SHA1:8DB16CF0596AA7B0794BF38397E8876F9CD7AC4D
              SHA-256:62138A28BE6583227C33E709D31064416B7009A8A66830229AA509832706FE42
              SHA-512:F0BF5714197B30DBD03C385B4E560695D5EA9FC18C268354C077F846701106E8D530A65C1A89B1096AA7F45232AC771603C58077BD2B603FB637F357BEDB4C6E
              Malicious:true
              Yara Hits:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, Author: ditekSHen
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................x............... ........@.. ....................................@.................................D...W.................................................................................... ............... ..H............text....w... ...x.................. ..`.rsrc................z..............@..@.reloc..............................@..B........................H.......,O...H............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:data
              Category:dropped
              Size (bytes):232
              Entropy (8bit):7.024371743172393
              Encrypted:false
              SSDEEP:6:X4LDAnybgCFcpJSQwP4d7ZrqJgTFwoaw+9XU4:X4LEnybgCFCtvd7ZrCgpwoaw+Z9
              MD5:32D0AAE13696FF7F8AF33B2D22451028
              SHA1:EF80C4E0DB2AE8EF288027C9D3518E6950B583A4
              SHA-256:5347661365E7AD2C1ACC27AB0D150FFA097D9246BB3626FCA06989E976E8DD29
              SHA-512:1D77FC13512C0DBC4EFD7A66ACB502481E4EFA0FB73D0C7D0942448A72B9B05BA1EA78DDF0BE966363C2E3122E0B631DB7630D044D08C1E1D32B9FB025C356A5
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:Gj.h\.3.A...5.x..&...i+..c(1.P..P.cLT...A.b........4h...t.+..Z\.. .i.....@.3..{...grv+V...B.......].P...W.4C}uL.....s~..F...}......E......E...6E.....{...{.yS...7..".hK.!.x.2..i..zJ... ....f..?._....0.:e[7w{1.!.4.....&.
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:Non-ISO extended-ASCII text, with no line terminators
              Category:dropped
              Size (bytes):8
              Entropy (8bit):3.0
              Encrypted:false
              SSDEEP:3:kz:kz
              MD5:D0FE400B78FCCFCF5716B4C1300F0B6D
              SHA1:3A9E1867C86317F65A617DA51341D1BCBD098B6B
              SHA-256:DC03C95366A7E598CF817C715D1F7D1D9E67F498915A51273C066A2F03F7136A
              SHA-512:7A007D13C744E30D8358CB766758525BDDFB4A9240429AFBD61A9A25AEEFC1011904A5ABC24EB3CD76D1B8A8CAD5624138444E9AA68E96E04297729439114DD2
              Malicious:true
              Reputation:low
              Preview:.7....H
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:data
              Category:dropped
              Size (bytes):24
              Entropy (8bit):4.501629167387823
              Encrypted:false
              SSDEEP:3:9bzY6oRDIvYk:RzWDI3
              MD5:ACD3FB4310417DC77FE06F15B0E353E6
              SHA1:80E7002E655EB5765FDEB21114295CB96AD9D5EB
              SHA-256:DC3AE604991C9BB8FF8BC4502AE3D0DB8A3317512C0F432490B103B89C1A4368
              SHA-512:DA46A917DB6276CD4528CFE4AD113292D873CA2EBE53414730F442B83502E5FAF3D1AE87BFA295ADF01E3B44FDBCE239E21A318BFB2CCD1F4753846CB21F6F97
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:9iH...}Z.4..f..J".C;"a
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:data
              Category:dropped
              Size (bytes):40
              Entropy (8bit):5.153055907333276
              Encrypted:false
              SSDEEP:3:9bzY6oRDT6P2bfVn1:RzWDT621
              MD5:4E5E92E2369688041CC82EF9650EDED2
              SHA1:15E44F2F3194EE232B44E9684163B6F66472C862
              SHA-256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48
              SHA-512:1B368018907A3BC30421FDA2C935B39DC9073B9B1248881E70AD48EDB6CAA256070C1A90B97B0F64BBE61E316DBB8D5B2EC8DBABCD0B0B2999AB50B933671ECB
              Malicious:false
              Preview:9iH...}Z.4..f.~a........~.~.......3.U.
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:data
              Category:dropped
              Size (bytes):312480
              Entropy (8bit):7.99946695108875
              Encrypted:true
              SSDEEP:6144:2WYGDIDE+GJclEi5KjQpbL17IzzKJxw2mEhmTvpyD0i:+kIQ+EcFKjObdIA3mEhuvpyDd
              MD5:34CC720BAB9A243A96B008251C4541CA
              SHA1:B275C34B63ECA934EE8DD536B18D753203FC171A
              SHA-256:A63EAF4AE6032C446FDBABB4753851121BB6C03A1CF11749962BF501FF70DEB2
              SHA-512:FC4310B2A4478D04F82A3A1B8C4370442222B8F95EE2AD005FA9F0A638A85EE7E53F00B69027F0338A5A5AC9E42E4C6A5E33716115855567367E2E71D13346E4
              Malicious:false
              Preview:.<.#..!.nt.........I..N#....sb.....Q..O.v.qS.......AK.0.....7].S..K.|`k......~a..,8..y.C+.3.Z......;LZ.............y.QR..V..-.{".G.....g..]...R<]C`....Fak..{.....?.ViXd.....@k(Z.D...\..c...j.l5){HT....3.....Z...L.}).sH....m.H..._.)...w.@F.X,l......h.....K.S..... ..*zi...{.:..y-.....Q.........E..~9......n`ts..Tt.@..x*5..$.zv..1..n)...M..)...,`.... ....`....._.....8=y...Ry...r0J.9.....]$..,<.F;..B>..(....,\..{.....{...A..u.......Q.a..$..<..bP. xo.h...[.Y.ng...:.2..r.>......_..h.O:#c.Z.$..\.j......Sb..8.......X...y.(.......W(...v....1"@N!A.8...d.RV..FmyYj.2....g.R..gaA."d..A..*..B2!.5./...u...c.cw..".p&5.A...%.........B.?3C......z.tKv....=|.c.....h..\2_....H.{[K..$...4.... .l..Q.=...e..2Y..]..:..>.....c]....q.+G..'.J.....~...$1..R..{..D...5.y$..^...!(..C.0.<(..N...\....FGEi....X.oX.@W....(..-..@.......D.{._p...\.6..zv...n$f:.....e...p..:&*..8$ ./k....>Sd......L,P.*<.c....ZK8C.B../'......O........Vz._0$......OZ
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):2360320
              Entropy (8bit):4.2077914013848465
              Encrypted:false
              SSDEEP:24576:RGvPRpFuolzFPJ+l3Drhea534ESvFpLa35sfp+ee:
              MD5:01E7E40055D24780359493DECF90AC21
              SHA1:B59B66A3AF3A9920B7DE22975997A1EC1E4D5528
              SHA-256:3A5134CC11C7C47B7268E7BF6BF1556C5FF5044AF54B7931CAE652BFD8D83717
              SHA-512:D6069F19CB7ACAFE771ABD095AC9DE17767F31DAD21951488DD91B56EEC65674033E7AAD25D038A4F1CD067E1E7FE91F1E8D9BFCF75C593209BEFE876AC9FFC1
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 55%
              • Antivirus: Virustotal, Detection: 56%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....f.................."...........#.. ... #...@.. .......................`$...........`...................................#.K.... #.d....................@$...................................................... ............... ..H............text.....".. ...."................. ..`.rsrc...d.... #.......".............@..@.reloc.......@$.......$.............@..B..................#.....H........G...6...........}..."..........................................*...(....*...(....*.s....(....*..{....*.0..K....... ........8........E............8....*..}.... ....~S...{0...9....& ....8......0...........(.... ....~S...{p...9....& ....8....8........E.... .......K...8.......s....(.... ........8....s....(...... ....~S...{....:....& ....8....*..0.......... ........8........E......../...+...;...................8............... ....~S...{@...:....& ....8......... .......o
              Process:C:\Users\user\Desktop\new policy.scr.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):4.2077914013848465
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              • Win32 Executable (generic) a (10002005/4) 49.78%
              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:new policy.scr.exe
              File size:2'360'320 bytes
              MD5:01e7e40055d24780359493decf90ac21
              SHA1:b59b66a3af3a9920b7de22975997a1ec1e4d5528
              SHA256:3a5134cc11c7c47b7268e7bf6bf1556c5ff5044af54b7931cae652bfd8d83717
              SHA512:d6069f19cb7acafe771abd095ac9de17767f31dad21951488dd91b56eec65674033e7aad25d038a4f1cd067e1e7fe91f1e8d9bfcf75c593209befe876ac9ffc1
              SSDEEP:24576:RGvPRpFuolzFPJ+l3Drhea534ESvFpLa35sfp+ee:
              TLSH:70B57DE4D46A48C1F8179DB05C3BBAC20E3237F3C9D50468272D7A48CFBB9997549E4A
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.................."...........#.. ... #...@.. .......................`$...........`................................
              Icon Hash:32ed8e8e8ca8acb2
              Entrypoint:0x630ede
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x66CFBED6 [Thu Aug 29 00:20:38 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [00402000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x230e900x4b.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2320000x10e64.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2440000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x20000x22eee40x22f00001c97e30088ab9d738a5f239b8eb4d41unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x2320000x10e640x1100065fb793b6106bbea1497e49dfd632335False0.05280618106617647DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 2.000000, slope 2.0143023.741046637865551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x2440000xc0x20025f7194bc7f7ab553d126e3d19fe202fFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x2321300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.04304684727315746
              RT_GROUP_ICON0x2429580x14data1.15
              RT_VERSION0x24296c0x30cdata0.42435897435897435
              RT_MANIFEST0x242c780x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
              DLLImport
              mscoree.dll_CorExeMain
              TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
              2024-08-31T09:52:51.945139+0200TCP2046914ET MALWARE NanoCore RAT CnC 715333865535192.168.2.478.159.112.29
              2024-08-31T09:52:51.945139+0200TCP2816718ETPRO MALWARE NanoCore RAT Keep-Alive Beacon15333865535192.168.2.478.159.112.29
              2024-08-31T09:52:51.945139+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915333865535192.168.2.478.159.112.29
              2024-08-31T09:52:52.225710+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15333865535192.168.2.478.159.112.29
              2024-08-31T09:53:10.373760+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334165535192.168.2.478.159.112.29
              2024-08-31T09:53:47.258163+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334965535192.168.2.478.159.112.29
              2024-08-31T09:53:04.358576+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334065535192.168.2.478.159.112.29
              2024-08-31T09:52:26.186842+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973665535192.168.2.478.159.112.29
              2024-08-31T09:52:26.186842+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973665535192.168.2.478.159.112.29
              2024-08-31T09:52:33.570041+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973865535192.168.2.478.159.112.29
              2024-08-31T09:52:33.570041+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973865535192.168.2.478.159.112.29
              2024-08-31T09:52:32.391052+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973865535192.168.2.478.159.112.29
              2024-08-31T09:53:10.085937+0200TCP2046914ET MALWARE NanoCore RAT CnC 715334165535192.168.2.478.159.112.29
              2024-08-31T09:53:10.085937+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915334165535192.168.2.478.159.112.29
              2024-08-31T09:52:32.583546+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973865535192.168.2.478.159.112.29
              2024-08-31T09:52:32.583546+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973865535192.168.2.478.159.112.29
              2024-08-31T09:52:45.898179+0200TCP2046914ET MALWARE NanoCore RAT CnC 715333765535192.168.2.478.159.112.29
              2024-08-31T09:52:45.898179+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915333765535192.168.2.478.159.112.29
              2024-08-31T09:53:37.309593+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334765535192.168.2.478.159.112.29
              2024-08-31T09:53:51.647127+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15335065535192.168.2.478.159.112.29
              2024-08-31T09:52:39.007469+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973965535192.168.2.478.159.112.29
              2024-08-31T09:52:40.488029+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973965535192.168.2.478.159.112.29
              2024-08-31T09:52:56.975054+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15333965535192.168.2.478.159.112.29
              2024-08-31T09:53:15.115651+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334365535192.168.2.478.159.112.29
              2024-08-31T09:53:09.084125+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334165535192.168.2.478.159.112.29
              2024-08-31T09:52:40.248701+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1497377076192.168.2.478.159.112.29
              2024-08-31T09:52:58.248252+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15333965535192.168.2.478.159.112.29
              2024-08-31T09:54:31.726853+0200TCP2853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1497377076192.168.2.478.159.112.29
              2024-08-31T09:53:21.268246+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334465535192.168.2.478.159.112.29
              2024-08-31T09:52:18.308341+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973265535192.168.2.478.159.112.29
              2024-08-31T09:53:09.089003+0200TCP2046914ET MALWARE NanoCore RAT CnC 715334165535192.168.2.478.159.112.29
              2024-08-31T09:53:09.089003+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915334165535192.168.2.478.159.112.29
              2024-08-31T09:52:33.707425+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973865535192.168.2.478.159.112.29
              2024-08-31T09:52:45.043283+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15333765535192.168.2.478.159.112.29
              2024-08-31T09:53:42.181451+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334865535192.168.2.478.159.112.29
              2024-08-31T09:53:22.732899+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334465535192.168.2.478.159.112.29
              2024-08-31T09:52:57.992081+0200TCP2046914ET MALWARE NanoCore RAT CnC 715333965535192.168.2.478.159.112.29
              2024-08-31T09:52:57.992081+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915333965535192.168.2.478.159.112.29
              2024-08-31T09:53:27.296509+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334565535192.168.2.478.159.112.29
              2024-08-31T09:52:50.934010+0200TCP2046914ET MALWARE NanoCore RAT CnC 715333865535192.168.2.478.159.112.29
              2024-08-31T09:52:50.934010+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915333865535192.168.2.478.159.112.29
              2024-08-31T09:53:16.431919+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334365535192.168.2.478.159.112.29
              2024-08-31T09:52:50.927566+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15333865535192.168.2.478.159.112.29
              2024-08-31T09:53:03.039239+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334065535192.168.2.478.159.112.29
              2024-08-31T09:53:22.567721+0200TCP2046909ET MALWARE NanoCore RAT Keepalive Response 11655355334478.159.112.29192.168.2.4
              2024-08-31T09:52:25.215778+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973665535192.168.2.478.159.112.29
              2024-08-31T09:53:42.226462+0200TCP2046914ET MALWARE NanoCore RAT CnC 715334865535192.168.2.478.159.112.29
              2024-08-31T09:53:42.226462+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915334865535192.168.2.478.159.112.29
              2024-08-31T09:52:27.203037+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973665535192.168.2.478.159.112.29
              2024-08-31T09:52:27.203037+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973665535192.168.2.478.159.112.29
              2024-08-31T09:53:04.054663+0200TCP2046914ET MALWARE NanoCore RAT CnC 715334065535192.168.2.478.159.112.29
              2024-08-31T09:53:04.054663+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915334065535192.168.2.478.159.112.29
              2024-08-31T09:52:20.056405+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973265535192.168.2.478.159.112.29
              2024-08-31T09:52:20.056405+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973265535192.168.2.478.159.112.29
              2024-08-31T09:52:26.924955+0200TCP2025019ET MALWARE Possible NanoCore C2 60B14973665535192.168.2.478.159.112.29
              2024-08-31T09:52:46.335004+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15333765535192.168.2.478.159.112.29
              2024-08-31T09:53:16.085785+0200TCP2046914ET MALWARE NanoCore RAT CnC 715334365535192.168.2.478.159.112.29
              2024-08-31T09:53:16.085785+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915334365535192.168.2.478.159.112.29
              2024-08-31T09:52:56.991962+0200TCP2046914ET MALWARE NanoCore RAT CnC 715333965535192.168.2.478.159.112.29
              2024-08-31T09:52:56.991962+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915333965535192.168.2.478.159.112.29
              2024-08-31T09:53:32.160686+0200TCP2025019ET MALWARE Possible NanoCore C2 60B15334665535192.168.2.478.159.112.29
              2024-08-31T09:52:19.054786+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973265535192.168.2.478.159.112.29
              2024-08-31T09:52:19.054786+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973265535192.168.2.478.159.112.29
              2024-08-31T09:52:39.835725+0200TCP2046914ET MALWARE NanoCore RAT CnC 714973965535192.168.2.478.159.112.29
              2024-08-31T09:52:39.835725+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1914973965535192.168.2.478.159.112.29
              2024-08-31T09:53:22.088477+0200TCP2046914ET MALWARE NanoCore RAT CnC 715334465535192.168.2.478.159.112.29
              2024-08-31T09:53:22.088477+0200TCP2822326ETPRO MALWARE NanoCore RAT CnC 1915334465535192.168.2.478.159.112.29
              TimestampSource PortDest PortSource IPDest IP
              Aug 31, 2024 09:52:18.295720100 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:18.300559044 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:18.300625086 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:18.308341026 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:18.313113928 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:18.936306953 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:18.939028025 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:18.943829060 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.054785967 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.069145918 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.122736931 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.129440069 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.134222031 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446891069 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446906090 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446916103 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446924925 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446934938 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446943998 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.446964025 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.447014093 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.539098978 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539113045 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539123058 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539132118 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539143085 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539269924 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.539269924 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.539477110 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539493084 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539504051 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539515018 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539525032 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.539526939 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.539556026 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.539580107 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.631566048 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631589890 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631602049 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631612062 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631623983 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631649017 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.631767035 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631778002 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631788015 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631798029 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631808996 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.631809950 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.631818056 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.631838083 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.631860971 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.632628918 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.632639885 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.632651091 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.632675886 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.632677078 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.632723093 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.718070984 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724169016 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724179983 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724189997 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724244118 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.724297047 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724308014 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724344015 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.724653959 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724663973 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724673033 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724705935 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.724853992 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.724895954 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.725063086 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725073099 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725121021 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.725193024 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725202084 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725213051 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725244045 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.725931883 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725941896 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.725980043 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.726062059 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.726073027 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.726083040 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.726093054 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.726095915 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.726121902 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.772910118 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.803436995 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815681934 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815692902 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815725088 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815743923 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.815778017 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.815809965 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815819979 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815829992 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815839052 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815850019 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.815851927 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.815886974 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.816700935 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.816711903 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.816720009 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.816735029 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.816740036 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.816745996 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.816760063 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.816761017 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.816787004 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.817615986 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.817648888 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.817660093 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.817686081 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.817702055 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.817706108 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.817713022 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.817727089 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.817743063 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.818706036 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.818826914 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.818836927 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.818893909 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.818921089 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.818931103 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.818938971 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.818973064 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.819494963 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.819504023 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.819511890 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.819521904 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.819539070 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.819567919 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.907711029 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.907725096 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.907736063 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.907788038 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.907819033 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.907835960 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.907845974 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.907963991 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.907963991 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.908235073 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.908245087 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.908255100 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.908273935 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.908282042 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.908284903 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.908294916 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.908322096 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.908353090 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.909339905 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.909352064 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.909389019 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.909480095 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.909491062 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.909499884 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.909512043 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.909522057 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.909569025 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.910131931 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.910142899 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.910152912 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.910177946 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.910185099 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.910196066 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.910206079 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.910223007 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.910257101 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.911079884 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.911092043 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.911102057 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.911112070 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.911122084 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.911123037 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.911134005 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.911153078 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.911181927 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.912050009 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912060976 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912071943 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912106991 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.912201881 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912213087 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912224054 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912245989 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.912262917 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.912863016 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912873983 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912884951 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912895918 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:19.912914038 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:19.912944078 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.000422955 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000437021 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000447989 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000461102 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000472069 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000488997 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000493050 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.000499964 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000511885 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000526905 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.000541925 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000544071 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.000552893 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000562906 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000574112 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000585079 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.000598907 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.000617027 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001508951 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001521111 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001530886 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001543045 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001554012 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001564026 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001574039 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001574993 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001583099 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001588106 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001599073 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001604080 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001616001 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001647949 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001828909 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001840115 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001857042 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001866102 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001869917 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001883984 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001894951 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001904964 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001909971 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001915932 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001923084 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.001928091 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.001952887 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.002743959 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002782106 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.002929926 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002940893 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002949953 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002959013 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002969027 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002973080 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.002979040 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002990007 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.002991915 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.003016949 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.003076077 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.003086090 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.003096104 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.003122091 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.003139019 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.004180908 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004192114 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004201889 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004216909 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004226923 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004228115 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.004237890 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004250050 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.004275084 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.004375935 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004385948 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004396915 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004406929 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004419088 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.004420996 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004443884 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.004528999 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.004566908 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.056405067 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.061399937 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164307117 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164328098 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164338112 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164347887 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164383888 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164392948 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164402962 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164407015 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164413929 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164441109 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164450884 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164515018 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164525032 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164534092 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164560080 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164581060 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164592028 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164617062 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164846897 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164882898 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164891005 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164901018 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164920092 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164930105 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164932013 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.164938927 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.164958000 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165087938 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165103912 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165112972 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165143013 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165164948 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165184975 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165194035 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165201902 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165213108 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165226936 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165252924 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165513039 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165523052 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165530920 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165565014 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165606976 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165616989 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165625095 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165633917 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165646076 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165657997 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.165910006 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165955067 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165965080 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.165991068 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166007996 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166102886 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166114092 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166122913 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166137934 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166148901 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166150093 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166160107 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166169882 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166176081 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166184902 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166193008 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166196108 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166203976 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166217089 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166220903 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166225910 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166238070 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166243076 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166268110 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166856050 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166866064 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166874886 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166893959 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166915894 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.166934967 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166944981 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166954041 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166965008 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.166980028 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.167000055 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.167001009 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.167009115 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.167054892 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.169326067 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169339895 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169348955 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169358015 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169367075 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169378996 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.169411898 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.169440031 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169476986 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.169481993 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169491053 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169548988 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169559002 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169569016 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169578075 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169584036 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.169589043 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.169605017 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.169615984 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.215240955 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.256864071 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256885052 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256894112 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256906033 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256916046 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256926060 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256941080 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256951094 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256961107 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256969929 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256975889 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256980896 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256989956 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.256989002 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257005930 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257015944 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257025003 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257036924 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257046938 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257062912 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257087946 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257157087 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257191896 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257200956 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257239103 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257261992 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257272005 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257280111 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257291079 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257309914 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257318974 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257334948 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257344007 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257353067 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257368088 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257375956 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257379055 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257401943 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257410049 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257514954 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257525921 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257534027 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257544994 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257549047 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257555962 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257576942 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257631063 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257642984 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257652044 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257662058 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257673025 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257673025 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257692099 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257725000 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257774115 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257812977 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257822037 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257848978 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257867098 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257877111 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257886887 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:20.257904053 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.257920027 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.975328922 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:20.980074883 CEST655354973278.159.112.29192.168.2.4
              Aug 31, 2024 09:52:21.072660923 CEST4973265535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.210504055 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.215338945 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:25.215403080 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.215778112 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.220608950 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:25.716183901 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.721143007 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:25.721235037 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.853298903 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:25.853488922 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.858282089 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:25.891506910 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:25.896406889 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.038717031 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.041868925 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.046674013 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.186841965 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.191704035 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.360539913 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.413562059 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.490448952 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.538568974 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.769747019 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.774693966 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.776438951 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.781282902 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.781354904 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.786173105 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:26.924954891 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:26.930969954 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:27.106193066 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:27.108320951 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:27.113650084 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:27.197735071 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:27.198230982 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:27.202986002 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:27.203037024 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:27.207832098 CEST655354973678.159.112.29192.168.2.4
              Aug 31, 2024 09:52:28.200943947 CEST4973665535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:32.378439903 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:32.383424044 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:32.383533955 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:32.391052008 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:32.395906925 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:32.583545923 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:32.588649988 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.039383888 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.039551020 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.044374943 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.223654985 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.226500988 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.232192993 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.548161983 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.570040941 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.575081110 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.575737953 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.580549955 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.695719957 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.696146011 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.701096058 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.701155901 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.705981970 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.707425117 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:33.712251902 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.880212069 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:33.929219961 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:34.011897087 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:34.054263115 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:34.531400919 CEST655354973878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:34.585467100 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:34.586519957 CEST4973865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.002185106 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.007024050 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:39.007112026 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.007468939 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.012197018 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:39.658149004 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:39.658576012 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.663412094 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:39.835725069 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.840540886 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:39.841965914 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:39.845040083 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:39.891669989 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.248701096 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.253528118 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.346849918 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.383168936 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.387995005 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.433223963 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.476139069 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.477128983 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.477654934 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.482428074 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.482479095 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.487256050 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.488029003 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.495934010 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.715444088 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.757373095 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.851408958 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:40.855169058 CEST655354973978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:40.855247021 CEST4973965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.038146019 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.042943001 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:45.043008089 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.043282986 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.048019886 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:45.675018072 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:45.675266981 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.680064917 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:45.859249115 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:45.861777067 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.866585970 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:45.898179054 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:45.902951956 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.173114061 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.202903986 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:46.207695007 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.294456959 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.294866085 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:46.299642086 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.299699068 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:46.304425001 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.335004091 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:46.339823008 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.528786898 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.569936991 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:46.664597988 CEST655355333778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:46.710566044 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:46.898282051 CEST5333765535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:50.922414064 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:50.927202940 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:50.927272081 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:50.927566051 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:50.933954000 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:50.934010029 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:50.938762903 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:51.564486027 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:51.564683914 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:51.569423914 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:51.748286963 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:51.751563072 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:51.756382942 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:51.945138931 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:51.950026035 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.063380957 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.116785049 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.190634012 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.203464031 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.208621025 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.208677053 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.213495016 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.215959072 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.220809937 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.225709915 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.230457067 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.428652048 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.476164103 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.528836966 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.569906950 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.667411089 CEST655355333878.159.112.29192.168.2.4
              Aug 31, 2024 09:52:52.710530996 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:52.955326080 CEST5333865535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:54.601869106 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:54.606718063 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:54.787331104 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:52:54.835532904 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:52:56.969892979 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:56.974716902 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:56.974795103 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:56.975054026 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:56.979836941 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:56.991961956 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:56.996803045 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:57.617083073 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:57.617244005 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:57.621987104 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:57.800229073 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:57.802867889 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:57.807630062 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:57.992080927 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:57.996925116 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.115947962 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.142990112 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:58.147797108 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.236548901 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.236912012 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:58.241672039 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.241750956 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:58.246541023 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.248251915 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:58.253030062 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.464989901 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.507448912 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:58.602639914 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.648062944 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:58.892152071 CEST655355333978.159.112.29192.168.2.4
              Aug 31, 2024 09:52:58.944931984 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:52:59.007618904 CEST5333965535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:03.032804012 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:03.038881063 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:03.038948059 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:03.039238930 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:03.044104099 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:03.705502033 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:03.705724001 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:03.710656881 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:03.896450043 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:03.898984909 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:03.903755903 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.054662943 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:04.059636116 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.225408077 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.247981071 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:04.252744913 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.345386982 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.346951962 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:04.351677895 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.351751089 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:04.356584072 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.358576059 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:04.363380909 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.582112074 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.632451057 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:04.720169067 CEST655355334078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:04.773097038 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:05.057404041 CEST5334065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:08.960829020 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:08.965795994 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.079003096 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.083771944 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.083853006 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.084125042 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.088958025 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.089003086 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.093759060 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.143172979 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.194993973 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.716094971 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.716301918 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.721149921 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.908010960 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:09.911154985 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:09.916009903 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.085937023 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:10.090816021 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.241785049 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.272133112 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:10.276932001 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.363217115 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.363605022 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:10.368632078 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.368707895 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:10.373687983 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.373759985 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:10.378652096 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.606817007 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.648092985 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:10.744741917 CEST655355334178.159.112.29192.168.2.4
              Aug 31, 2024 09:53:10.788712978 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:11.085845947 CEST5334165535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:15.110481977 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:15.115279913 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:15.115346909 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:15.115650892 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:15.120394945 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:15.765471935 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:15.783642054 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:15.788597107 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:15.969280005 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:15.971913099 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:15.976680994 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.085784912 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:16.090646029 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.286412001 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.314551115 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:16.319345951 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.410149097 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.410656929 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:16.415465117 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.415539026 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:16.420370102 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.431919098 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:16.436712027 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.623951912 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.679361105 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:16.760422945 CEST655355334378.159.112.29192.168.2.4
              Aug 31, 2024 09:53:16.804398060 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:17.085793018 CEST5334365535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:21.260304928 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:21.267318010 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:21.267891884 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:21.268245935 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:21.273025990 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:21.922303915 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:21.922621965 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:21.927625895 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.088476896 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.093346119 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.111291885 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.124924898 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.171658039 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.558819056 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.567720890 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.594804049 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.599569082 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.616894960 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.700059891 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.704977989 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.709748983 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.709822893 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.714709044 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.732898951 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:22.739748955 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.939995050 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:22.991906881 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:23.076085091 CEST655355334478.159.112.29192.168.2.4
              Aug 31, 2024 09:53:23.101496935 CEST5334465535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:23.320544958 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:23.325331926 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:23.506921053 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:23.554393053 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:27.291125059 CEST5334565535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:27.296082020 CEST655355334578.159.112.29192.168.2.4
              Aug 31, 2024 09:53:27.296139956 CEST5334565535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:27.296509027 CEST5334565535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:27.301296949 CEST655355334578.159.112.29192.168.2.4
              Aug 31, 2024 09:53:27.928344965 CEST655355334578.159.112.29192.168.2.4
              Aug 31, 2024 09:53:27.928549051 CEST5334565535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:27.933737040 CEST655355334578.159.112.29192.168.2.4
              Aug 31, 2024 09:53:28.112282991 CEST655355334578.159.112.29192.168.2.4
              Aug 31, 2024 09:53:28.117340088 CEST5334565535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:29.305171013 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:29.310151100 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:29.489737988 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:29.538772106 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:32.149652004 CEST5334665535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:32.154474974 CEST655355334678.159.112.29192.168.2.4
              Aug 31, 2024 09:53:32.160686016 CEST5334665535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:32.160686016 CEST5334665535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:32.165425062 CEST655355334678.159.112.29192.168.2.4
              Aug 31, 2024 09:53:32.797415018 CEST655355334678.159.112.29192.168.2.4
              Aug 31, 2024 09:53:32.805650949 CEST5334665535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:32.810563087 CEST655355334678.159.112.29192.168.2.4
              Aug 31, 2024 09:53:32.989705086 CEST655355334678.159.112.29192.168.2.4
              Aug 31, 2024 09:53:33.014484882 CEST5334665535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:33.019272089 CEST655355334678.159.112.29192.168.2.4
              Aug 31, 2024 09:53:33.132658005 CEST5334665535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:37.303704023 CEST5334765535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:37.309113026 CEST655355334778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:37.309169054 CEST5334765535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:37.309592962 CEST5334765535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:37.314452887 CEST655355334778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:37.970892906 CEST655355334778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:37.980782032 CEST5334765535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:37.985707998 CEST655355334778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:38.152574062 CEST5334765535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:38.335891962 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:38.536612034 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:38.715931892 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:38.758644104 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:42.176156044 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:42.181046963 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:42.181225061 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:42.181451082 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:42.186229944 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:42.226461887 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:42.232521057 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:42.820636034 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:42.820846081 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:42.825771093 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:43.005295038 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:43.021138906 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:43.026145935 CEST655355334878.159.112.29192.168.2.4
              Aug 31, 2024 09:53:43.226828098 CEST5334865535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:46.055495024 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:46.060436010 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:46.238903999 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:46.288933039 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:46.639394999 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:46.644256115 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:46.824336052 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:46.867098093 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:47.252696991 CEST5334965535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:47.257721901 CEST655355334978.159.112.29192.168.2.4
              Aug 31, 2024 09:53:47.257783890 CEST5334965535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:47.258162975 CEST5334965535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:47.262933969 CEST655355334978.159.112.29192.168.2.4
              Aug 31, 2024 09:53:47.617110014 CEST5334965535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:51.641872883 CEST5335065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:51.646713972 CEST655355335078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:51.646770954 CEST5335065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:51.647126913 CEST5335065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:51.651935101 CEST655355335078.159.112.29192.168.2.4
              Aug 31, 2024 09:53:51.774868011 CEST5335065535192.168.2.478.159.112.29
              Aug 31, 2024 09:53:52.441687107 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:52.526694059 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:55.929841042 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:53:55.935877085 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:56.112382889 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:53:56.226363897 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:05.351692915 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:05.356543064 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:05.533961058 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:05.726417065 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:08.101659060 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:08.106570005 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:08.284149885 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:08.337385893 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:11.179956913 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:11.184855938 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:11.362464905 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:11.413913965 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.477072954 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.482028961 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.523536921 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.528340101 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.601710081 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.606540918 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.617327929 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.622294903 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.633023977 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.637768984 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.661955118 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.710808039 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.752512932 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.804557085 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.843082905 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:21.898308992 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:21.976443052 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:22.023319006 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:22.429976940 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:22.478761911 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:28.023581028 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:28.071927071 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:28.207813978 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:28.258786917 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:31.182801008 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:31.187817097 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:31.368927956 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:31.414012909 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:31.726852894 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:31.731889963 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:31.758014917 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:31.762806892 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:31.915277004 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:31.960957050 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:32.000063896 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:32.054603100 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:44.070688009 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:44.075721979 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:44.253707886 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:44.304642916 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:50.070552111 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:50.075488091 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:50.253385067 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:50.306849003 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:52.435691118 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:52.476558924 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:59.351835012 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:54:59.356760025 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:59.534565926 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:54:59.585942030 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:01.820652962 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:01.826035976 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:02.003832102 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:02.054722071 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:05.148660898 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:05.153547049 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:05.331584930 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:05.382824898 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:08.258138895 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:08.262963057 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:08.440885067 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:08.494904995 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:15.930744886 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:15.935635090 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:16.114200115 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:16.164148092 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:22.429325104 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:22.476985931 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:30.365000010 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:30.369884014 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:30.550437927 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:30.601701021 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.492613077 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.497591019 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.508223057 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.513290882 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.555023909 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.559909105 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.570647001 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.575453043 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.586321115 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.591165066 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.601928949 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.606829882 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.617501974 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.622396946 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.664473057 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.669325113 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.675507069 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.695646048 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.756067038 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.765970945 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.805054903 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.809886932 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.851897955 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.856698036 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.867574930 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.872412920 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.883112907 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.887881041 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.896858931 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.945632935 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:39.959300995 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:39.961261034 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:40.008346081 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:40.038901091 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:40.166600943 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:40.166678905 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:40.253318071 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:40.352998018 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:40.356996059 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:52.430850029 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:52.573029041 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:54.323435068 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:54.328589916 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:54.507071018 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:54.683024883 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:55.461396933 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:55.466404915 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:55.476990938 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:55.484859943 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:55.492625952 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:55.497427940 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:55.645296097 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:55.735094070 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:55.735146046 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:55.852155924 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:55.857065916 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:55.869587898 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:56.034908056 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:55:56.034955978 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:59.914634943 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:55:59.959903955 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:56:00.101447105 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:56:00.179877043 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:56:01.695789099 CEST497377076192.168.2.478.159.112.29
              Aug 31, 2024 09:56:01.700748920 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:56:01.878799915 CEST70764973778.159.112.29192.168.2.4
              Aug 31, 2024 09:56:01.976875067 CEST497377076192.168.2.478.159.112.29
              TimestampSource PortDest PortSource IPDest IP
              Aug 31, 2024 09:52:18.122430086 CEST5497853192.168.2.48.8.8.8
              Aug 31, 2024 09:52:18.289823055 CEST53549788.8.8.8192.168.2.4
              Aug 31, 2024 09:52:25.086874962 CEST5540953192.168.2.48.8.8.8
              Aug 31, 2024 09:52:25.209759951 CEST53554098.8.8.8192.168.2.4
              Aug 31, 2024 09:52:25.577610970 CEST5891353192.168.2.41.1.1.1
              Aug 31, 2024 09:52:25.703269958 CEST53589131.1.1.1192.168.2.4
              Aug 31, 2024 09:52:32.212369919 CEST6168053192.168.2.48.8.8.8
              Aug 31, 2024 09:52:32.371953964 CEST53616808.8.8.8192.168.2.4
              Aug 31, 2024 09:52:38.826383114 CEST5557553192.168.2.48.8.8.8
              Aug 31, 2024 09:52:38.989593983 CEST53555758.8.8.8192.168.2.4
              Aug 31, 2024 09:52:39.126861095 CEST5352027162.159.36.2192.168.2.4
              Aug 31, 2024 09:52:39.611970901 CEST5729053192.168.2.41.1.1.1
              Aug 31, 2024 09:52:39.619112015 CEST53572901.1.1.1192.168.2.4
              Aug 31, 2024 09:52:44.869402885 CEST6161953192.168.2.48.8.8.8
              Aug 31, 2024 09:52:45.037497997 CEST53616198.8.8.8192.168.2.4
              Aug 31, 2024 09:52:50.915261984 CEST5305653192.168.2.48.8.8.8
              Aug 31, 2024 09:52:50.921895027 CEST53530568.8.8.8192.168.2.4
              Aug 31, 2024 09:52:56.962366104 CEST6148253192.168.2.48.8.8.8
              Aug 31, 2024 09:52:56.969266891 CEST53614828.8.8.8192.168.2.4
              Aug 31, 2024 09:53:03.024585009 CEST5155953192.168.2.48.8.8.8
              Aug 31, 2024 09:53:03.032295942 CEST53515598.8.8.8192.168.2.4
              Aug 31, 2024 09:53:09.071680069 CEST6181253192.168.2.48.8.8.8
              Aug 31, 2024 09:53:09.078522921 CEST53618128.8.8.8192.168.2.4
              Aug 31, 2024 09:53:15.103027105 CEST6526553192.168.2.48.8.8.8
              Aug 31, 2024 09:53:15.109904051 CEST53652658.8.8.8192.168.2.4
              Aug 31, 2024 09:53:21.103384018 CEST5238853192.168.2.48.8.8.8
              Aug 31, 2024 09:53:21.256489038 CEST53523888.8.8.8192.168.2.4
              Aug 31, 2024 09:53:27.118714094 CEST5167353192.168.2.48.8.8.8
              Aug 31, 2024 09:53:27.290493011 CEST53516738.8.8.8192.168.2.4
              Aug 31, 2024 09:53:32.134634972 CEST6038553192.168.2.48.8.8.8
              Aug 31, 2024 09:53:32.141691923 CEST53603858.8.8.8192.168.2.4
              Aug 31, 2024 09:53:37.153480053 CEST5906853192.168.2.48.8.8.8
              Aug 31, 2024 09:53:37.303102016 CEST53590688.8.8.8192.168.2.4
              Aug 31, 2024 09:53:42.168418884 CEST5565353192.168.2.48.8.8.8
              Aug 31, 2024 09:53:42.175571918 CEST53556538.8.8.8192.168.2.4
              Aug 31, 2024 09:53:47.244908094 CEST5832053192.168.2.48.8.8.8
              Aug 31, 2024 09:53:47.252072096 CEST53583208.8.8.8192.168.2.4
              Aug 31, 2024 09:53:51.634251118 CEST5078253192.168.2.48.8.8.8
              Aug 31, 2024 09:53:51.641166925 CEST53507828.8.8.8192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Aug 31, 2024 09:52:18.122430086 CEST192.168.2.48.8.8.80xd784Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:25.086874962 CEST192.168.2.48.8.8.80xec5eStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:25.577610970 CEST192.168.2.41.1.1.10xe9baStandard query (0)airlineagancy.casacam.netA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:32.212369919 CEST192.168.2.48.8.8.80x6662Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:38.826383114 CEST192.168.2.48.8.8.80xbf7bStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:39.611970901 CEST192.168.2.41.1.1.10x4494Standard query (0)56.126.166.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
              Aug 31, 2024 09:52:44.869402885 CEST192.168.2.48.8.8.80x5c33Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:50.915261984 CEST192.168.2.48.8.8.80x5590Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:56.962366104 CEST192.168.2.48.8.8.80xd463Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:03.024585009 CEST192.168.2.48.8.8.80xe028Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:09.071680069 CEST192.168.2.48.8.8.80x179Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:15.103027105 CEST192.168.2.48.8.8.80xe914Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:21.103384018 CEST192.168.2.48.8.8.80x465aStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:27.118714094 CEST192.168.2.48.8.8.80x9986Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:32.134634972 CEST192.168.2.48.8.8.80xdc2bStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:37.153480053 CEST192.168.2.48.8.8.80x7d46Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:42.168418884 CEST192.168.2.48.8.8.80xdde1Standard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:47.244908094 CEST192.168.2.48.8.8.80xac5aStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:51.634251118 CEST192.168.2.48.8.8.80x243dStandard query (0)jacksonnnn233.theworkpc.comA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Aug 31, 2024 09:52:18.289823055 CEST8.8.8.8192.168.2.40xd784No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:25.209759951 CEST8.8.8.8192.168.2.40xec5eNo error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:25.703269958 CEST1.1.1.1192.168.2.40xe9baNo error (0)airlineagancy.casacam.net78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:32.371953964 CEST8.8.8.8192.168.2.40x6662No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:38.989593983 CEST8.8.8.8192.168.2.40xbf7bNo error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:39.619112015 CEST1.1.1.1192.168.2.40x4494Name error (3)56.126.166.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
              Aug 31, 2024 09:52:45.037497997 CEST8.8.8.8192.168.2.40x5c33No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:50.921895027 CEST8.8.8.8192.168.2.40x5590No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:52:56.969266891 CEST8.8.8.8192.168.2.40xd463No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:03.032295942 CEST8.8.8.8192.168.2.40xe028No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:09.078522921 CEST8.8.8.8192.168.2.40x179No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:15.109904051 CEST8.8.8.8192.168.2.40xe914No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:21.256489038 CEST8.8.8.8192.168.2.40x465aNo error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:27.290493011 CEST8.8.8.8192.168.2.40x9986No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:32.141691923 CEST8.8.8.8192.168.2.40xdc2bNo error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:37.303102016 CEST8.8.8.8192.168.2.40x7d46No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:42.175571918 CEST8.8.8.8192.168.2.40xdde1No error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:47.252072096 CEST8.8.8.8192.168.2.40xac5aNo error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false
              Aug 31, 2024 09:53:51.641166925 CEST8.8.8.8192.168.2.40x243dNo error (0)jacksonnnn233.theworkpc.com78.159.112.29A (IP address)IN (0x0001)false

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:03:51:54
              Start date:31/08/2024
              Path:C:\Users\user\Desktop\new policy.scr.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\new policy.scr.exe"
              Imagebase:0x760000
              File size:2'360'320 bytes
              MD5 hash:01E7E40055D24780359493DECF90AC21
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000000.00000002.1877031081.000000000428C000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1884977634.0000000005AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1869683888.000000000322A000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1869683888.0000000002F81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.1877031081.00000000049E0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000000.00000002.1877031081.000000000438C000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:low
              Has exited:true

              Target ID:2
              Start time:03:52:15
              Start date:31/08/2024
              Path:C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe"
              Imagebase:0x280000
              File size:33'280 bytes
              MD5 hash:85992141E0054144793B0767444AA3E0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000000.1859765201.0000000000282000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000000.1859765201.0000000000282000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\airlineagancy.casacam.net 7076.exe, Author: ditekSHen
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              Reputation:low
              Has exited:false

              Target ID:3
              Start time:03:52:16
              Start date:31/08/2024
              Path:C:\Users\user\Desktop\new policy.scr.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\new policy.scr.exe"
              Imagebase:0xc40000
              File size:2'360'320 bytes
              MD5 hash:01E7E40055D24780359493DECF90AC21
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2867271024.0000000007760000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2867912424.00000000077B0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.2852023359.00000000044EE000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2868662775.0000000007920000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2866783271.0000000007720000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2858338720.0000000005980000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2869659382.0000000007930000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2866874996.0000000007730000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2852023359.00000000043F3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000003.00000002.2835253359.0000000003201000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2868258629.00000000077D0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2867384377.0000000007770000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2858583023.00000000059E0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2867825853.00000000077A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2867712717.0000000007790000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2870061029.0000000007950000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
              • Rule: Nanocore_RAT_Gen_2, Description: Detetcs the Nanocore RAT, Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
              • Rule: MALWARE_Win_NanoCore, Description: Detects NanoCore, Source: 00000003.00000002.2870782033.0000000007980000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:true

              Target ID:6
              Start time:03:52:28
              Start date:31/08/2024
              Path:C:\Users\user\AppData\Roaming\Networks!.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Roaming\Networks!.exe"
              Imagebase:0x7a0000
              File size:2'360'320 bytes
              MD5 hash:01E7E40055D24780359493DECF90AC21
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000006.00000002.2239294193.0000000006173000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000006.00000002.2239294193.000000000607A000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.2215379715.0000000002CC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.2232333043.0000000004A59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 55%, ReversingLabs
              • Detection: 56%, Virustotal, Browse
              Reputation:low
              Has exited:true

              Target ID:7
              Start time:03:52:37
              Start date:31/08/2024
              Path:C:\Users\user\AppData\Roaming\Networks!.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Roaming\Networks!.exe"
              Imagebase:0x350000
              File size:2'360'320 bytes
              MD5 hash:01E7E40055D24780359493DECF90AC21
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.2303284343.000000000297D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000007.00000002.2324492421.0000000004679000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000007.00000002.2327789577.0000000005D23000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:low
              Has exited:true

              Target ID:8
              Start time:03:52:51
              Start date:31/08/2024
              Path:C:\Users\user\AppData\Roaming\Networks!.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Roaming\Networks!.exe"
              Imagebase:0xa0000
              File size:2'360'320 bytes
              MD5 hash:01E7E40055D24780359493DECF90AC21
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2274074926.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              • Rule: Nanocore, Description: detect Nanocore in memory, Source: 00000008.00000002.2271006345.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_Nanocore, Description: Yara detected Nanocore RAT, Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: NanoCore, Description: unknown, Source: 00000008.00000002.2274766919.00000000036F9000.00000004.00000800.00020000.00000000.sdmp, Author: Kevin Breen <kevin@techanarchy.net>
              Reputation:low
              Has exited:true

              Target ID:9
              Start time:03:52:59
              Start date:31/08/2024
              Path:C:\Users\user\AppData\Roaming\Networks!.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\AppData\Roaming\Networks!.exe"
              Imagebase:0x940000
              File size:2'360'320 bytes
              MD5 hash:01E7E40055D24780359493DECF90AC21
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Nanocore_d8c4e3c5, Description: unknown, Source: 00000009.00000002.2363417540.0000000003E7B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:13
              Start time:03:53:52
              Start date:31/08/2024
              Path:C:\Windows\SysWOW64\WerFault.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7784 -s 1336
              Imagebase:0x9b0000
              File size:483'680 bytes
              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:10.4%
                Dynamic/Decrypted Code Coverage:91%
                Signature Coverage:9%
                Total number of Nodes:67
                Total number of Limit Nodes:4
                execution_graph 48264 5c0ef00 48265 5c0ef44 VirtualAlloc 48264->48265 48267 5c0efb1 48265->48267 48182 5d5fbd0 48183 5d5fc19 NtResumeThread 48182->48183 48185 5d5fc70 48183->48185 48190 5d5ef40 48192 5d5efc0 CreateProcessA 48190->48192 48193 5d5f1bc 48192->48193 48194 109d01c 48195 109d034 48194->48195 48196 109d08f 48195->48196 48198 5c0e420 48195->48198 48199 5c0e479 48198->48199 48202 5c0e9b0 48199->48202 48200 5c0e4ae 48203 5c0e9dd 48202->48203 48206 5c0eb73 48203->48206 48207 5c0d438 48203->48207 48206->48200 48209 5c0d45f 48207->48209 48211 5c0d938 48209->48211 48212 5c0d981 VirtualProtect 48211->48212 48214 5c0d51c 48212->48214 48214->48200 48248 5d5e6e0 48249 5d5e72f NtProtectVirtualMemory 48248->48249 48251 5d5e7a7 48249->48251 48252 13d6a88 48253 13d6aa5 48252->48253 48254 13d6ab5 48253->48254 48257 5c008fe 48253->48257 48260 5c03a77 48253->48260 48259 5c0d438 VirtualProtect 48257->48259 48258 5c001eb 48259->48258 48261 5c03a96 48260->48261 48263 5c0d438 VirtualProtect 48261->48263 48262 5c03ac1 48263->48262 48186 5d5f858 48187 5d5f89c VirtualAllocEx 48186->48187 48189 5d5f914 48187->48189 48215 5d57548 48216 5d5755d 48215->48216 48221 5d5780f 48216->48221 48226 5d5757b 48216->48226 48231 5d57588 48216->48231 48217 5d57573 48222 5d575e2 48221->48222 48223 5d575f1 48222->48223 48236 5d5b600 48222->48236 48240 5d5b5f8 48222->48240 48223->48217 48228 5d57588 48226->48228 48227 5d575f1 48227->48217 48228->48227 48229 5d5b600 SleepEx 48228->48229 48230 5d5b5f8 SleepEx 48228->48230 48229->48228 48230->48228 48233 5d575b2 48231->48233 48232 5d575f1 48232->48217 48233->48232 48234 5d5b600 SleepEx 48233->48234 48235 5d5b5f8 SleepEx 48233->48235 48234->48233 48235->48233 48237 5d5b644 SleepEx 48236->48237 48239 5d5b6a4 48237->48239 48239->48222 48241 5d5b600 SleepEx 48240->48241 48243 5d5b6a4 48241->48243 48243->48222 48244 5d5f2f8 48245 5d5f341 Wow64SetThreadContext 48244->48245 48247 5d5f3b9 48245->48247 48268 5d5f9b8 48269 5d5fa04 WriteProcessMemory 48268->48269 48271 5d5fa9d 48269->48271
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: ,bq$4$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                • API String ID: 0-312445597
                • Opcode ID: d4268e9f85acb34151ccde302d72bd8840bc1f52a018fe41a57a9a1cc4b8bd2b
                • Instruction ID: 18941ba360bcd650f50ad38bb6c79dff966a99944b96c5c8a23f4c50c2fa2ba0
                • Opcode Fuzzy Hash: d4268e9f85acb34151ccde302d72bd8840bc1f52a018fe41a57a9a1cc4b8bd2b
                • Instruction Fuzzy Hash: 00B2F734A002189FDB14DFA8C894BADB7F6FB88700F158599E605AB3A5CB71ED85CF50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: ,bq$4$$^q$$^q$$^q$$^q
                • API String ID: 0-2546334966
                • Opcode ID: 45878c577fb2d5b91e3e944120aa0e28c0f16aa6429ded9d3ec8ca6bbbcea1b6
                • Instruction ID: 225b60a26dfaf3663643fa3df01a45d3d8ca1ea36fde282be8280a15412626e3
                • Opcode Fuzzy Hash: 45878c577fb2d5b91e3e944120aa0e28c0f16aa6429ded9d3ec8ca6bbbcea1b6
                • Instruction Fuzzy Hash: 1322E734A00219DFDB24DFA4C994BA9B7B2FF48700F1485A9E609AB395DB30AD85CF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 696 13db178-13db199 697 13db19b 696->697 698 13db1a0-13db287 696->698 697->698 700 13db28d-13db3ce call 13d7210 698->700 701 13db989-13db9b1 698->701 747 13db3d4-13db42f 700->747 748 13db952-13db97c 700->748 704 13dc0b7-13dc0c0 701->704 706 13db9bf-13db9c9 704->706 707 13dc0c6-13dc0dd 704->707 708 13db9cb 706->708 709 13db9d0-13dbac4 call 13d7210 706->709 708->709 730 13dbaee 709->730 731 13dbac6-13dbad2 709->731 732 13dbaf4-13dbb14 730->732 733 13dbadc-13dbae2 731->733 734 13dbad4-13dbada 731->734 738 13dbb74-13dbbf4 732->738 739 13dbb16-13dbb6f 732->739 735 13dbaec 733->735 734->735 735->732 761 13dbc4b-13dbc8e call 13d7210 738->761 762 13dbbf6-13dbc49 738->762 753 13dc0b4 739->753 755 13db434-13db43f 747->755 756 13db431 747->756 758 13db97e 748->758 759 13db986 748->759 753->704 760 13db867-13db86d 755->760 756->755 758->759 759->701 763 13db444-13db462 760->763 764 13db873-13db8ef call 13d013c 760->764 786 13dbc99-13dbca2 761->786 762->786 767 13db4b9-13db4ce 763->767 768 13db464-13db468 763->768 807 13db93c-13db942 764->807 770 13db4d5-13db4eb 767->770 771 13db4d0 767->771 768->767 772 13db46a-13db475 768->772 775 13db4ed 770->775 776 13db4f2-13db509 770->776 771->770 777 13db4ab-13db4b1 772->777 775->776 783 13db50b 776->783 784 13db510-13db526 776->784 780 13db477-13db47b 777->780 781 13db4b3-13db4b4 777->781 787 13db47d 780->787 788 13db481-13db499 780->788 785 13db537-13db5a2 781->785 783->784 789 13db52d-13db534 784->789 790 13db528 784->790 796 13db5a4-13db5b0 785->796 797 13db5b6-13db76b 785->797 793 13dbd02-13dbd11 786->793 787->788 794 13db49b 788->794 795 13db4a0-13db4a8 788->795 789->785 790->789 798 13dbca4-13dbccc 793->798 799 13dbd13-13dbd9b 793->799 794->795 795->777 796->797 805 13db76d-13db771 797->805 806 13db7cf-13db7e4 797->806 802 13dbcce 798->802 803 13dbcd3-13dbcfc 798->803 834 13dbf14-13dbf20 799->834 802->803 803->793 805->806 808 13db773-13db782 805->808 812 13db7eb-13db80c 806->812 813 13db7e6 806->813 810 13db944-13db94a 807->810 811 13db8f1-13db939 807->811 817 13db7c1-13db7c7 808->817 810->748 811->807 814 13db80e 812->814 815 13db813-13db832 812->815 813->812 814->815 818 13db839-13db859 815->818 819 13db834 815->819 821 13db7c9-13db7ca 817->821 822 13db784-13db788 817->822 827 13db85b 818->827 828 13db860 818->828 819->818 829 13db864 821->829 825 13db78a-13db78e 822->825 826 13db792-13db7b3 822->826 825->826 830 13db7ba-13db7be 826->830 831 13db7b5 826->831 827->828 828->829 829->760 830->817 831->830 836 13dbf26-13dbf81 834->836 837 13dbda0-13dbda9 834->837 852 13dbfb8-13dbfe2 836->852 853 13dbf83-13dbfb6 836->853 838 13dbdab 837->838 839 13dbdb2-13dbf08 837->839 838->839 841 13dbdfd-13dbe3d 838->841 842 13dbdb8-13dbdf8 838->842 843 13dbe87-13dbec7 838->843 844 13dbe42-13dbe82 838->844 854 13dbf0e 839->854 841->854 842->854 843->854 844->854 861 13dbfeb-13dc07e 852->861 853->861 854->834 865 13dc085-13dc0a5 861->865 865->753
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: TJcq$Te^q$pbq$xbaq
                • API String ID: 0-1954897716
                • Opcode ID: 53419b02b67baebd2d9cf5d72df8dd65937dde5dda1f1b329a053f68f5cdd7e4
                • Instruction ID: 40576d87a928103e235f4a81af01d09fea5176eb9b928c0f460f78bde3e3dd9d
                • Opcode Fuzzy Hash: 53419b02b67baebd2d9cf5d72df8dd65937dde5dda1f1b329a053f68f5cdd7e4
                • Instruction Fuzzy Hash: 22A2B575A00228CFDB65DF69C984AD9BBB2FF89304F1581E9D509AB325DB319E81CF40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1888 5d5b928-5d5b949 1889 5d5b950-5d5b9e8 call 5d5c258 1888->1889 1890 5d5b94b 1888->1890 1894 5d5b9ee-5d5ba25 1889->1894 1890->1889 1896 5d5ba34 1894->1896 1897 5d5ba27-5d5ba32 1894->1897 1898 5d5ba3e-5d5bb10 1896->1898 1897->1898 1907 5d5bb22-5d5bb4d 1898->1907 1908 5d5bb12-5d5bb18 1898->1908 1909 5d5c1bd-5d5c1d9 1907->1909 1908->1907 1910 5d5bb52-5d5bc7b 1909->1910 1911 5d5c1df-5d5c1fa 1909->1911 1920 5d5bc8d-5d5bddf 1910->1920 1921 5d5bc7d-5d5bc83 1910->1921 1929 5d5bde1-5d5bde5 1920->1929 1930 5d5be38-5d5be3f 1920->1930 1921->1920 1932 5d5bde7-5d5bde8 1929->1932 1933 5d5bded-5d5be33 1929->1933 1931 5d5bfea-5d5c006 1930->1931 1934 5d5be44-5d5bf32 1931->1934 1935 5d5c00c-5d5c030 1931->1935 1936 5d5c07a-5d5c0c9 1932->1936 1933->1936 1960 5d5bfe6-5d5bfe7 1934->1960 1961 5d5bf38-5d5bfe3 1934->1961 1941 5d5c077-5d5c078 1935->1941 1942 5d5c032-5d5c074 1935->1942 1950 5d5c0db-5d5c126 1936->1950 1951 5d5c0cb-5d5c0d1 1936->1951 1941->1936 1942->1941 1952 5d5c19f-5d5c1ba 1950->1952 1953 5d5c128-5d5c19e 1950->1953 1951->1950 1952->1909 1953->1952 1960->1931 1961->1960
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: fcq$8
                • API String ID: 0-89531850
                • Opcode ID: 893ddf0dbff8ba0e05f8fa4df6c3440419a11974d2a8f334d741f27f5b7ccc34
                • Instruction ID: 12334d40b6526e6fbc7cd60c5479c5e4e723c76fb2ea129b4ba0992da7d8a9dc
                • Opcode Fuzzy Hash: 893ddf0dbff8ba0e05f8fa4df6c3440419a11974d2a8f334d741f27f5b7ccc34
                • Instruction Fuzzy Hash: 4942C475D00629CBDB64DF69C850AD9B7B2BF89310F1486EAD44DA7351EB30AE85CF80

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2410 13d6bb8-13d6be2 2411 13d6be9-13d6bf0 2410->2411 2412 13d6be4 2410->2412 2413 13d6bfb-13d6e6e 2411->2413 2412->2411
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: 6c5e66f72990e3891f29f371f6764da0e8ea43f729625412e627afd60f6556d3
                • Instruction ID: 16e8a868a07bdb8b5bc211720e0ea3b988352061fbb9dd363ad3489dc0c6e3a2
                • Opcode Fuzzy Hash: 6c5e66f72990e3891f29f371f6764da0e8ea43f729625412e627afd60f6556d3
                • Instruction Fuzzy Hash: 9671FFB4E046099FD748EF6AE4606ADBBF3FBC4700F14C52AD4449B268DB3A59068F40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2443 13d6bc8-13d6be2 2444 13d6be9-13d6bf0 2443->2444 2445 13d6be4 2443->2445 2446 13d6bfb-13d6e6e 2444->2446 2445->2444
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: cd6e082fab11c5c10bbef958fef3c84bebcbb40d10deca78818d4fb27249a4dd
                • Instruction ID: 088e402f079ecbd6aaee1a15ae0c0df1835e57c741ecc0051083d7240cc9491d
                • Opcode Fuzzy Hash: cd6e082fab11c5c10bbef958fef3c84bebcbb40d10deca78818d4fb27249a4dd
                • Instruction Fuzzy Hash: 6A710FB4E046099FD70CEF6AE46069EBBF3FBC4700F14C52AD4449B268DB7A99068F50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2476 5d5b918-5d5b949 2478 5d5b950-5d5b9e8 call 5d5c258 2476->2478 2479 5d5b94b 2476->2479 2483 5d5b9ee-5d5ba25 2478->2483 2479->2478 2485 5d5ba34 2483->2485 2486 5d5ba27-5d5ba32 2483->2486 2487 5d5ba3e-5d5bb10 2485->2487 2486->2487 2496 5d5bb22-5d5bb4d 2487->2496 2497 5d5bb12-5d5bb18 2487->2497 2498 5d5c1bd-5d5c1d9 2496->2498 2497->2496 2499 5d5bb52-5d5bc7b 2498->2499 2500 5d5c1df-5d5c1fa 2498->2500 2509 5d5bc8d-5d5bddf 2499->2509 2510 5d5bc7d-5d5bc83 2499->2510 2518 5d5bde1-5d5bde5 2509->2518 2519 5d5be38-5d5be3f 2509->2519 2510->2509 2521 5d5bde7-5d5bde8 2518->2521 2522 5d5bded-5d5be33 2518->2522 2520 5d5bfea-5d5c006 2519->2520 2523 5d5be44-5d5bf32 2520->2523 2524 5d5c00c-5d5c030 2520->2524 2525 5d5c07a-5d5c0c9 2521->2525 2522->2525 2549 5d5bfe6-5d5bfe7 2523->2549 2550 5d5bf38-5d5bfe3 2523->2550 2530 5d5c077-5d5c078 2524->2530 2531 5d5c032-5d5c074 2524->2531 2539 5d5c0db-5d5c126 2525->2539 2540 5d5c0cb-5d5c0d1 2525->2540 2530->2525 2531->2530 2541 5d5c19f-5d5c1ba 2539->2541 2542 5d5c128-5d5c19e 2539->2542 2540->2539 2541->2498 2542->2541 2549->2520 2550->2549
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: fcq$h
                • API String ID: 0-1849521214
                • Opcode ID: ebdddefaa1d3bdfddd5022bcc4617747465743a66ecb42f4b0663c56b53af916
                • Instruction ID: 6524c56a4cd8fb784a5be54e87f928e33af4293acc567bfb77f0d821f2d86448
                • Opcode Fuzzy Hash: ebdddefaa1d3bdfddd5022bcc4617747465743a66ecb42f4b0663c56b53af916
                • Instruction Fuzzy Hash: 9C61F371D006298BEB64DF6ACC50BD9FBB2BF89310F14C2AAC44DA7254EB305A85CF50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: 4ff6a712e0b176a682d1f2f020a413b75366c52158361e653414d21606471878
                • Instruction ID: 3cdc2b28c4ca8432144aca77720c99dc92fe21c44aea55d0023111d79e8af188
                • Opcode Fuzzy Hash: 4ff6a712e0b176a682d1f2f020a413b75366c52158361e653414d21606471878
                • Instruction Fuzzy Hash: D0326B75A0121A8FCB15DF69C4A4A6EFBF2FB88350F14892AD956D7740DB34E806CB80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 35c43f7a8a82a769d1d92e511e49dc921850341c7a6cb59c10a1d672760c1167
                • Instruction ID: 2efc0aa2da15a131af190a53e4b24d4b05b8585f0f3940456902ea00ced0b0e8
                • Opcode Fuzzy Hash: 35c43f7a8a82a769d1d92e511e49dc921850341c7a6cb59c10a1d672760c1167
                • Instruction Fuzzy Hash: 69F10174E0521CCFEB64CF69D994BA9BBF2BB49304F10A1AAD459A7350EB705E85CF00
                APIs
                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05D5E795
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: MemoryProtectVirtual
                • String ID:
                • API String ID: 2706961497-0
                • Opcode ID: 4a21bc62c8e2e030ce58d1d21b3fd9f9037162d747e1b5cd5a2f9a7d17fc69e5
                • Instruction ID: fa008baf9473ad2f0ba3de329999441473c3bc52c9d35216d267132110691725
                • Opcode Fuzzy Hash: 4a21bc62c8e2e030ce58d1d21b3fd9f9037162d747e1b5cd5a2f9a7d17fc69e5
                • Instruction Fuzzy Hash: DC4198B9D042589FCF10DFAAD880ADEFBB5FB49320F10A42AE819B7210D735A941CF55
                APIs
                • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05D5E795
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: MemoryProtectVirtual
                • String ID:
                • API String ID: 2706961497-0
                • Opcode ID: 4b25fbfd7cf1bef2ec251824a7e9797ee3683c6dc5dba4484a755ce30938b1d3
                • Instruction ID: dd97b2ca1aa9fc4bad7705e01a2d6febeece5e03d8ef608df5689524f983b50e
                • Opcode Fuzzy Hash: 4b25fbfd7cf1bef2ec251824a7e9797ee3683c6dc5dba4484a755ce30938b1d3
                • Instruction Fuzzy Hash: 7E41A9B8D002589FCF10CFAAD880ADEFBB5FB49320F10A02AE819B7210D735A941CF55
                APIs
                • NtResumeThread.NTDLL(?,?), ref: 05D5FC5E
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 51566319d0b4448e1f0a3823d6b7fafe7bcd32a90d3230a1dafa70fa38e5d448
                • Instruction ID: 1d0ef346561ded214c91fc7b7c8bec23d024414fda053b620fee20c577533cb2
                • Opcode Fuzzy Hash: 51566319d0b4448e1f0a3823d6b7fafe7bcd32a90d3230a1dafa70fa38e5d448
                • Instruction Fuzzy Hash: 7D31C8B4D012199FCF10CFA9D984AAEFBF1BB49320F20942AE819B7200C734A945CF94
                APIs
                • NtResumeThread.NTDLL(?,?), ref: 05D5FC5E
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: b9d033f6cbfeb4ab215be0ca9030f2b306faac7e5a82162c632ffb25c024f973
                • Instruction ID: 4d3eaab04efdd97250253f168085038805244374c49c79a1c08f2253c7cc7ce0
                • Opcode Fuzzy Hash: b9d033f6cbfeb4ab215be0ca9030f2b306faac7e5a82162c632ffb25c024f973
                • Instruction Fuzzy Hash: 5131AAB5D112199FCF10CFA9D985AAEFBF1BB49320F10942AE819B7240C738A945CF94
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: PH^q
                • API String ID: 0-2549759414
                • Opcode ID: b03302f1703a2a2cf3b125ff5d3d0afbe1d70cb917b830ac70c0df7234b9d4ac
                • Instruction ID: f8c1c071469c6ab81c7da3c0c76c0abf2ea9ef0a3679b24b41c31e5960b20708
                • Opcode Fuzzy Hash: b03302f1703a2a2cf3b125ff5d3d0afbe1d70cb917b830ac70c0df7234b9d4ac
                • Instruction Fuzzy Hash: 08C13674D04218CFEF14CFA9C9A4BADBBF2FB49314F1091AAD849A7254DB759984CF00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: PH^q
                • API String ID: 0-2549759414
                • Opcode ID: decb08b2bd9ff8d7a91bcd90a953f7a1668f0abbea056b296c14a63ea95386a9
                • Instruction ID: 05cc3e9c2db915a32ffad2f7a4127b8894edfc0d693bc830c52e74d9b3ac3a99
                • Opcode Fuzzy Hash: decb08b2bd9ff8d7a91bcd90a953f7a1668f0abbea056b296c14a63ea95386a9
                • Instruction Fuzzy Hash: F4C12574D04218CFEF24CFA9C9A4BADBBF2FB49315F1091AAD849A7254DB759984CF00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 6fb0bec8e1479bd895b5bd1dc6af1146c3138398a4f726be21e637044931aad2
                • Instruction ID: cceb29dc3fb2c00a9a5ac0efc4c6cb40cecfd15a80ed64538735a946daefbf7d
                • Opcode Fuzzy Hash: 6fb0bec8e1479bd895b5bd1dc6af1146c3138398a4f726be21e637044931aad2
                • Instruction Fuzzy Hash: BEA1F274E0420CCFEB14CFA9D984BEDBBF2BB89314F20A4AAD459A7255DB705985CF00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 1582b9126777319ff68abef67598d5bf72f92cffc6064bc25f4f5840cab70d67
                • Instruction ID: e93db04c35061cc204effc572ac9f588765232a0c4655d871e1c1a798c531184
                • Opcode Fuzzy Hash: 1582b9126777319ff68abef67598d5bf72f92cffc6064bc25f4f5840cab70d67
                • Instruction Fuzzy Hash: F9B10374E05248CFDB29CFA9D984BADBBF6FB88300F1498AAD409A7355DB705985CF01
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 811c802c2e57aa8dd56c704ba91ce81ca391df8e0285259dac254e5a7c1c5ef0
                • Instruction ID: 6238c4a13b76c47c1980c20648973a7efe1516d0645d3ca49b4710d8efac8039
                • Opcode Fuzzy Hash: 811c802c2e57aa8dd56c704ba91ce81ca391df8e0285259dac254e5a7c1c5ef0
                • Instruction Fuzzy Hash: FEB1E274E05248CFDB29CFA9D984BADBBF6FB88301F1484AAD409A7355EB705985CF01
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 56b80181764c9deebbdd8ff7441fcba7d73e1f17c1d90abebdd76700d4159f94
                • Instruction ID: f43600316a7ca5b53edc16948f386e86baf814b29f694d588e0a6a788f88a03c
                • Opcode Fuzzy Hash: 56b80181764c9deebbdd8ff7441fcba7d73e1f17c1d90abebdd76700d4159f94
                • Instruction Fuzzy Hash: 7AA1F074E05248CFDB25CFA9D988BADBBF6FB48301F1498AAD409A7254EB705D85CF01
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e5faed833d8ddfe7a954c4800489be414bfc283539be6f00e17506a49adfab71
                • Instruction ID: 35dd106d1fdfcbc2ee320cda05ab45a8ba9f25cd6351aa124ead35dc75637e01
                • Opcode Fuzzy Hash: e5faed833d8ddfe7a954c4800489be414bfc283539be6f00e17506a49adfab71
                • Instruction Fuzzy Hash: 8A814570D09258CFEB25CFA9D944BEDBBF6FB49301F1098AAD409AB252DB704984CF01
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0dee7e4b944c9e21be367bae71c1d3137e0bdc2b86b295621aa96f66b0908ec3
                • Instruction ID: b8c745e600f60b75fecd793bc10d71a19de17668ce838b667e56492c2d4cd7a0
                • Opcode Fuzzy Hash: 0dee7e4b944c9e21be367bae71c1d3137e0bdc2b86b295621aa96f66b0908ec3
                • Instruction Fuzzy Hash: 06712C74E01209DFDB04EFA9D594AAEBBF6FF88310F14846AE509AB354DB349942CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d073e33ae79c076d41dd85e8dab6621d77ecbc0c78e08f5a32931cdf9479a14e
                • Instruction ID: ba8f8913d96e2b7311d2b21dab7cccc91b9a70933bf82bb886a6dff2ad9c2478
                • Opcode Fuzzy Hash: d073e33ae79c076d41dd85e8dab6621d77ecbc0c78e08f5a32931cdf9479a14e
                • Instruction Fuzzy Hash: F0710C74E01209DFCB04EFA9D594AAEBBF6FF88310F14846AE509AB354DB349945CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c65759cdb93142e934f8633660a8a9e768d621b7516f5aac18d411602fc413f5
                • Instruction ID: 193d2c4b145eaceb131cfeaa0d5abaf5067134c93393490f49404dd23f6c2be4
                • Opcode Fuzzy Hash: c65759cdb93142e934f8633660a8a9e768d621b7516f5aac18d411602fc413f5
                • Instruction Fuzzy Hash: 14510374D05218CFDF14DFA8D954BEDBBF2FB49322F90502AD849AB254DB349946CB04
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa93aa2b45098afdad0d6416854f3606044b9382232074ff88b9c7cac878fe52
                • Instruction ID: 756483d618629b7404af1b4f325fe84a403b07321480194fb7747f8d3db18c4a
                • Opcode Fuzzy Hash: aa93aa2b45098afdad0d6416854f3606044b9382232074ff88b9c7cac878fe52
                • Instruction Fuzzy Hash: BF511378D05218CFDF14DFA8D954BEDBBF2FB4A322F90502AD849AB250DB749946CB04
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57b8479adc961e17a8b53324f3ebd261f60f8000138230758950801d047870a5
                • Instruction ID: a8fb74129ba210394565c3f7e7d431d667286a986d91d03ecbaf592df1af15a0
                • Opcode Fuzzy Hash: 57b8479adc961e17a8b53324f3ebd261f60f8000138230758950801d047870a5
                • Instruction Fuzzy Hash: 5041E870D052288BDB69CF6AC9447EEBBF6BF89300F14C5A9C40DA6355EB745A85CF00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 653 5bf9e28-5bf9e74 657 5bf9e7a-5bf9e8c 653->657 658 5bf9ff2-5bfa02b 653->658 661 5bf9e8e-5bf9eda 657->661 662 5bf9edc-5bf9f25 657->662 678 5bf9f28-5bf9f68 661->678 662->678 683 5bf9f6a-5bf9f70 678->683 684 5bf9f72-5bf9f7c 678->684 685 5bf9f7f-5bf9fc2 683->685 684->685 692 5bf9fe8-5bf9fef 685->692 693 5bf9fc4-5bf9fe0 685->693 693->692
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$4'^q$4'^q$4'^q$4'^q$pbq
                • API String ID: 0-723292480
                • Opcode ID: ffacf361ad35f7e9cf0328b997fccef73f7af10b8107ebac484b1e1b15ee6a5e
                • Instruction ID: a02852ec3a6bba37d50802e3011f2aacfcf3c1b39ee59a4b27c6d8b77b4adebe
                • Opcode Fuzzy Hash: ffacf361ad35f7e9cf0328b997fccef73f7af10b8107ebac484b1e1b15ee6a5e
                • Instruction Fuzzy Hash: D5518370A002069FC708EB79C8507AEBBF7BFC9300F24896DD5499B355DF34A9468BA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884421172.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59a0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: bf94791f978152413d57e5b99f7c9db04179985ba0f1a134a37d2c83916c05db
                • Instruction ID: 0d861adc62ba673a8782fbf52f359fe6010f3582c12903c77fa01ffdc0cbc8ae
                • Opcode Fuzzy Hash: bf94791f978152413d57e5b99f7c9db04179985ba0f1a134a37d2c83916c05db
                • Instruction Fuzzy Hash: 8DF2B270D093889FDB16DBB8CC68BAE7F75BF46300F15419AE141AB2E2C7785845CBA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1339 5bf8f68-5bf8f90 1341 5bf8fde-5bf8fec 1339->1341 1342 5bf8f92-5bf8fd9 1339->1342 1343 5bf8fee-5bf8ff9 call 5bf6a88 1341->1343 1344 5bf8ffb 1341->1344 1389 5bf9435-5bf943c 1342->1389 1346 5bf8ffd-5bf9004 1343->1346 1344->1346 1349 5bf90ed-5bf90f1 1346->1349 1350 5bf900a-5bf900e 1346->1350 1354 5bf9147-5bf9151 1349->1354 1355 5bf90f3-5bf9102 call 5bf4c88 1349->1355 1351 5bf943d-5bf9465 1350->1351 1352 5bf9014-5bf9018 1350->1352 1363 5bf946c-5bf9496 1351->1363 1356 5bf902a-5bf9088 call 5bf67c8 call 5bf7230 1352->1356 1357 5bf901a-5bf9024 1352->1357 1358 5bf918a-5bf91b0 1354->1358 1359 5bf9153-5bf9162 call 5bf4368 1354->1359 1367 5bf9106-5bf910b 1355->1367 1399 5bf908e-5bf90e8 1356->1399 1400 5bf94fb-5bf9525 1356->1400 1357->1356 1357->1363 1383 5bf91bd 1358->1383 1384 5bf91b2-5bf91bb 1358->1384 1376 5bf949e-5bf94b4 1359->1376 1377 5bf9168-5bf9185 1359->1377 1363->1376 1371 5bf910d-5bf9142 call 5bf8a30 1367->1371 1372 5bf9104 1367->1372 1371->1389 1372->1367 1402 5bf94bc-5bf94f4 1376->1402 1377->1389 1391 5bf91bf-5bf91e7 1383->1391 1384->1391 1407 5bf91ed-5bf9206 1391->1407 1408 5bf92b8-5bf92bc 1391->1408 1399->1389 1419 5bf952f-5bf9535 1400->1419 1420 5bf9527-5bf952d 1400->1420 1402->1400 1407->1408 1429 5bf920c-5bf921b call 5bf3d90 1407->1429 1409 5bf92be-5bf92d7 1408->1409 1410 5bf9336-5bf9340 1408->1410 1409->1410 1435 5bf92d9-5bf92e8 call 5bf3d90 1409->1435 1412 5bf939d-5bf93a6 1410->1412 1413 5bf9342-5bf934c 1410->1413 1417 5bf93de-5bf942b 1412->1417 1418 5bf93a8-5bf93d6 call 5bf5fc0 call 5bf5fe0 1412->1418 1430 5bf934e-5bf9350 1413->1430 1431 5bf9352-5bf9364 1413->1431 1440 5bf9433 1417->1440 1418->1417 1420->1419 1426 5bf9536-5bf9573 1420->1426 1448 5bf921d-5bf9223 1429->1448 1449 5bf9233-5bf9248 1429->1449 1437 5bf9366-5bf9368 1430->1437 1431->1437 1456 5bf92ea-5bf92f0 1435->1456 1457 5bf9300-5bf930b 1435->1457 1445 5bf936a-5bf936e 1437->1445 1446 5bf9396-5bf939b 1437->1446 1440->1389 1451 5bf938c-5bf9391 call 5bf2b90 1445->1451 1452 5bf9370-5bf9389 1445->1452 1446->1412 1446->1413 1458 5bf9227-5bf9229 1448->1458 1459 5bf9225 1448->1459 1462 5bf927c-5bf9285 1449->1462 1463 5bf924a-5bf9276 call 5bf5110 1449->1463 1451->1446 1452->1451 1466 5bf92f4-5bf92f6 1456->1466 1467 5bf92f2 1456->1467 1457->1400 1468 5bf9311-5bf9334 1457->1468 1458->1449 1459->1449 1462->1400 1465 5bf928b-5bf92b2 1462->1465 1463->1402 1463->1462 1465->1408 1465->1429 1466->1457 1467->1457 1468->1410 1468->1435
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Hbq$Hbq$Hbq
                • API String ID: 0-2297679979
                • Opcode ID: e07d6de5648f38d2c7484bd95952bb6b97720790deb2a330499975ff2de4ba2c
                • Instruction ID: 93b0d9d431b385ddf9e7682e50547fcf1a626e4dfb29b63e26ff91b36783b12b
                • Opcode Fuzzy Hash: e07d6de5648f38d2c7484bd95952bb6b97720790deb2a330499975ff2de4ba2c
                • Instruction Fuzzy Hash: 84125F34A006059FCB24DFA9D494AAEBBF2FF88700F148569E5469B391DB35EC4ACF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1482 5bfa820-5bfa85d call 5bfad40 1484 5bfa87f-5bfa895 call 5bfa628 1482->1484 1485 5bfa85f-5bfa862 1482->1485 1491 5bfac0b-5bfac1f 1484->1491 1492 5bfa89b-5bfa8a7 1484->1492 1597 5bfa864 call 5bfb138 1485->1597 1598 5bfa864 call 5bfb190 1485->1598 1488 5bfa86a-5bfa86c 1488->1484 1489 5bfa86e-5bfa876 1488->1489 1489->1484 1499 5bfac5f-5bfac68 1491->1499 1493 5bfa8ad-5bfa8b0 1492->1493 1494 5bfa9d8-5bfa9df 1492->1494 1496 5bfa8b3-5bfa8bc 1493->1496 1497 5bfab0e-5bfab4b call 5bfa030 call 5bfd3d0 1494->1497 1498 5bfa9e5-5bfa9ee 1494->1498 1501 5bfa8c2-5bfa8d6 1496->1501 1502 5bfad00 1496->1502 1541 5bfab51-5bfac02 call 5bfa030 1497->1541 1498->1497 1503 5bfa9f4-5bfab00 call 5bfa030 call 5bfa5c0 call 5bfa030 1498->1503 1504 5bfac2d-5bfac36 1499->1504 1505 5bfac6a-5bfac71 1499->1505 1519 5bfa8dc-5bfa971 call 5bfa628 * 2 call 5bfa030 call 5bfa5c0 call 5bfa668 call 5bfa710 call 5bfa778 1501->1519 1520 5bfa9c8-5bfa9d2 1501->1520 1507 5bfad05-5bfad09 1502->1507 1593 5bfab0b 1503->1593 1594 5bfab02 1503->1594 1504->1502 1511 5bfac3c-5bfac4e 1504->1511 1508 5bfacbf-5bfacc6 1505->1508 1509 5bfac73-5bfacb6 call 5bfa030 1505->1509 1512 5bfad0b 1507->1512 1513 5bfad14 1507->1513 1515 5bfaceb-5bfacfe 1508->1515 1516 5bfacc8-5bfacd8 1508->1516 1509->1508 1529 5bfac5e 1511->1529 1530 5bfac50-5bfac55 1511->1530 1512->1513 1525 5bfad15 1513->1525 1515->1507 1516->1515 1532 5bfacda-5bface2 1516->1532 1574 5bfa973-5bfa98b call 5bfa710 call 5bfa030 call 5bfa2e0 1519->1574 1575 5bfa990-5bfa9c3 call 5bfa778 1519->1575 1520->1494 1520->1496 1525->1525 1529->1499 1599 5bfac58 call 5bfdb70 1530->1599 1600 5bfac58 call 5bfdb60 1530->1600 1532->1515 1541->1491 1574->1575 1575->1520 1593->1497 1594->1593 1597->1488 1598->1488 1599->1529 1600->1529
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q$4'^q
                • API String ID: 0-1196845430
                • Opcode ID: f8589fd44231c26225081f0f2382a84268c6986fa7224769f3646ab1f6cd4439
                • Instruction ID: cf2b955abfc5e3924c515066d5b67171801294f3fd330efc30cdee989a2dfc9b
                • Opcode Fuzzy Hash: f8589fd44231c26225081f0f2382a84268c6986fa7224769f3646ab1f6cd4439
                • Instruction Fuzzy Hash: 06F1B834A10218DFCB08DFA8D999A9DBBB2FF88300F158559E506AB365DB71FC46CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1601 5bff1f0-5bff210 1602 5bff329-5bff34e 1601->1602 1603 5bff216-5bff21a 1601->1603 1604 5bff355-5bff37a 1602->1604 1603->1604 1605 5bff220-5bff229 1603->1605 1607 5bff381-5bff3b7 1604->1607 1606 5bff22f-5bff256 1605->1606 1605->1607 1618 5bff31e-5bff328 1606->1618 1619 5bff25c-5bff25e 1606->1619 1624 5bff3be-5bff414 1607->1624 1620 5bff27f-5bff281 1619->1620 1621 5bff260-5bff263 1619->1621 1623 5bff284-5bff288 1620->1623 1621->1624 1625 5bff269-5bff273 1621->1625 1626 5bff28a-5bff299 1623->1626 1627 5bff2e9-5bff2f5 1623->1627 1640 5bff438-5bff44f 1624->1640 1641 5bff416-5bff42a call 5bff6d0 1624->1641 1625->1624 1628 5bff279-5bff27d 1625->1628 1626->1624 1635 5bff29f-5bff2e6 call 5bf2bc0 1626->1635 1627->1624 1630 5bff2fb-5bff318 call 5bf2bc0 1627->1630 1628->1620 1628->1623 1630->1618 1630->1619 1635->1627 1649 5bff455-5bff53b call 5bfa628 call 5bfa030 * 2 call 5bfa668 call 5bfe238 call 5bfa030 call 5bfd3d0 call 5bfaed0 1640->1649 1650 5bff540-5bff550 1640->1650 1717 5bff42d call 5bff918 1641->1717 1718 5bff42d call 5bffa78 1641->1718 1648 5bff433 1652 5bff663-5bff66e 1648->1652 1649->1650 1661 5bff63e-5bff65a call 5bfa030 1650->1661 1662 5bff556-5bff630 call 5bfa628 * 2 call 5bfade0 call 5bfa030 * 2 call 5bfa2e0 call 5bfa778 call 5bfa030 1650->1662 1658 5bff69d-5bff6be call 5bfa778 1652->1658 1659 5bff670-5bff680 1652->1659 1671 5bff682-5bff688 1659->1671 1672 5bff690-5bff698 call 5bfaed0 1659->1672 1661->1652 1714 5bff63b 1662->1714 1715 5bff632 1662->1715 1671->1672 1672->1658 1714->1661 1715->1714 1717->1648 1718->1648
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$(bq$Hbq
                • API String ID: 0-2835675688
                • Opcode ID: e73e80759a1986af6df9035f900cbacddafdd72799f24ff74214a4b55d9b679b
                • Instruction ID: 3afcb7ec603affd52c86d63a5f35094ddee4c333d2a64b292228322dde4676c0
                • Opcode Fuzzy Hash: e73e80759a1986af6df9035f900cbacddafdd72799f24ff74214a4b55d9b679b
                • Instruction Fuzzy Hash: EBE1F034A11209DFCB18EF64D4949AEBBB2FF89310F108569E506AB364DB30ED46CB91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1720 5bf545a-5bf5461 1721 5bf5463-5bf548e 1720->1721 1722 5bf5400 1720->1722 1725 5bf549f-5bf54a8 1721->1725 1726 5bf5490-5bf549d 1721->1726 1723 5bf5409-5bf540f 1722->1723 1724 5bf5402-5bf5407 1722->1724 1728 5bf544a-5bf544e 1723->1728 1729 5bf5411-5bf5431 1723->1729 1724->1723 1726->1725 1727 5bf54ab-5bf54b8 1726->1727 1730 5bf54ba-5bf54c1 1727->1730 1731 5bf54c3 1727->1731 1733 5bf543a-5bf543c 1729->1733 1732 5bf54ca-5bf54f4 1730->1732 1731->1732 1734 5bf54fd-5bf5510 call 5bf5148 1732->1734 1735 5bf54f6 1732->1735 1733->1728 1736 5bf543e-5bf5445 call 5bf2b90 1733->1736 1740 5bf5516-5bf5529 1734->1740 1741 5bf5654-5bf565b 1734->1741 1735->1734 1736->1728 1751 5bf552b-5bf5532 1740->1751 1752 5bf5537-5bf5551 1740->1752 1742 5bf58f5-5bf58fc 1741->1742 1743 5bf5661-5bf5676 1741->1743 1744 5bf58fe-5bf5907 1742->1744 1745 5bf596b-5bf5972 1742->1745 1756 5bf5678-5bf567a 1743->1756 1757 5bf5696-5bf569c 1743->1757 1744->1745 1749 5bf5909-5bf591c 1744->1749 1747 5bf5a0e-5bf5a15 1745->1747 1748 5bf5978-5bf5981 1745->1748 1754 5bf5a17-5bf5a28 1747->1754 1755 5bf5a31-5bf5a37 1747->1755 1748->1747 1753 5bf5987-5bf599a 1748->1753 1749->1745 1771 5bf591e-5bf5963 call 5bf25c0 1749->1771 1758 5bf564d 1751->1758 1766 5bf5558-5bf5565 1752->1766 1767 5bf5553-5bf5556 1752->1767 1777 5bf59ad-5bf59b1 1753->1777 1778 5bf599c-5bf59ab 1753->1778 1754->1755 1779 5bf5a2a 1754->1779 1761 5bf5a49-5bf5a52 1755->1761 1762 5bf5a39-5bf5a3f 1755->1762 1756->1757 1760 5bf567c-5bf5693 1756->1760 1763 5bf5764-5bf5768 1757->1763 1764 5bf56a2-5bf56a4 1757->1764 1758->1741 1760->1757 1772 5bf5a55-5bf5aca 1762->1772 1773 5bf5a41-5bf5a47 1762->1773 1763->1742 1768 5bf576e-5bf5770 1763->1768 1764->1763 1774 5bf56aa-5bf572b call 5bf25c0 * 4 1764->1774 1775 5bf5567-5bf557b 1766->1775 1767->1775 1768->1742 1776 5bf5776-5bf577f 1768->1776 1771->1745 1810 5bf5965-5bf5968 1771->1810 1847 5bf5acc-5bf5ad6 1772->1847 1848 5bf5ad8 1772->1848 1773->1761 1773->1772 1841 5bf572d-5bf573f call 5bf25c0 1774->1841 1842 5bf5742-5bf5761 call 5bf25c0 1774->1842 1775->1758 1809 5bf5581-5bf55d5 1775->1809 1784 5bf58d2-5bf58d8 1776->1784 1785 5bf59b3-5bf59b5 1777->1785 1786 5bf59d1-5bf59d3 1777->1786 1778->1777 1779->1755 1789 5bf58eb 1784->1789 1790 5bf58da-5bf58e9 1784->1790 1785->1786 1793 5bf59b7-5bf59ce 1785->1793 1786->1747 1788 5bf59d5-5bf59db 1786->1788 1788->1747 1794 5bf59dd-5bf5a0b 1788->1794 1797 5bf58ed-5bf58ef 1789->1797 1790->1797 1793->1786 1794->1747 1797->1742 1800 5bf5784-5bf5792 call 5bf3d90 1797->1800 1816 5bf57aa-5bf57c4 1800->1816 1817 5bf5794-5bf579a 1800->1817 1850 5bf55d7-5bf55d9 1809->1850 1851 5bf55e3-5bf55e7 1809->1851 1810->1745 1816->1784 1826 5bf57ca-5bf57ce 1816->1826 1820 5bf579e-5bf57a0 1817->1820 1821 5bf579c 1817->1821 1820->1816 1821->1816 1827 5bf57ef 1826->1827 1828 5bf57d0-5bf57d9 1826->1828 1834 5bf57f2-5bf580c 1827->1834 1832 5bf57db-5bf57de 1828->1832 1833 5bf57e0-5bf57e3 1828->1833 1837 5bf57ed 1832->1837 1833->1837 1834->1784 1856 5bf5812-5bf5893 call 5bf25c0 * 4 1834->1856 1837->1834 1841->1842 1842->1763 1854 5bf5add-5bf5adf 1847->1854 1848->1854 1850->1851 1851->1758 1855 5bf55e9-5bf5601 1851->1855 1857 5bf5ae6-5bf5aeb 1854->1857 1858 5bf5ae1-5bf5ae4 1854->1858 1855->1758 1862 5bf5603-5bf560f 1855->1862 1882 5bf58aa-5bf58d0 call 5bf25c0 1856->1882 1883 5bf5895-5bf58a7 call 5bf25c0 1856->1883 1859 5bf5af1-5bf5b1e 1857->1859 1858->1859 1865 5bf561e-5bf5624 1862->1865 1866 5bf5611-5bf5614 1862->1866 1868 5bf562c-5bf5635 1865->1868 1869 5bf5626-5bf5629 1865->1869 1866->1865 1870 5bf5637-5bf563a 1868->1870 1871 5bf5644-5bf564a 1868->1871 1869->1868 1870->1871 1871->1758 1882->1742 1882->1784 1883->1882
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: $^q$$^q
                • API String ID: 0-355816377
                • Opcode ID: 3031c02dc4bc5ab0e93f2c85df55bd2bac0b52c44777e7ac65b555ff80d3aef7
                • Instruction ID: 2a510c4c4d390bb1dfbcab81209b913ebf0ec17afac5ce9eafc8d5d07ca11829
                • Opcode Fuzzy Hash: 3031c02dc4bc5ab0e93f2c85df55bd2bac0b52c44777e7ac65b555ff80d3aef7
                • Instruction Fuzzy Hash: F9326F34A00219DFCB15DFA5D894ABEBBF2FF48300F148455E911AB395DB34A94ACF61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1968 59a18c0-59a18e8 1969 59a18ea 1968->1969 1970 59a18ef-59a1918 1968->1970 1969->1970 1971 59a191a-59a1923 1970->1971 1972 59a1939 1970->1972 1973 59a192a-59a192d 1971->1973 1974 59a1925-59a1928 1971->1974 1975 59a193c-59a1940 1972->1975 1976 59a1937 1973->1976 1974->1976 1977 59a1cf7-59a1d0e 1975->1977 1976->1975 1979 59a1d14-59a1d18 1977->1979 1980 59a1945-59a1949 1977->1980 1981 59a1d1a-59a1d4a 1979->1981 1982 59a1d4d-59a1d51 1979->1982 1983 59a194b-59a19a8 1980->1983 1984 59a194e-59a1952 1980->1984 1981->1982 1988 59a1d72 1982->1988 1989 59a1d53-59a1d5c 1982->1989 1992 59a19aa-59a1a1b 1983->1992 1993 59a19ad-59a19b1 1983->1993 1986 59a197b-59a199f 1984->1986 1987 59a1954-59a1978 1984->1987 1986->1977 1987->1986 1990 59a1d75-59a1d7b 1988->1990 1994 59a1d5e-59a1d61 1989->1994 1995 59a1d63-59a1d66 1989->1995 2003 59a1a1d-59a1a7a 1992->2003 2004 59a1a20-59a1a24 1992->2004 1999 59a19da-59a19eb 1993->1999 2000 59a19b3-59a19d7 1993->2000 1996 59a1d70 1994->1996 1995->1996 1996->1990 2093 59a19ee call 5d53d89 1999->2093 2094 59a19ee call 5d53d98 1999->2094 2000->1999 2012 59a1a7f-59a1a83 2003->2012 2013 59a1a7c-59a1ad8 2003->2013 2009 59a1a4d-59a1a71 2004->2009 2010 59a1a26-59a1a4a 2004->2010 2009->1977 2010->2009 2021 59a1aac-59a1acf 2012->2021 2022 59a1a85-59a1aa9 2012->2022 2025 59a1ada-59a1b3c 2013->2025 2026 59a1add-59a1ae1 2013->2026 2018 59a19f4-59a1a01 2023 59a1a03-59a1a09 2018->2023 2024 59a1a11-59a1a12 2018->2024 2021->1977 2022->2021 2023->2024 2024->1977 2035 59a1b3e-59a1ba0 2025->2035 2036 59a1b41-59a1b45 2025->2036 2032 59a1b0a-59a1b22 2026->2032 2033 59a1ae3-59a1b07 2026->2033 2045 59a1b32-59a1b33 2032->2045 2046 59a1b24-59a1b2a 2032->2046 2033->2032 2047 59a1ba2-59a1c04 2035->2047 2048 59a1ba5-59a1ba9 2035->2048 2042 59a1b6e-59a1b86 2036->2042 2043 59a1b47-59a1b6b 2036->2043 2056 59a1b88-59a1b8e 2042->2056 2057 59a1b96-59a1b97 2042->2057 2043->2042 2045->1977 2046->2045 2058 59a1c09-59a1c0d 2047->2058 2059 59a1c06-59a1c68 2047->2059 2053 59a1bab-59a1bcf 2048->2053 2054 59a1bd2-59a1bea 2048->2054 2053->2054 2067 59a1bfa-59a1bfb 2054->2067 2068 59a1bec-59a1bf2 2054->2068 2056->2057 2057->1977 2064 59a1c0f-59a1c33 2058->2064 2065 59a1c36-59a1c4e 2058->2065 2069 59a1c6a-59a1cc3 2059->2069 2070 59a1c6d-59a1c71 2059->2070 2064->2065 2078 59a1c5e-59a1c5f 2065->2078 2079 59a1c50-59a1c56 2065->2079 2067->1977 2068->2067 2080 59a1cec-59a1cef 2069->2080 2081 59a1cc5-59a1ce9 2069->2081 2075 59a1c9a-59a1cbd 2070->2075 2076 59a1c73-59a1c97 2070->2076 2075->1977 2076->2075 2078->1977 2079->2078 2080->1977 2081->2080 2093->2018 2094->2018
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884421172.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59a0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: bf32fa38d30ee78f9e3e0132615c5be6e7d358e264d07d308293228c6f0d45b1
                • Instruction ID: 06a37e11aaa6ec3bce210f001106f6bd97f73c6d0145485c659c8a71ed0f69ec
                • Opcode Fuzzy Hash: bf32fa38d30ee78f9e3e0132615c5be6e7d358e264d07d308293228c6f0d45b1
                • Instruction Fuzzy Hash: A1F1E234E05208DFDF28DFA8E4986ECBBB6FF89315F204529E446A7254DB355881DF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2095 5bf8618-5bf862a 2096 5bf862c-5bf864d 2095->2096 2097 5bf8654-5bf8658 2095->2097 2096->2097 2098 5bf865a-5bf865c 2097->2098 2099 5bf8664-5bf8673 2097->2099 2098->2099 2101 5bf867f-5bf86ab 2099->2101 2102 5bf8675 2099->2102 2105 5bf88d8-5bf891f 2101->2105 2106 5bf86b1-5bf86b7 2101->2106 2102->2101 2135 5bf8935-5bf8941 2105->2135 2136 5bf8921 2105->2136 2107 5bf86bd-5bf86c3 2106->2107 2108 5bf8789-5bf878d 2106->2108 2107->2105 2110 5bf86c9-5bf86d6 2107->2110 2111 5bf878f-5bf8798 2108->2111 2112 5bf87b0-5bf87b9 2108->2112 2114 5bf86dc-5bf86e5 2110->2114 2115 5bf8768-5bf8771 2110->2115 2111->2105 2116 5bf879e-5bf87ae 2111->2116 2117 5bf87de-5bf87e1 2112->2117 2118 5bf87bb-5bf87db 2112->2118 2114->2105 2120 5bf86eb-5bf8703 2114->2120 2115->2105 2119 5bf8777-5bf8783 2115->2119 2121 5bf87e4-5bf87ea 2116->2121 2117->2121 2118->2117 2119->2107 2119->2108 2123 5bf870f-5bf8721 2120->2123 2124 5bf8705 2120->2124 2121->2105 2126 5bf87f0-5bf8803 2121->2126 2123->2115 2133 5bf8723-5bf8729 2123->2133 2124->2123 2126->2105 2128 5bf8809-5bf8819 2126->2128 2128->2105 2129 5bf881f-5bf882c 2128->2129 2129->2105 2132 5bf8832-5bf8847 2129->2132 2132->2105 2146 5bf884d-5bf8870 2132->2146 2137 5bf872b 2133->2137 2138 5bf8735-5bf873b 2133->2138 2141 5bf894d-5bf8969 2135->2141 2142 5bf8943 2135->2142 2139 5bf8924-5bf8926 2136->2139 2137->2138 2138->2105 2143 5bf8741-5bf8765 2138->2143 2144 5bf896a-5bf8997 call 5bf3d90 2139->2144 2145 5bf8928-5bf8933 2139->2145 2142->2141 2157 5bf89af-5bf89b1 2144->2157 2158 5bf8999-5bf899f 2144->2158 2145->2135 2145->2139 2146->2105 2151 5bf8872-5bf887d 2146->2151 2154 5bf887f-5bf8889 2151->2154 2155 5bf88ce-5bf88d5 2151->2155 2154->2155 2163 5bf888b-5bf88a1 2154->2163 2181 5bf89b3 call 5bf9bf0 2157->2181 2182 5bf89b3 call 5bf8a30 2157->2182 2159 5bf89a3-5bf89a5 2158->2159 2160 5bf89a1 2158->2160 2159->2157 2160->2157 2162 5bf89b9-5bf89bd 2164 5bf89bf-5bf89d6 2162->2164 2165 5bf8a08-5bf8a18 2162->2165 2169 5bf88ad-5bf88c6 2163->2169 2170 5bf88a3 2163->2170 2164->2165 2173 5bf89d8-5bf89e2 2164->2173 2169->2155 2170->2169 2176 5bf89f5-5bf8a05 2173->2176 2177 5bf89e4-5bf89f3 2173->2177 2177->2176 2181->2162 2182->2162
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$d
                • API String ID: 0-3334038649
                • Opcode ID: e5ffd844ef7719840b2555ad41449b01d9bc25eee7c351ff992678aaccf97029
                • Instruction ID: 9fdc98c5e69233da71ae473dd029605f424b400e33ef6fdcfa2dff52ff1e4256
                • Opcode Fuzzy Hash: e5ffd844ef7719840b2555ad41449b01d9bc25eee7c351ff992678aaccf97029
                • Instruction Fuzzy Hash: CED16A35700606CFCB24DF29C484A6AB7F2FF89310B65C9A9E55A9B355DB30F846CB90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2252 59a2858-59a287d 2253 59a287f 2252->2253 2254 59a2884-59a28a3 2252->2254 2253->2254 2255 59a28c4 2254->2255 2256 59a28a5-59a28ae 2254->2256 2257 59a28c7-59a28cb 2255->2257 2258 59a28b0-59a28b3 2256->2258 2259 59a28b5-59a28b8 2256->2259 2261 59a2a86-59a2a9d 2257->2261 2260 59a28c2 2258->2260 2259->2260 2260->2257 2263 59a2aa3-59a2aa7 2261->2263 2264 59a28d0-59a28d4 2261->2264 2265 59a2aa9-59a2acd 2263->2265 2266 59a2ad0-59a2ad4 2263->2266 2267 59a28d9-59a28dd 2264->2267 2268 59a28d6-59a2931 2264->2268 2265->2266 2272 59a2ad6-59a2adf 2266->2272 2273 59a2af5 2266->2273 2270 59a28df-59a2903 2267->2270 2271 59a2906-59a2928 2267->2271 2275 59a2933-59a2994 2268->2275 2276 59a2936-59a293a 2268->2276 2270->2271 2271->2261 2277 59a2ae1-59a2ae4 2272->2277 2278 59a2ae6-59a2ae9 2272->2278 2279 59a2af8-59a2afe 2273->2279 2286 59a2999-59a299d 2275->2286 2287 59a2996-59a29f7 2275->2287 2282 59a293c-59a2960 2276->2282 2283 59a2963-59a297a 2276->2283 2285 59a2af3 2277->2285 2278->2285 2282->2283 2296 59a298a-59a298b 2283->2296 2297 59a297c-59a2982 2283->2297 2285->2279 2292 59a299f-59a29c3 2286->2292 2293 59a29c6-59a29dd 2286->2293 2298 59a29f9-59a2a52 2287->2298 2299 59a29fc-59a2a00 2287->2299 2292->2293 2308 59a29df-59a29e5 2293->2308 2309 59a29ed-59a29ee 2293->2309 2296->2261 2297->2296 2310 59a2a7b-59a2a7e 2298->2310 2311 59a2a54-59a2a78 2298->2311 2303 59a2a29-59a2a4c 2299->2303 2304 59a2a02-59a2a26 2299->2304 2303->2261 2304->2303 2308->2309 2309->2261 2310->2261 2311->2310
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884421172.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59a0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: 69d587f8277890fc65f3fec4e21c06344c45605339321f005d8669d9db80dd96
                • Instruction ID: 98c5378483a3eaf9ecfc511dbfafba35827192313abe27db73564cc950e46df4
                • Opcode Fuzzy Hash: 69d587f8277890fc65f3fec4e21c06344c45605339321f005d8669d9db80dd96
                • Instruction Fuzzy Hash: 3391BE35E04208CBCF18DFA9D5A86ECBBB6FF89315F50842AD456B7294CB355881CF60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2323 5bf7048-5bf7080 2325 5bf716c-5bf7191 2323->2325 2326 5bf7086-5bf708a 2323->2326 2333 5bf7198-5bf71bc 2325->2333 2327 5bf709e-5bf70a2 2326->2327 2328 5bf708c-5bf7098 2326->2328 2329 5bf70a8-5bf70bf 2327->2329 2330 5bf71c3-5bf71e8 2327->2330 2328->2327 2328->2333 2341 5bf70d3-5bf70d7 2329->2341 2342 5bf70c1-5bf70cd 2329->2342 2350 5bf71ef-5bf7242 2330->2350 2333->2330 2344 5bf70d9-5bf70f2 2341->2344 2345 5bf7103-5bf711c call 5bf3cc8 2341->2345 2342->2341 2342->2350 2344->2345 2356 5bf70f4-5bf70f7 2344->2356 2357 5bf711e-5bf7142 2345->2357 2358 5bf7145-5bf7169 2345->2358 2366 5bf727a-5bf729f 2350->2366 2367 5bf7244-5bf7264 2350->2367 2360 5bf7100 2356->2360 2360->2345 2374 5bf72a6-5bf72fa 2366->2374 2367->2374 2375 5bf7266-5bf7277 2367->2375 2381 5bf73a1-5bf73d8 2374->2381 2382 5bf7300-5bf730c 2374->2382 2395 5bf73da-5bf73ef 2381->2395 2396 5bf7361-5bf736d 2381->2396 2385 5bf730e-5bf7315 2382->2385 2386 5bf7316-5bf732a call 5bf24d0 2382->2386 2390 5bf732c-5bf7351 2386->2390 2391 5bf7399-5bf73a0 2386->2391 2406 5bf7394-5bf7397 2390->2406 2409 5bf7353-5bf735d 2390->2409 2398 5bf741f-5bf7425 2395->2398 2399 5bf73f1-5bf7415 2395->2399 2405 5bf736f-5bf7378 2396->2405 2396->2406 2401 5bf7437-5bf7446 2398->2401 2402 5bf7427-5bf7434 2398->2402 2399->2398 2400 5bf7417 2399->2400 2400->2398 2407 5bf737a-5bf737d 2405->2407 2408 5bf7387-5bf7393 2405->2408 2406->2390 2406->2391 2407->2408 2409->2396
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$(bq
                • API String ID: 0-4224401849
                • Opcode ID: c56e1f803590fb46109c6959afcf16f4fea11c643cce2a7ddc569fb0fe1029e9
                • Instruction ID: 55611187727b82b16920595eba4ab5ad96cee9ab91c33ef50f6406e3fe723ea6
                • Opcode Fuzzy Hash: c56e1f803590fb46109c6959afcf16f4fea11c643cce2a7ddc569fb0fe1029e9
                • Instruction Fuzzy Hash: 74518D313042158FCB159F29D854BAE3BA2FF84351F2485A9F9068B391CF39ED56CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$Hbq
                • API String ID: 0-4081012451
                • Opcode ID: d095da4f14b6d32bdb60408d6bfaeacda5f850db9e5c1e59e828fd5fe8865ee0
                • Instruction ID: 687637f8b5ba8716c075d037fd70f34a242f9e1f7e89cada30b291cfb9d71107
                • Opcode Fuzzy Hash: d095da4f14b6d32bdb60408d6bfaeacda5f850db9e5c1e59e828fd5fe8865ee0
                • Instruction Fuzzy Hash: 665189347042158FC719AF29C46452E7BB2FFCA34072549ADE6469B3A1DF35EC0ACB91
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$Hbq
                • API String ID: 0-4081012451
                • Opcode ID: 27fd20dd2d70f4c34c71f2618f72e04a0ccb2666c3809d77680471bb8de8ed4c
                • Instruction ID: 442e53f2c0cb7cd8c40ca18fe2925594e017cddc95c9c7265ec6ffd4996051c6
                • Opcode Fuzzy Hash: 27fd20dd2d70f4c34c71f2618f72e04a0ccb2666c3809d77680471bb8de8ed4c
                • Instruction Fuzzy Hash: 3351DE312047458FD324DF7AC45031ABBF2FF96360F108A69E58ACBA91DA38E849CB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$pbq
                • API String ID: 0-3872760177
                • Opcode ID: 0e2b82d2b22e70a9aea2b704602cae1a404eecee124cdf4cff2db11d5b4c766b
                • Instruction ID: 7e66a8cf8d9bd293af12bf07238ced6e93d3023af772378a69b1d53133d69896
                • Opcode Fuzzy Hash: 0e2b82d2b22e70a9aea2b704602cae1a404eecee124cdf4cff2db11d5b4c766b
                • Instruction Fuzzy Hash: 9D41C470A002069FCB04EF78C8407AEBBF3FFC8300F14892DE5499B255DB75A9468BA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: ,bq
                • API String ID: 0-2474004448
                • Opcode ID: ab39df87f39bea36c76872bfdf80ccce3ae5ae2707a99f460c7fd44073141ce7
                • Instruction ID: c791c6c1c73b2dcabd05676b1f39616dfc89709653f3427324aeddb816236ded
                • Opcode Fuzzy Hash: ab39df87f39bea36c76872bfdf80ccce3ae5ae2707a99f460c7fd44073141ce7
                • Instruction Fuzzy Hash: 20521A75A002298FDB24DF68C991BEDBBF2FB88300F1541D9E649AB351DA309D85CF61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (_^q
                • API String ID: 0-538443824
                • Opcode ID: c8ce12012588f0383eb1fc2727ae1ead03a5429fb72a474f1cbd1faf8ac3fc7f
                • Instruction ID: 1223e1dc4da08353b3acb63a17042370b07254b8fadd83e7901627fad1eca8a3
                • Opcode Fuzzy Hash: c8ce12012588f0383eb1fc2727ae1ead03a5429fb72a474f1cbd1faf8ac3fc7f
                • Instruction Fuzzy Hash: C9226E35A002059FDB14DFA9D4A4AADBBF2FF88300F1485A9EA069F391DB71EC45CB50
                APIs
                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05D5F1A7
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: d786e3dfea5371e7f0c08bcae90c9edec1880916c3a8c80f39601c3175adf7a7
                • Instruction ID: 9a94241ed37fb0c2c69a539566ca848c1a4071b985e9e8c7d90564f89513bb7c
                • Opcode Fuzzy Hash: d786e3dfea5371e7f0c08bcae90c9edec1880916c3a8c80f39601c3175adf7a7
                • Instruction Fuzzy Hash: 80A123B4D0021A8FDF10CFA9C885BEEBBF1BB49314F14916AE859AB240DB749985CF41
                APIs
                • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05D5F1A7
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: c34fc98db37583b905afea1890fb6fec1f322dd84ea917e83213e0376232fadf
                • Instruction ID: 5368bff4b67dacb17556e54b8389c34e7687b1f70628b642c656a4c560a3a0f6
                • Opcode Fuzzy Hash: c34fc98db37583b905afea1890fb6fec1f322dd84ea917e83213e0376232fadf
                • Instruction Fuzzy Hash: 3EA123B4D002198FDF10CFA9C885BEEBBF1BB49314F14916AE859AB240DB749985CF45
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05D5FA8B
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 1642b749e37561f4fce961c238d1cdd362719812912a75a833f4743152e82af7
                • Instruction ID: 81bdb72965e9fa63335bb2a18c68f95a352b9f0c7347508a40d651cb29ce4cf8
                • Opcode Fuzzy Hash: 1642b749e37561f4fce961c238d1cdd362719812912a75a833f4743152e82af7
                • Instruction Fuzzy Hash: 0A41BAB5D012598FCF00CFA9D984ADEFBF1BB49310F20942AE819BB250D338AA45CF54
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05D5FA8B
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 658b0351bd919e96e5f2efe6141a3709a063e8ee1cf3c4e8ab2aa4390621b3b3
                • Instruction ID: bb021d36ffb6d278b025f808657744f9cc8157ea57eb9d4f242b69850f0a9e2b
                • Opcode Fuzzy Hash: 658b0351bd919e96e5f2efe6141a3709a063e8ee1cf3c4e8ab2aa4390621b3b3
                • Instruction Fuzzy Hash: 4041ABB5D012599FCF00CFA9D984ADEFBF1BB49310F20902AE819B7250D774AA45CF55
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05D5F902
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 5ecae3ff66c9f56dc0517fd5391a3c9386390778715cfc7845859b53d7373820
                • Instruction ID: 95f12f74ec783031626c15041345d4fc8dffddaeaa22140678dcd7e05715b237
                • Opcode Fuzzy Hash: 5ecae3ff66c9f56dc0517fd5391a3c9386390778715cfc7845859b53d7373820
                • Instruction Fuzzy Hash: B031A8B8D04259DFCF10CFA9D880ADEFBB5BB49320F10A42AE819BB210D735A941CF55
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05D5F902
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 3639f26facfb8c464cdab431cbc9ccc5561e91145770c3af2ac7acc1f49a6b5e
                • Instruction ID: 0db37580def57d37121e4c735abed4844a41648522d8a531302f2801ea9a9e4c
                • Opcode Fuzzy Hash: 3639f26facfb8c464cdab431cbc9ccc5561e91145770c3af2ac7acc1f49a6b5e
                • Instruction Fuzzy Hash: 7831B9B9D00259DFCF00CFA9D980ADEFBB1BB49310F10A42AE819BB210D734A901CF54
                APIs
                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05C0D9DC
                Memory Dump Source
                • Source File: 00000000.00000002.1885529486.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5c00000_new policy.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 949cebded4edea88bd8d5787792a0d4d4f35d5e24889eba0a913b2b2aea9dead
                • Instruction ID: bb08c7371b8342cb3ca43de954068847ee0137e67e7d08756d1e6d9aa09f17ba
                • Opcode Fuzzy Hash: 949cebded4edea88bd8d5787792a0d4d4f35d5e24889eba0a913b2b2aea9dead
                • Instruction Fuzzy Hash: CF31A7B8D042189FCF10CFA9D884ADEFBF1BB49310F20A42AE819B7210D735A945CF94
                APIs
                • Wow64SetThreadContext.KERNEL32(?,?), ref: 05D5F3A7
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: 9fdaa387f33415a4da341236a31ceaed4f2099dca8ba516551de96df1eb99b0b
                • Instruction ID: 3df494fb6a742e75433565d2226a137c2aeca0a330243e19579998a53f7a6a6c
                • Opcode Fuzzy Hash: 9fdaa387f33415a4da341236a31ceaed4f2099dca8ba516551de96df1eb99b0b
                • Instruction Fuzzy Hash: 3741BBB5D012599FDB10DFAAD884AEEFBF1BB49310F24902AE419B7240D738A945CF54
                APIs
                • Wow64SetThreadContext.KERNEL32(?,?), ref: 05D5F3A7
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: dbc3466f93a6a092e9d688e6b7e6a4c34469af1da9a195563f6e82295e0f97d4
                • Instruction ID: 61f6080d8d879e09ada97f2b258b4af68e288928133062a1bea7ee6c1bf88dc3
                • Opcode Fuzzy Hash: dbc3466f93a6a092e9d688e6b7e6a4c34469af1da9a195563f6e82295e0f97d4
                • Instruction Fuzzy Hash: F731BBB5D012599FDB10DFAAD884AEEFBF1BB49310F24902AE419B7240D738A945CF54
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 150eb09b3577ff13042acb38e79f0a668727ccbb9f83740b1faaa42a54364514
                • Instruction ID: 158b34cd871d73270295fcac2fae1c4c792f6ac99462dec67ae59207cb97f383
                • Opcode Fuzzy Hash: 150eb09b3577ff13042acb38e79f0a668727ccbb9f83740b1faaa42a54364514
                • Instruction Fuzzy Hash: AF31CAB5D012199FDF10CFA9D981ADEFBF5BB49310F14942AE819B7200C738A946CF95
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: f79ab2944bdbebbe77b61156f248beef5225a98a5609d89df6204ba0210a5531
                • Instruction ID: 94673ae0c44157fc91442dd5cce4b174b8181af5cadc52b01868522279127d3f
                • Opcode Fuzzy Hash: f79ab2944bdbebbe77b61156f248beef5225a98a5609d89df6204ba0210a5531
                • Instruction Fuzzy Hash: 4031DBB4D012189FCF10CFA9D980ADEFBF5BB49310F14942AE819B7200C738A945CF94
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: ,bq
                • API String ID: 0-2474004448
                • Opcode ID: 9d5c230bf898c30f22276ea68358ad5811268a1539b5a031cb8ec34e2802e28f
                • Instruction ID: 89a21af1c338eb1beafd3637801d9d514abeb98a8d8366e685c79d0bd0bd8f9a
                • Opcode Fuzzy Hash: 9d5c230bf898c30f22276ea68358ad5811268a1539b5a031cb8ec34e2802e28f
                • Instruction Fuzzy Hash: E6C14D74A001298FDB14DB68C955BDDBBF2FF88700F1581D9E609AB3A1DA30AD85CF61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: Pl^q
                • API String ID: 0-2831078282
                • Opcode ID: 51dbf406860b62d43823e1774f143a5989e7257a65cd407418982e23cc169743
                • Instruction ID: 1de51b8a921c3b1bc7afeebe9886d31f0f56439244281fa2f7bc77a40cfff084
                • Opcode Fuzzy Hash: 51dbf406860b62d43823e1774f143a5989e7257a65cd407418982e23cc169743
                • Instruction Fuzzy Hash: EC91F270B001188FCB14EF68C484A6A7BF6FF89710B1184A9EA06DB3A5DB71ED45CB91
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: 30e98ff65c52dbfb2da7001843334b2b341de5deec0883b0850f886c18474fb5
                • Instruction ID: 2f7b7f6a1d53519d9c4815ad74f20cd5292745ab8da02ceeaa970b161968b192
                • Opcode Fuzzy Hash: 30e98ff65c52dbfb2da7001843334b2b341de5deec0883b0850f886c18474fb5
                • Instruction Fuzzy Hash: A5A19B34A10118DFCB08DFA8D899A9DBBB2FF88301F558555E506AB365DB70FC46CB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: d4af26eb54e4f07f8a595744fd1b984800f01137c70dfc4839348b7e40bd875f
                • Instruction ID: 9c3504a333b483105ace2422a8b4f3829782b6d2ddc47f3654a3ff1117a3d631
                • Opcode Fuzzy Hash: d4af26eb54e4f07f8a595744fd1b984800f01137c70dfc4839348b7e40bd875f
                • Instruction Fuzzy Hash: DD519D35A00616DFCB10DF69D480A6AFBB5FF85320F558AA9EA199B341C730F856CBD0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: pbq
                • API String ID: 0-3896149868
                • Opcode ID: df5c17e415a0af77e886344c7118583e9da80e80a2ea105a624d33223f51721d
                • Instruction ID: dcf50776c27a3cb79f4b99555de898540eb62784c4592227a35585207e13532a
                • Opcode Fuzzy Hash: df5c17e415a0af77e886344c7118583e9da80e80a2ea105a624d33223f51721d
                • Instruction Fuzzy Hash: 20515E76600104AFCB499FA8C955D69BBF3FF8C31471684D4E2099B372DA32DC22EB51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: de9087b49c9e3611b39c51e4cf127f892090320df096347dee7b53f8a1725055
                • Instruction ID: 88b0798cffd25c6e7ffc6d7574f525bee6aa6fada03e936bb8496df3db0a06c9
                • Opcode Fuzzy Hash: de9087b49c9e3611b39c51e4cf127f892090320df096347dee7b53f8a1725055
                • Instruction Fuzzy Hash: 1C518136704214AFCB059F69D814E697FB6FF89720B1680E6E209CF3B2DA31D816DB51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: 5cc5eb72cd0060fa107b17bd8610bb16b48146efd7fde1fc9edd593d300f07de
                • Instruction ID: b9bf84501277204d95c6d6ce2b9c1b4049cfff62c23868a582808a1840e6f622
                • Opcode Fuzzy Hash: 5cc5eb72cd0060fa107b17bd8610bb16b48146efd7fde1fc9edd593d300f07de
                • Instruction Fuzzy Hash: CA418730B106148FCB08EB68D898A6E77B7BFC9700F104559E5069B394CF74AC4ACB95
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: TJcq
                • API String ID: 0-1911830065
                • Opcode ID: 3594be4a40749301099a3102d6505a50fc894e132d9340e7ea576c0cde835148
                • Instruction ID: 6e38b12dd14432d83195943d440fd3b11b11eea242ff009bd07984493c0ea460
                • Opcode Fuzzy Hash: 3594be4a40749301099a3102d6505a50fc894e132d9340e7ea576c0cde835148
                • Instruction Fuzzy Hash: A551E678D00208DFDB54DFA9E9586ADBBF6FF88304F109469E815AB364EB385949CF40
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: dc81357663563eb5d5e047b11d327807b8b944b9bb35c663f270c36f27e3ecf8
                • Instruction ID: cbfbb10c06b46eab1ce799094b4c7e4fe9b752ca4b6e5db18044d8c13230e93c
                • Opcode Fuzzy Hash: dc81357663563eb5d5e047b11d327807b8b944b9bb35c663f270c36f27e3ecf8
                • Instruction Fuzzy Hash: 64210436304255AFDB145E6DD854A6E7F67EBCA360F10803AEA05CB360CE319C16C790
                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05C0EF9F
                Memory Dump Source
                • Source File: 00000000.00000002.1885529486.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5c00000_new policy.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: f22d4d379b1bc57db07a4616859a1b9cb2359d1b73bbb078de215779df218684
                • Instruction ID: 17b1247eb1507c431ca177cc2f2394dc503746abefc8a3640fc1534901b9b250
                • Opcode Fuzzy Hash: f22d4d379b1bc57db07a4616859a1b9cb2359d1b73bbb078de215779df218684
                • Instruction Fuzzy Hash: 9831B7B8D042489FCF10CFA9D880ADEFBB5BF49310F20A42AE819B7250C735A945CF94
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: e4439aab315512d112e3fbb98a91c4eec62365100469edde032e327b0024e36b
                • Instruction ID: 1279f372b87542e103e3dc4a3bde3d6aad4565b57876a2472b55b896ce0c4a83
                • Opcode Fuzzy Hash: e4439aab315512d112e3fbb98a91c4eec62365100469edde032e327b0024e36b
                • Instruction Fuzzy Hash: 4A31A536A00105AFCF04DF9CC855A59BBB2FF8C310B1544A9EA059B365DA31EC56CF51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: p<^q
                • API String ID: 0-1680888324
                • Opcode ID: 227a51110deb33e0133093913d8baec1c208ef3c8b4965ca679feb9641bc0c4a
                • Instruction ID: e7b4208556b63e957b1a26c30bbc794b628a9e03ad19bfd8bc85016554c340be
                • Opcode Fuzzy Hash: 227a51110deb33e0133093913d8baec1c208ef3c8b4965ca679feb9641bc0c4a
                • Instruction Fuzzy Hash: F6217C703041589FCB11CF2EC844AAA7BEAFF89311B144095FD06CB3A1CA71EC51CB20
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: p<^q
                • API String ID: 0-1680888324
                • Opcode ID: f376d76ffe0d75350f891d9b503712fb2d4d121d07d52b0ab0f136d4c6693f63
                • Instruction ID: 3b0ca0e8b90ce72e0c25d90aaeb70ea02cb5fd226826d83efec553bdc379c280
                • Opcode Fuzzy Hash: f376d76ffe0d75350f891d9b503712fb2d4d121d07d52b0ab0f136d4c6693f63
                • Instruction Fuzzy Hash: 1E2150713442489FCB15CF2AC854EAA7BF6FF8A211B154095FD06CB3A1C671EC55CB21
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884421172.00000000059A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59a0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: 6c46581bf7a22ac372305268f1ccb37834e5d5aeb03311f434f3bb2335f60d9c
                • Instruction ID: 463cf2705db9b5bb548a899957d62729d96c3a45d447fe563bbf6abb8d2682e3
                • Opcode Fuzzy Hash: 6c46581bf7a22ac372305268f1ccb37834e5d5aeb03311f434f3bb2335f60d9c
                • Instruction Fuzzy Hash: C6211476D04209CFDB18DFA9C4586FEBBB2FB88301F10842AD012A7290D7395A85CFE1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: 8bq
                • API String ID: 0-187764589
                • Opcode ID: 8a9696f4bbb0961954138aeb1bfda3d0a7d593aa819c050dab25b7a49d6dfe53
                • Instruction ID: ded0f6a8d655fa2b53088abdd3adf42c202e6754d7699add7742d51bd6a1b90f
                • Opcode Fuzzy Hash: 8a9696f4bbb0961954138aeb1bfda3d0a7d593aa819c050dab25b7a49d6dfe53
                • Instruction Fuzzy Hash: C3019E3970120ACFDB46EB28E464BB6B3E6FF85715F1484AAE0058F27AD7759C41CB41
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: M
                • API String ID: 0-3664761504
                • Opcode ID: 5e163fdcc53b5aa53cfd63b382de9312afc08fd7f96a4c32a712c8bc09f8d837
                • Instruction ID: 981b3e1cc25abe60803cab890927d3b6d8ded4245bb3c27f44f47b8f26be9062
                • Opcode Fuzzy Hash: 5e163fdcc53b5aa53cfd63b382de9312afc08fd7f96a4c32a712c8bc09f8d837
                • Instruction Fuzzy Hash: 0101D7B4944228CFDB60DF14D888BE8B7B5BB59384F10A8D5D499A7640DB749FC4CF01
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: E
                • API String ID: 0-3568589458
                • Opcode ID: 7706c63577c3ae88e9351d098d26f09a439637b17a24cf636fe16b03060cff0a
                • Instruction ID: 9106e6cfbcadb71c65dbb44576cbced2c764005c45201ff023cf46998b7161ba
                • Opcode Fuzzy Hash: 7706c63577c3ae88e9351d098d26f09a439637b17a24cf636fe16b03060cff0a
                • Instruction Fuzzy Hash: 71F02775A4414C4BDB95DF7CE8840CCBF61FB59A6574006AED94897242C734590F8B40
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: N
                • API String ID: 0-1130791706
                • Opcode ID: 0cb198fcbafeb2b7924f53b0c530eb5649ff72f755a15c33d7e791c51a6ef1ba
                • Instruction ID: f4fcbc53444ed54629bfc9d88812765965e0c364c52886e7341cbfb570caf016
                • Opcode Fuzzy Hash: 0cb198fcbafeb2b7924f53b0c530eb5649ff72f755a15c33d7e791c51a6ef1ba
                • Instruction Fuzzy Hash: AB01B278E01218CFDB61DF64C888BEDBBB6FB49310F14A9A6C409B2650DB745AC0DF55
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: A
                • API String ID: 0-3554254475
                • Opcode ID: 3fbb24973f97ead19842f5b8df683c06cf604ed1a7ebce6595dd54f279aa8ca9
                • Instruction ID: 206131e2c1f54b8cb005d845c2c019f0692058877966c401cd402090bbe74cb9
                • Opcode Fuzzy Hash: 3fbb24973f97ead19842f5b8df683c06cf604ed1a7ebce6595dd54f279aa8ca9
                • Instruction Fuzzy Hash: 93D05EF8B1821E8FCB04FF24D8183AEB7B6FB85300F505A86D8495B248DBB48D858F51
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 67b1f86d3c4430c9cc568d543de55b9c91cc89e302aeea211f3206bb2ffe6f5e
                • Instruction ID: ba8ec26b16445ce2087a16f06e973b4eb9a102f9d8f1cd9ea6e626b8905d3b8a
                • Opcode Fuzzy Hash: 67b1f86d3c4430c9cc568d543de55b9c91cc89e302aeea211f3206bb2ffe6f5e
                • Instruction Fuzzy Hash: AA12DD34B102198FCB54DF64C894AADB7B2BF89300F5185A9D54AAB365DF30ED89CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 277cdee3abd19a319b5fa42b4b462adfc1bdec2ebdc8429f83d575f2cf20f4ba
                • Instruction ID: 694b7e416b594f3a11426124ea4629fc8f1373a467efbcb979e502615b5aaef0
                • Opcode Fuzzy Hash: 277cdee3abd19a319b5fa42b4b462adfc1bdec2ebdc8429f83d575f2cf20f4ba
                • Instruction Fuzzy Hash: C7A11574E09248DFCB16DFA8C554AADBBF6FB49300F20886AD446AB350D734AE42CF10
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3d572d7f109390b88fa065797e0b4aa87ba05972a43683e30b532317e8676a5a
                • Instruction ID: 5a47b09355c9def726531d05c6f4e11ae2b56be84f8b96abd877c83a56db2f27
                • Opcode Fuzzy Hash: 3d572d7f109390b88fa065797e0b4aa87ba05972a43683e30b532317e8676a5a
                • Instruction Fuzzy Hash: C7A1EB34B002159FDB14DF64C998BA9B7B2BF89300F5085A9E54AAB365DF70ED89CF40
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3c7fdf074d0e7dfa8ba7fa45e4ecbb84a0b2dc563b76b2ccfc88483ab6704082
                • Instruction ID: ef52e04a4b9d60281e7d86804eea7888bd0fe452de86a6df185f96f9ff10252b
                • Opcode Fuzzy Hash: 3c7fdf074d0e7dfa8ba7fa45e4ecbb84a0b2dc563b76b2ccfc88483ab6704082
                • Instruction Fuzzy Hash: 2F811B347106149FCB18DF68D498A6DBBB6FF89710F1481A9E906DB3A5DB30EC45CB90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dcf28e8880a3b96dabc708a0f31dceb73ffae7481c8c27657315c607b173718f
                • Instruction ID: 083c1844ed9d263731b864c27db298a1a8ba22d767984d621eac63870aeee834
                • Opcode Fuzzy Hash: dcf28e8880a3b96dabc708a0f31dceb73ffae7481c8c27657315c607b173718f
                • Instruction Fuzzy Hash: FA816E39B012089FDB14CF69D958AADBBF2FF89311F2544A9E6029B350CB35ED45CB50
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ba106f4606cee19f6ea0aee0d04f9cd5268938ffb0c51cf5565a28a27e8d5c15
                • Instruction ID: 19a58aa8b08c098275ad9f38322003ddd23108d6b2792a15bbd72a0fa19454cd
                • Opcode Fuzzy Hash: ba106f4606cee19f6ea0aee0d04f9cd5268938ffb0c51cf5565a28a27e8d5c15
                • Instruction Fuzzy Hash: 2681E575A102189FCB25DFA8C48499EBBF6FF88310B1585E9E9169B360DB30FD45CB90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 89ad6293294aed318a8fd705e27cb10374e843278b42a57cdeccf284cf8e8ef9
                • Instruction ID: 1a40199ef8b4cba93f059f49f3ce86871281f73247831d7b196e65413767ba80
                • Opcode Fuzzy Hash: 89ad6293294aed318a8fd705e27cb10374e843278b42a57cdeccf284cf8e8ef9
                • Instruction Fuzzy Hash: 1B610B34B10614DFCB08DF68D898A6DBBB6FF89710F1485A9E9069B365DB30EC45CB90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8930d3b60a347c530bad81c78e275a1f29e955d36831e51c76152ca80f5478b4
                • Instruction ID: 29687655964f0bb4ae4d1ff1f02d79021b397cf39d6b219ae54548d3e9927fdf
                • Opcode Fuzzy Hash: 8930d3b60a347c530bad81c78e275a1f29e955d36831e51c76152ca80f5478b4
                • Instruction Fuzzy Hash: 3A516334B106099FCB04DF68E499AAEBBB6FF88711F10851AF50697364DF30A946CF91
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0375c85051d8ff2c3085180bf8c5a410b803d78b7e71fcfca18210e5898b4a72
                • Instruction ID: f59329e061c61d1abb07ed76d7ee87a36544e1770fe87c9952a3b7a1e6651ca6
                • Opcode Fuzzy Hash: 0375c85051d8ff2c3085180bf8c5a410b803d78b7e71fcfca18210e5898b4a72
                • Instruction Fuzzy Hash: F7414D34300605DFD7299B68D498B3A7BA3FF89700F1485A8E6064B795CB72FC86DB81
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6fc9655a04ceb55bd743a48a9b232e5331e0ca57f8a695c717b13863e5b8677
                • Instruction ID: 0a62e529286245acbb0a084dc3731933872e632be3e8867b7c50e01bc2dfebe7
                • Opcode Fuzzy Hash: c6fc9655a04ceb55bd743a48a9b232e5331e0ca57f8a695c717b13863e5b8677
                • Instruction Fuzzy Hash: E951FDB4D0821DCBDB04DFA9D8486EEBBB6FF98304F10A42AD555A3350E7745A45CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 62f8d0729631569a1772b822146a3f3bb9eab93bd2353083f360a2383390bbff
                • Instruction ID: 4534144571b26070d6718eb766ad8ee2ddd7480c85336a9286b57fc6edf10715
                • Opcode Fuzzy Hash: 62f8d0729631569a1772b822146a3f3bb9eab93bd2353083f360a2383390bbff
                • Instruction Fuzzy Hash: 25416A35A01208CFCB45DF68D494AA9BBF2FF49314F2581AAE805EB366D335AC81CF51
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 704b7a44ee4e86f8908cc7815b46e0088379d6676f1cefb1f701d9b23e9fdb46
                • Instruction ID: caecb5b23a19109040f261f28ab7680a2cb3db49184761d28376b1c758102d18
                • Opcode Fuzzy Hash: 704b7a44ee4e86f8908cc7815b46e0088379d6676f1cefb1f701d9b23e9fdb46
                • Instruction Fuzzy Hash: 0751B274D01208DFDB19DFA9D594AADBBB2FF88304F20852AE419AB350DB359946CF41
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7ffc176ba081903944dc1412d62e15d57caa2939a8c2a22a26264ccb164eca4a
                • Instruction ID: 1fe17e0f30f177787cab89d4b553888c70d50a4224edd0f7e6a11c60c24bbed8
                • Opcode Fuzzy Hash: 7ffc176ba081903944dc1412d62e15d57caa2939a8c2a22a26264ccb164eca4a
                • Instruction Fuzzy Hash: 95419C70E19208DFCB01DFA8C445BEEBBF6FB49304F1588AAD845A7361D7799A40CB91
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b7dfa44c4b100365effea5dd6df1139799507aba1051ba2066e12dda4c48ef12
                • Instruction ID: ca7a3899fbe7577eae47755c5639a94d03b3090250df29090dd8eb08c4714818
                • Opcode Fuzzy Hash: b7dfa44c4b100365effea5dd6df1139799507aba1051ba2066e12dda4c48ef12
                • Instruction Fuzzy Hash: 3741C270D01208DFDB19DFB9D594AADBBB2FF88305F24852AE419AB360DB359942CF41
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7c21e258960cdbafa2a9927348606990d4d48063c2c966f278ad8852b6e191d
                • Instruction ID: 48674158be26b91717835bf986f2b739fd486df84e1960a5fe60cfd20a72af29
                • Opcode Fuzzy Hash: c7c21e258960cdbafa2a9927348606990d4d48063c2c966f278ad8852b6e191d
                • Instruction Fuzzy Hash: 64418B35A05209CFD706DFA8E1847AAB7B3FB81319F1082B9C0068F799D7759986CB81
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6c9597437b1353111e80592ff455f752f38c8b8224b618406000004f941bd108
                • Instruction ID: c5630f4605b9194e703540856219e69b395cc98ea7c6532b46e522ba1c832efa
                • Opcode Fuzzy Hash: 6c9597437b1353111e80592ff455f752f38c8b8224b618406000004f941bd108
                • Instruction Fuzzy Hash: 61419135A401189FDF15DFA4D895AEEB7B6FF88310F1080A5D906BB254DB70AD06CBA0
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 83ecd3c90477e861a99ce050324b800d5fa55cd87c096776915eae9eab187514
                • Instruction ID: 89310c22266c96237ec78c723b83f412ce566670fbc74bcb4f37ad6e5da5f34d
                • Opcode Fuzzy Hash: 83ecd3c90477e861a99ce050324b800d5fa55cd87c096776915eae9eab187514
                • Instruction Fuzzy Hash: BE31F5366101049FCB05DF59D898EA9BBB2FF48320B1680A9EA099F372C731EC55DB40
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 95313b29686606ef46f28ae81fe8230213f6818bd62f55ac17cc0c89fa9323f6
                • Instruction ID: 3983bfddaa1de503058fe3636bba631fb7add574f8b1e4b5e6645b95199911fb
                • Opcode Fuzzy Hash: 95313b29686606ef46f28ae81fe8230213f6818bd62f55ac17cc0c89fa9323f6
                • Instruction Fuzzy Hash: 3F416736A05209CFD706DF98E284BABB7A7FB84308F508279C0068F799D7759985CBC1
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 44b802c4137d171668f2d54e84cafc9db5ea5f8a0bb60abd496de75d5a313024
                • Instruction ID: ce20e611bfac1f8f360283dbb0e3ec486bea3d020495475dffd2524b18a53b70
                • Opcode Fuzzy Hash: 44b802c4137d171668f2d54e84cafc9db5ea5f8a0bb60abd496de75d5a313024
                • Instruction Fuzzy Hash: E3417E79A0061A8FDB14CFA5CC55ABEBBB2FF84340F008479D616D7290D774E949CB91
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7076952f5e3162d2f564d6195c23b4514c2e08d81dd636cfeff04d6a20443b1b
                • Instruction ID: 67c64064ad744805e16104f2436bf5291da6f8632fdf10f84689264dd293a95f
                • Opcode Fuzzy Hash: 7076952f5e3162d2f564d6195c23b4514c2e08d81dd636cfeff04d6a20443b1b
                • Instruction Fuzzy Hash: EE31BDB4C092499FEB01EFA9D0597EDBFF0FF06304F5484AAD494A7252D7344A4ACB02
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e57473787b3f77730a327888be2b76e4eee601f4443851991efaade35d9972f1
                • Instruction ID: 9fae4595f917576f3d9db0060a0d3291603fe06d0d74816492cb696a238268d3
                • Opcode Fuzzy Hash: e57473787b3f77730a327888be2b76e4eee601f4443851991efaade35d9972f1
                • Instruction Fuzzy Hash: 6F411278A412288FEB24CB24CC95FA9B7B1FF59320F1041D5EA09AB3A1C631ED85CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 82cb0bcf86c72f2399f01a77efd664f3f28337e385243ed1c21c535826370033
                • Instruction ID: 4f96fbbae812ac97f78ebff656916c490107938c6ee2a24c17008854e6ed7d54
                • Opcode Fuzzy Hash: 82cb0bcf86c72f2399f01a77efd664f3f28337e385243ed1c21c535826370033
                • Instruction Fuzzy Hash: 013133B0D052498FCB01CFA9D64A6EEBBF5EF89304F1484AAD459E7321EB349949CF11
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2817e7d7d399f7735cfcf86fed85a1394d003fe481d99bafb8c98c084154e379
                • Instruction ID: 1248c03ed8d20d63c8747fe41634b14038035491a8f842c27d7ed4b57cb853dd
                • Opcode Fuzzy Hash: 2817e7d7d399f7735cfcf86fed85a1394d003fe481d99bafb8c98c084154e379
                • Instruction Fuzzy Hash: 89317E387006018FD724AF25D45466ABBB6FFC5341B1449ADEA468B361DF31E846CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c72f71f988adcbb029554986b39657330ae0fb687a669af9527ce48268dd10ac
                • Instruction ID: 39343520d098fe35d4c83204ac984a0ce3047ebb843711cfd55ac6f5bba9f15f
                • Opcode Fuzzy Hash: c72f71f988adcbb029554986b39657330ae0fb687a669af9527ce48268dd10ac
                • Instruction Fuzzy Hash: 492183313052049FC7259BAEE884A6EBBA5FFC5361B15C4BAE24EC7251DA31F845C750
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c313b5541bf461eb9b9d60e90279faedf71653b6bb82e9a3e97f3b8b72e76b95
                • Instruction ID: 82585555516f4772c6c5c5ab7efa7776e428510f22bebfc188c6ea7d8531ea6b
                • Opcode Fuzzy Hash: c313b5541bf461eb9b9d60e90279faedf71653b6bb82e9a3e97f3b8b72e76b95
                • Instruction Fuzzy Hash: 693108B5E04209CBDB04DFA9D4946AEBBFAFB88304F108466D429A7359D7355942CF90
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cc89113bfbe553a1f9e55ff76d53a44f5f9351bdb732e839acf4dc67e6bf15d1
                • Instruction ID: c3176decd1be7f82bedc341aa4a11ed37fd49f1db5d3278a539c808f21f104d4
                • Opcode Fuzzy Hash: cc89113bfbe553a1f9e55ff76d53a44f5f9351bdb732e839acf4dc67e6bf15d1
                • Instruction Fuzzy Hash: E73105B5D01209CFCB04CFA9D6496AEBBF5FF49304F1484A9D819A7320EB349A48CF51
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c84adeb94e2611ae75a41cb6cbc2d4ecde5a9cf9fea9b4fa0d8df9df73ed0e9d
                • Instruction ID: 391d54723d7b77d60fa7f876e76b24ed4a254e85a48e814496725593d55207b3
                • Opcode Fuzzy Hash: c84adeb94e2611ae75a41cb6cbc2d4ecde5a9cf9fea9b4fa0d8df9df73ed0e9d
                • Instruction Fuzzy Hash: 7431C339A00108CFCB44DF98E594AA9B7F2FF88315F2585A5E809AB766C734EC81CF51
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76d69ccb96513f57fc6fb0ba1182e1e89d681df48a9019775abc0e3cd222a919
                • Instruction ID: a488c92641a2d586b67916c1eff6ea8035c5be93ca2bee8b49e62ae21f805464
                • Opcode Fuzzy Hash: 76d69ccb96513f57fc6fb0ba1182e1e89d681df48a9019775abc0e3cd222a919
                • Instruction Fuzzy Hash: D531D4B4D05208DFDB05CFAAC9456EEBBFABB88300F14946AD419B7350E7389A45CF64
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 545673a2991cfd7475afa0b82ab812bc9d425a3a5c9a2aa66e309691c1703c09
                • Instruction ID: a413908b1e3ab8518556516339e5a18b00319cb9c08251cf925bd8563323b6e9
                • Opcode Fuzzy Hash: 545673a2991cfd7475afa0b82ab812bc9d425a3a5c9a2aa66e309691c1703c09
                • Instruction Fuzzy Hash: 9721A239B001198B8B10CEB9E8864BEF7F6FF8426171148B6D616D7340DB31EC19CB61
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4c4ca7646fa449badabeb3b34fb48d5bceeb6a2af8d3d058edb95a0084ba4442
                • Instruction ID: 0532d148ca8ccc4e285535b3ce71cbbca8282b398a9b2a8d961d447c68eefd2f
                • Opcode Fuzzy Hash: 4c4ca7646fa449badabeb3b34fb48d5bceeb6a2af8d3d058edb95a0084ba4442
                • Instruction Fuzzy Hash: 91212731E002599FDF00DAB4E544BBBBBF5AB44244F1080A6D61AD7290E734EA59CB91
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3bea5fb4ede134182eba58283959aa28fe0cc40afebd92821e066a3fd4637e61
                • Instruction ID: c1f84ea04d565c2ff44e79ada13814bfe9fb71e399dc855266b3d3691ffdb044
                • Opcode Fuzzy Hash: 3bea5fb4ede134182eba58283959aa28fe0cc40afebd92821e066a3fd4637e61
                • Instruction Fuzzy Hash: 59317AF4D04208DFEB00EFA9D0497AEBBF5FB45308F50819AE499A7340D7744A89CB02
                Memory Dump Source
                • Source File: 00000000.00000002.1862401086.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_109d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 38dcf8265e9f08520ddf105c43dac2ad2d12b1991a7de5617f84e546b0cc8b93
                • Instruction ID: 71377969fb4a8190397ea18ba640ec047023f60ad6d1973f9b75e0fe3f148965
                • Opcode Fuzzy Hash: 38dcf8265e9f08520ddf105c43dac2ad2d12b1991a7de5617f84e546b0cc8b93
                • Instruction Fuzzy Hash: B82145B1544240DFCF11DF58D9D4B2ABFA5FBC4354F24C5A9E9890B242C336C406D7A2
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 90a59668ea93ead1067e7c4ba3e18c9dab028fbbc4758bd6755d66a072f390cb
                • Instruction ID: ac9ac87191b4fbee7a69519cd2ae0b677b0fe8859b9124a1f0ded1531db99b60
                • Opcode Fuzzy Hash: 90a59668ea93ead1067e7c4ba3e18c9dab028fbbc4758bd6755d66a072f390cb
                • Instruction Fuzzy Hash: E5214C35E00109EFCB14DF69C854ADEBBB6EF8D320F15852AE911B7390CA719845CBA0
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa0f4adfceba92f1fa9db50fa390b2625e630c524bd98c1d27577e5580dbfbaf
                • Instruction ID: 5675491fb8a9b14e867de5d93c10162debbd0001a2612414894e270f2a199818
                • Opcode Fuzzy Hash: aa0f4adfceba92f1fa9db50fa390b2625e630c524bd98c1d27577e5580dbfbaf
                • Instruction Fuzzy Hash: D5211575A002098FDB05DF98D985ADEB7F2FF88300F2045A5E505BB3A1CB76AD45CBA0
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 92381cd313e250b360215e7d665191f9b0f26a61a49b4cef37379000deab7d23
                • Instruction ID: 41b3688edcd886b3898558d8a34a47b1a576593ab8c5f7869304a806208796da
                • Opcode Fuzzy Hash: 92381cd313e250b360215e7d665191f9b0f26a61a49b4cef37379000deab7d23
                • Instruction Fuzzy Hash: CA211BB4E0420ADFCB15DFE9C9846BEBBB6FB48300F14856AC815A7354D7349A81CF91
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5feba4afdc42dd38f359bc08ae6bf81ec1b95cc0d99711282a8f01107dea300b
                • Instruction ID: 5c1f21b1256af3a4ab802a800d933afb689ec106ea52d4c350ba30580f68faf2
                • Opcode Fuzzy Hash: 5feba4afdc42dd38f359bc08ae6bf81ec1b95cc0d99711282a8f01107dea300b
                • Instruction Fuzzy Hash: 6321F970A002065FCB24EB38D4557AEBBB6EFC5300F10493AE44ADB645DEB4995A8BA0
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eba1a2a037a6ba1b02802accf2e2238cc6427a3ccfad662e0f96237ae599534c
                • Instruction ID: b3db859e8a89bdae2549d01c704b47ce1936b0e641825f6a909258da8435494a
                • Opcode Fuzzy Hash: eba1a2a037a6ba1b02802accf2e2238cc6427a3ccfad662e0f96237ae599534c
                • Instruction Fuzzy Hash: 97219D70900516EFCB04DF58C8C4AAAFBB6FF84340F51C5A9EA059B606D331F899CB94
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 46d4af3bab98c1e8c3a36d418fbec8905830aadf04702a9c3b506c65032f09e5
                • Instruction ID: 5af11f5888751a2f35167b46d0869765c1ad6615944fffc748c399c18f4be914
                • Opcode Fuzzy Hash: 46d4af3bab98c1e8c3a36d418fbec8905830aadf04702a9c3b506c65032f09e5
                • Instruction Fuzzy Hash: C211B4357002049FC7159A64D454B7F77A3FBC9320F1485A8D6465B790CB71EC469B90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 88fa942707b1c6d9ec2a4a0f85a92ba697a5868d2d0bdefa2204438baf55c231
                • Instruction ID: e9d2b2ca0f87d8a41db0c772976a5045c074be06c8927df2bb06c889f25543d6
                • Opcode Fuzzy Hash: 88fa942707b1c6d9ec2a4a0f85a92ba697a5868d2d0bdefa2204438baf55c231
                • Instruction Fuzzy Hash: 1C21B135B106048FCB14EF68D984AAEB7F6FF88710F144569E506A73A4DB30ED08CB61
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5e9559208f61500edb94a055a24b053966e63c02a921e33fe8d45111f9d13365
                • Instruction ID: ea1e25a78c277ebdb6c61a998c7a01cc2157824c48da93ffe6af29cb7a5ff2a2
                • Opcode Fuzzy Hash: 5e9559208f61500edb94a055a24b053966e63c02a921e33fe8d45111f9d13365
                • Instruction Fuzzy Hash: E8113771D1421DCBCF15CF99E5446EEBBF9FB88314F04A42AD504B3210DB781A45CBA0
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 011b4c2cf9624c72a7d3a6dd9b888f892902a487801735f8e19a531297d75b96
                • Instruction ID: ffaf2742ea4f75c7ab2b75272ebf129d088be2c737201d6220768f3fbdd3f707
                • Opcode Fuzzy Hash: 011b4c2cf9624c72a7d3a6dd9b888f892902a487801735f8e19a531297d75b96
                • Instruction Fuzzy Hash: A10184353101005B8B14AE2DE4D596AB7ABEFD8621314807FE60ACB355CF71DC498B90
                Memory Dump Source
                • Source File: 00000000.00000002.1862401086.000000000109D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0109D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_109d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d4debc72d566a432075444213d0986bb668aee8537d1fa8b58e63e6cf4e4d047
                • Instruction ID: 9ce346339c29d8350e0a1055692f4dd68ff6376502404c7767a9ebae6e8b6af1
                • Opcode Fuzzy Hash: d4debc72d566a432075444213d0986bb668aee8537d1fa8b58e63e6cf4e4d047
                • Instruction Fuzzy Hash: 99110076444280CFCF12CF58D5D4B16BFB2FB84314F24C6AAE8490B656C33AD41ADBA2
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 69a41582644321717649bb33cc742511f7dce3d872762e0b42663f2d502824b0
                • Instruction ID: 3ca5c1a2b6f55408757f27b95cb70520fa76f19838cfe2f7278bbcf103299d8f
                • Opcode Fuzzy Hash: 69a41582644321717649bb33cc742511f7dce3d872762e0b42663f2d502824b0
                • Instruction Fuzzy Hash: 4111A031B002059FDB64DF6CC8057AEBBF6EF88640F15846AE615DB380EA30D906CBA1
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ebf8e28cb946783d1d60d854e7a7046a26c23e8a1a77fd1b995ec82f04377a2b
                • Instruction ID: 054b0a5a1f1797151147ca4e9dfee00c05808ba63cf40b518bf015f614bb248b
                • Opcode Fuzzy Hash: ebf8e28cb946783d1d60d854e7a7046a26c23e8a1a77fd1b995ec82f04377a2b
                • Instruction Fuzzy Hash: D91127B4E082099FCB56DFE9CA412AEBBFAFB45300F1485AAC449E3301E7354A41DB81
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c4db85276b0d9e2641300e42e308c298cfc0ea9351d282ee6cb1dd7b56b7e067
                • Instruction ID: bd7dbdd59db8db420de394af165f388843cc81ee8b7562cdc02fe8e377c22477
                • Opcode Fuzzy Hash: c4db85276b0d9e2641300e42e308c298cfc0ea9351d282ee6cb1dd7b56b7e067
                • Instruction Fuzzy Hash: C4018436340214AFDB108E59DC84FAEB7A9FF89721F118066FA05CB290C6B1D8148750
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7222a54472588b7a38a111e1867e245b2afc24ef4c4127f53b6396198cef4d41
                • Instruction ID: 711c0a2ff465964a6398b007047f83730917af82a61e266c4e65172da92cdb9d
                • Opcode Fuzzy Hash: 7222a54472588b7a38a111e1867e245b2afc24ef4c4127f53b6396198cef4d41
                • Instruction Fuzzy Hash: 41014C367091058FD70A977AB81867AB7A7FBC9314F58807AD145CF259CA740D46C781
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 11292355b0f9b323a32d24575c8e638b89923d4d333eeeb7fd302fbec3127f68
                • Instruction ID: 29373276fab26b2f33c94edcb12fb80fc65eae9f912bed371ee829cc124f9323
                • Opcode Fuzzy Hash: 11292355b0f9b323a32d24575c8e638b89923d4d333eeeb7fd302fbec3127f68
                • Instruction Fuzzy Hash: 4021A274A112288FCBA1DF28C955BD9B7F1AF49301F5041EA994EA7350DB309E85CF41
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1c1250c7500351e344905cc67eca9867bd4469bbb3819387d6e931d3c87d08ae
                • Instruction ID: 8af2c0a56d7c356ae814a260caeb324cb41b0d9526c6f86e1c310a7979bf1a37
                • Opcode Fuzzy Hash: 1c1250c7500351e344905cc67eca9867bd4469bbb3819387d6e931d3c87d08ae
                • Instruction Fuzzy Hash: 6911B7B4E0020A9FCB44EFA9C9556AEFBF1BF88300F10856A9558A7354DB349A418B95
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d6d3c8d6a161507ad243cd76581eeb17d52979ff80203373f3be6e86e295b243
                • Instruction ID: e96af77092a189e1e99f2b59f105832de3cc479261f49f8b4f3a357d541e9ebc
                • Opcode Fuzzy Hash: d6d3c8d6a161507ad243cd76581eeb17d52979ff80203373f3be6e86e295b243
                • Instruction Fuzzy Hash: A4017131301644AFC7299B64D458A3B77A3EBCA320F1486A8E6564B794CB75FC46DB80
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ba602b03780b73a47e708606fe462272e6dba3322771ee8a6d3f974b5f584f05
                • Instruction ID: 616f9350a9fa000a48d76b266c1e44c2d2e3dc249e9e85bb66a55576faf66347
                • Opcode Fuzzy Hash: ba602b03780b73a47e708606fe462272e6dba3322771ee8a6d3f974b5f584f05
                • Instruction Fuzzy Hash: FFF068712006069BCB10DF19DC82F8BF7AAEFC0314F20CA2BB91787751DA74E9558690
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2b941910727d2b099ebd6e87a12727cadcf76d9d9d4e14f4275af1484fa5209c
                • Instruction ID: 75b1357f155956d318f478d5eeddb62f4572e389a11304b159d8e565ec2b8636
                • Opcode Fuzzy Hash: 2b941910727d2b099ebd6e87a12727cadcf76d9d9d4e14f4275af1484fa5209c
                • Instruction Fuzzy Hash: 21018F793009159FC7199B28D459A1ABBB2FBC8711B10846AE90A8B794DF71EC42CF85
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 68ea81ae30e9509d182bc7fd3102f02afef76ab5978c41d08894f29b4e65f1b9
                • Instruction ID: cbb73eb93fe68a537d4b1e2265ea731c34edf22c17aca2a61dab5386694857ab
                • Opcode Fuzzy Hash: 68ea81ae30e9509d182bc7fd3102f02afef76ab5978c41d08894f29b4e65f1b9
                • Instruction Fuzzy Hash: 21F02B367001086BCB189A19D8889AEF3AAEF84220F448165FD19D7361EF30AD1B8791
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aba061dd648ca556db43a14b687db055a15797c6ceb5867a37a536ac8778860a
                • Instruction ID: 6d664ae172e4e2e69a740b9ea993adbfde8b63d5bc1e353827068883b227f217
                • Opcode Fuzzy Hash: aba061dd648ca556db43a14b687db055a15797c6ceb5867a37a536ac8778860a
                • Instruction Fuzzy Hash: BFF04632F092151FE3049658D81572BBBA5EBCA310F1484A6E50A9B392DA71AC058790
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb14ff36088c33600318a8365f177aa77d8fefd70888f95d54dfe48440c7c8d5
                • Instruction ID: 733af99c4d8703d50627b43be0e1f93fff2424249b4ad9ee374474b8560c1f91
                • Opcode Fuzzy Hash: fb14ff36088c33600318a8365f177aa77d8fefd70888f95d54dfe48440c7c8d5
                • Instruction Fuzzy Hash: 730181393005149FC7099B28D058A1ABBA2FBCC711B108569E90A8B794DF71EC42CFC5
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9784702b065c6c03757e7096f8124a642cc31d11c1a846d1b445b5c0f128caf7
                • Instruction ID: adbb3362aec4f9e7103d606536cc5a09188ba8d97f48bfb2d63a6e9a626eae70
                • Opcode Fuzzy Hash: 9784702b065c6c03757e7096f8124a642cc31d11c1a846d1b445b5c0f128caf7
                • Instruction Fuzzy Hash: 0BF0F9B5E09208EFCB52EFA8D9456ADBBF9FB49301F1080E5D80997351D7369A00DB85
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 35435ab62507d7a95af0e6d5e428e08ef7bd0ed94fe97e85597ca6d607bf8744
                • Instruction ID: d0a62223164648c13884373ceeda7100de8c38b3fa01e3be8e5e5c77fe64830d
                • Opcode Fuzzy Hash: 35435ab62507d7a95af0e6d5e428e08ef7bd0ed94fe97e85597ca6d607bf8744
                • Instruction Fuzzy Hash: B701F6B0D05209DFCB45EFB8D9453AEBBF8FB08205F1445AAD409E3380E7344A80DB92
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ec2f796332d0d9407c6df409e611fb2f392d06cb793f0efa51f7d46763d8aee9
                • Instruction ID: 63a270f7831ccbb846b30551a21110805ebfee4fe0155d115e612f01cb6b586b
                • Opcode Fuzzy Hash: ec2f796332d0d9407c6df409e611fb2f392d06cb793f0efa51f7d46763d8aee9
                • Instruction Fuzzy Hash: 51F04F353102009FD7089F19D446F6A77A6EB89721F244469F506CB761CA31EC829B40
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e4d83858d71484c15c842fa858b91cd3472e7a6b4a9f13464bf8d85f57837721
                • Instruction ID: bee45cd34d4708d2fdddc3f63d46f6d08bdedade3e4d6238e7a3a2ec2c27a1c6
                • Opcode Fuzzy Hash: e4d83858d71484c15c842fa858b91cd3472e7a6b4a9f13464bf8d85f57837721
                • Instruction Fuzzy Hash: 1AF02B62F0E3554FF312523C1815325BFA2DBD6200F1984DBC6878F2B3E956AC0AC350
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bb179fa2858aa66a9c893ce921f2c99373d7a1a0767e4601a3852bb42ee0a17b
                • Instruction ID: 3fb1c592e60f9100f18e0dcb38bffbde850d13d5574cd8600a4ecfc72d073532
                • Opcode Fuzzy Hash: bb179fa2858aa66a9c893ce921f2c99373d7a1a0767e4601a3852bb42ee0a17b
                • Instruction Fuzzy Hash: 1501A476911229CFC711DFA8E5192BABBF9FF04B14F1441ABD8459B615E3711A00CBC0
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 37e1df36bab08f0cd630ea00a3610efda2e91d99471988c894f5937c1d01a7b3
                • Instruction ID: 787ac995c712fbd96da43dd24c98739179819d2b406239f3e1e35c74538e322f
                • Opcode Fuzzy Hash: 37e1df36bab08f0cd630ea00a3610efda2e91d99471988c894f5937c1d01a7b3
                • Instruction Fuzzy Hash: C1F05931F042161FE314960C981472FF7AAFBC8310F148469E50B9B351DB71BC4183C0
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 31e116009bf53e2efef452a207a19ac039916771772ab16094061f35e5e907dc
                • Instruction ID: 1cbd52fb0bd9a722600a3854a24b424a709deca0d3c9df91b82217b951ca69e6
                • Opcode Fuzzy Hash: 31e116009bf53e2efef452a207a19ac039916771772ab16094061f35e5e907dc
                • Instruction Fuzzy Hash: 56012C74D0D288DFDB09CFECE5887A8BBB1FB01314F1844BAD41AAA256D7365955DF00
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e668af9905864e0add0c9436f9b7dadba740a8cb4c81461c6530a9a1dbbdf654
                • Instruction ID: af1937b1d7d7593e39101a870b335f28756883db0563ff796e42c399dd65c9a0
                • Opcode Fuzzy Hash: e668af9905864e0add0c9436f9b7dadba740a8cb4c81461c6530a9a1dbbdf654
                • Instruction Fuzzy Hash: 96F08236340241CFD704CF2ED884F59B3A5FF9A626B55C5AAE616CB321CB71D809CB50
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dd01d777bf0208cc7187fbbf9dd4b224c7b31b2177d8901e01df8b34465ad2c6
                • Instruction ID: 5d0cfda646ec1f20079822ca44ebff6216426cf5c4e7864fb77e659027f61018
                • Opcode Fuzzy Hash: dd01d777bf0208cc7187fbbf9dd4b224c7b31b2177d8901e01df8b34465ad2c6
                • Instruction Fuzzy Hash: E8F0BE323053445ADF609775DA467A63390EB06264F2515DAC7128A681EA22B84BC710
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 71d57e0454c40d55291c5d25c4d6ec79506c0f57b42438c8649f289de4a5127b
                • Instruction ID: 7c32eafb5989aa7c0d7208cd251267f6fecb1136fc9f8d3c9dd4d2844ec5e238
                • Opcode Fuzzy Hash: 71d57e0454c40d55291c5d25c4d6ec79506c0f57b42438c8649f289de4a5127b
                • Instruction Fuzzy Hash: 5BF01C363406159F8704DF6ED884D5BB7A9FF8A66131184AAFA06CB321CA71E818CB90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a69df9e922f54fe513f7dde047b63e4a9df04e3f773de82b66d30316110fab1a
                • Instruction ID: 116b78a54ebd0ad74372a6747be3e9e90674cf1dd1dd4f4c2ec1ea04127a6a3a
                • Opcode Fuzzy Hash: a69df9e922f54fe513f7dde047b63e4a9df04e3f773de82b66d30316110fab1a
                • Instruction Fuzzy Hash: 31F0AF7B250114AFCB469F94E905E507BB6FB1C22171680D1F2098B232C332D821AB90
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9757159840346e3c413a4a7e7271c4bc5b6705a362eafbfff5b1556181ba228f
                • Instruction ID: 207c039c2ac626ce06e2a81728b6816925e6ca8c2a730fad20e7068fbbe767ff
                • Opcode Fuzzy Hash: 9757159840346e3c413a4a7e7271c4bc5b6705a362eafbfff5b1556181ba228f
                • Instruction Fuzzy Hash: 7CF09670909248EFCB41DFA8C851AADBFF4BF49301F04C0EAE958D7342D6399A11DB50
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f3dcdd4f34a8c4b2367d8da503a41e6945e1b1eb07e09ae14e1a3180db9e506f
                • Instruction ID: 0bd2b6837bb59add1b4048268157baf904075113fb30f8442e2d50bef904634b
                • Opcode Fuzzy Hash: f3dcdd4f34a8c4b2367d8da503a41e6945e1b1eb07e09ae14e1a3180db9e506f
                • Instruction Fuzzy Hash: FEE06C712002065BC710DA1EDC85A4BFF5BEFD0324B24C936B406C7715CD74D9474A90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fef186b1bb76e63e1ec94d913d2669050ea4c6ec64c5f5d93159435e89765d6
                • Instruction ID: 35b087eaaa94110db4e61cd0c0f1ebbf414f7fd8d6b2a78eb92cb99d0cde322e
                • Opcode Fuzzy Hash: 1fef186b1bb76e63e1ec94d913d2669050ea4c6ec64c5f5d93159435e89765d6
                • Instruction Fuzzy Hash: F0F0E231904618AFEB05CB95D44D3CDBFB6EB85224F14C495D106D7340DB301686CB84
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 23d679b65737fd95aab87736d20a7a6806a67cb6973c13fed6460876dbf569c7
                • Instruction ID: bac8f7681e08f061a90a054386db8bd921c45215596c1415a83c29deb5af641f
                • Opcode Fuzzy Hash: 23d679b65737fd95aab87736d20a7a6806a67cb6973c13fed6460876dbf569c7
                • Instruction Fuzzy Hash: CEF03A393102009FC3089F1DD454D2A77AAEFC9721B1044AAFA06CB360CE31EC82CB90
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 711e9598650882a1c221f4880d75e72c12aa4cdc45eb5636bcdb78931b7cabd5
                • Instruction ID: 84e03726e02f702064e00507218f7913f0ea0821e2e43b6e3a08fecac2eab7e9
                • Opcode Fuzzy Hash: 711e9598650882a1c221f4880d75e72c12aa4cdc45eb5636bcdb78931b7cabd5
                • Instruction Fuzzy Hash: F2F0E27190B3896FC702DB78D9127CA7FB1DB43244F2541E6D588CB383D42A9A0A8351
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 70a2091b7235a9cb2387b6d5f03bdf22691f867fa48db4ad44cc0c78c9396201
                • Instruction ID: 1e4bea67b4f833b36c82891cd79a6a882e2bb7e10da85d0b5b32168b610dbeb2
                • Opcode Fuzzy Hash: 70a2091b7235a9cb2387b6d5f03bdf22691f867fa48db4ad44cc0c78c9396201
                • Instruction Fuzzy Hash: FFE0206530952247DB39092DAC46B66E9E5EBC5B24F50027FF946CB304D800CC874FF5
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 89c818efed1275c10ebbf618396816d5aba3b79f9ba9a1ec180984d9d44a45ba
                • Instruction ID: 61a4f78c556c9523948619b1161ae62d37539ef3755010b0f646421ebf99a90a
                • Opcode Fuzzy Hash: 89c818efed1275c10ebbf618396816d5aba3b79f9ba9a1ec180984d9d44a45ba
                • Instruction Fuzzy Hash: 1401C8B8E442288FDB64DF28CC94ADAB7B1FB49701F4081D9DC49A7344EA349E85CF00
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7f452c60c303e12e7f0642344733969db43fd0c13496d6c6c6f9b6b2580f8c27
                • Instruction ID: 33ea080aeacb33b0e75c8f422195862f6d0ccf30eeb25a0643c98301f5030682
                • Opcode Fuzzy Hash: 7f452c60c303e12e7f0642344733969db43fd0c13496d6c6c6f9b6b2580f8c27
                • Instruction Fuzzy Hash: 30F0E570805208BFC712DFA9D8517ACBFB9FB44320F14C0AAEC4493740D7399A11DB44
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b8490115613f519e584d933cbb1213911a3ba06546fd28612ed080a8d723dabf
                • Instruction ID: 7f14d07fad4c1d0d5194562e1c67b8c69b2e09ab86a88688e4181cc10c699d0f
                • Opcode Fuzzy Hash: b8490115613f519e584d933cbb1213911a3ba06546fd28612ed080a8d723dabf
                • Instruction Fuzzy Hash: 12F06D70A05208AFC751DFA8D88AB9CBBB4FB44309F1440EAE844D7B50E2359901CB41
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 96de2e0df4f7ce008269290593d016820cd084a83aa270515120223a92e80a27
                • Instruction ID: e58ef55d722466c88b3c9e3a89ca459f62dee6d9f906316c6c99fdb27fd24ef7
                • Opcode Fuzzy Hash: 96de2e0df4f7ce008269290593d016820cd084a83aa270515120223a92e80a27
                • Instruction Fuzzy Hash: 59F01C74D04248EFCB85DFA9C940AADBBF8BB48311F14C4AEE898D3341D6399A11DF50
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 585814b50cece7b4614e354d75133937be10872744a7b88ca9cf5fe5752d717b
                • Instruction ID: d87b27143660da6d2dd42e1bfddbf88298d475cbe5f8babc7925655dee94d752
                • Opcode Fuzzy Hash: 585814b50cece7b4614e354d75133937be10872744a7b88ca9cf5fe5752d717b
                • Instruction Fuzzy Hash: 25F0C93114D3D25FC7176BB4A9380983FF5AE4766430900EBD485CE1A2E65E0D4687A6
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cb98b0f66843d2b60ded1efc9715c15aec50e7b9afaaacc230e9da87eee14616
                • Instruction ID: f8dd604016eae6b3d54440082c13ec640cf6468ed1dbb0cd697b2b128355e889
                • Opcode Fuzzy Hash: cb98b0f66843d2b60ded1efc9715c15aec50e7b9afaaacc230e9da87eee14616
                • Instruction Fuzzy Hash: CBE09270905208EFC741DFA8C989B9C7FF5FB04215F1080A5E804D7750E234DA80CB50
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 894a5271f8d8489d0bfa588bc4366574bad628baed7bb62db526b96ade3e25ed
                • Instruction ID: 343217ca7c30a6a616c280a92030baca3a81342223a91da6c5063f3e8e3f5eab
                • Opcode Fuzzy Hash: 894a5271f8d8489d0bfa588bc4366574bad628baed7bb62db526b96ade3e25ed
                • Instruction Fuzzy Hash: F7F0ED31E04218AFEB09CF98D44C6CDFFB6EB88224F04C4A9E00693280DB701A84CBC4
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 12a3ce5f9b53b31dbeff7cac0f61939ba27eb65412036dc5598c708ee4989310
                • Instruction ID: bfcad61387e76221807a673b7921ccae63424653921c4eabf746f18362b214af
                • Opcode Fuzzy Hash: 12a3ce5f9b53b31dbeff7cac0f61939ba27eb65412036dc5598c708ee4989310
                • Instruction Fuzzy Hash: EEF03974E08308AFCB55EFA8D4496ACBBF4FB44200F0085EAD899A7390E6389E00DF41
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6571eec3332c6a09eb32ac39aaacf6be5aa6ea286a1565cb3aca4e7e051541c
                • Instruction ID: 34b2d1ff6e3cdff623ffe136bc29f1399d4e6b3c7a5b5bf4a3e2792f3cafccb6
                • Opcode Fuzzy Hash: a6571eec3332c6a09eb32ac39aaacf6be5aa6ea286a1565cb3aca4e7e051541c
                • Instruction Fuzzy Hash: 17E01A722002065BC710DA1EE88584BFB9AEFD0264724CE3AB50A87625DE74ED968A90
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3037b17a108cef728fbcf1ae41dd50f9b59422b916c0d413a669be9720ce51dd
                • Instruction ID: 6cb64ab708fd315d7287f1fe3b851ba6a6eb40c64963b9cda64733b25a56a67b
                • Opcode Fuzzy Hash: 3037b17a108cef728fbcf1ae41dd50f9b59422b916c0d413a669be9720ce51dd
                • Instruction Fuzzy Hash: 23F01534D04208EFCB40DFA8D940A9CBBB4FB48314F10C0AAE84893350D6369A12DF80
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a5d823c81b0676f75909e4d17846523b74f50eef346088313f850448c0459159
                • Instruction ID: 9921bb45e7a8196fb9595dd4e43c5a0b745d35d7982c705051b6b8a8bc49ee88
                • Opcode Fuzzy Hash: a5d823c81b0676f75909e4d17846523b74f50eef346088313f850448c0459159
                • Instruction Fuzzy Hash: 06F06D7E601219CFC722EB98FA59BB8B3A6FB40719F4401A6D8098F619E3741940DB80
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f2767c3407d12f87b9d6cd3e076b63a85863975ec6363757c830fbc4259193b6
                • Instruction ID: ac199367892de4004540ab3e6f4497513181848d7686578a614e7f5eb6c9eb42
                • Opcode Fuzzy Hash: f2767c3407d12f87b9d6cd3e076b63a85863975ec6363757c830fbc4259193b6
                • Instruction Fuzzy Hash: 1AE04FB0806208BFCB55EBB8D94A39CBFB5EB04711F1044A9D949E2755E6388A51E741
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 549a56d6e503e8a8bc70475a8a7605249978e94a512e99c4ac06fe20ce7cc1cd
                • Instruction ID: 0c7de7a8a388b59ec5eb901b7fe4c7e53dbcc6bfa37a3d78ae2b95dd2a156857
                • Opcode Fuzzy Hash: 549a56d6e503e8a8bc70475a8a7605249978e94a512e99c4ac06fe20ce7cc1cd
                • Instruction Fuzzy Hash: D8E09275804208EBCB00DF94D9857ADBB74FB56311F1480A9DC4467355D6319A12EB48
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f94363801b9f7208185527e007fa12b6a136c1149190e0654135adc684bb4889
                • Instruction ID: 4d8543707ff09cd2a3d62f033865243b7e6a390a08128dad08daf2d0094213c2
                • Opcode Fuzzy Hash: f94363801b9f7208185527e007fa12b6a136c1149190e0654135adc684bb4889
                • Instruction Fuzzy Hash: 1FE03974D04208EFCB40DFA8D584A9CBBF4FB48301F10C0AA984893350D6359A01DF44
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f94363801b9f7208185527e007fa12b6a136c1149190e0654135adc684bb4889
                • Instruction ID: 0855aaf4fb89d8928439f40cb7beaa5d8f9727f64977a4f79325aacecb200ca4
                • Opcode Fuzzy Hash: f94363801b9f7208185527e007fa12b6a136c1149190e0654135adc684bb4889
                • Instruction Fuzzy Hash: E5E0C974D09208EFCB44DFA9D544AADBBF5FB48311F10C0AA984993350D6359A51DF45
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f94363801b9f7208185527e007fa12b6a136c1149190e0654135adc684bb4889
                • Instruction ID: a7713b88a65cd97c0a74e372c2f00ee677a5a874c3fead59298fa7219dcf4803
                • Opcode Fuzzy Hash: f94363801b9f7208185527e007fa12b6a136c1149190e0654135adc684bb4889
                • Instruction Fuzzy Hash: 51E03974D04208EFCB40DFA8C54069CBBF5FB48310F10C1AA9858E7341D6369A01DF49
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cb31827acdd3e5d0b2142cf7a7b0fa44a5aee78936edda73a0f72fa87729a9b9
                • Instruction ID: e5f174d288fab42d28f8a5587093d2175c7686241f18f21b174de2fa10bb2175
                • Opcode Fuzzy Hash: cb31827acdd3e5d0b2142cf7a7b0fa44a5aee78936edda73a0f72fa87729a9b9
                • Instruction Fuzzy Hash: D4E04F30A4520CEFCB04EFB4DD227AE7BAAEB46241F2085A8E908AB241D9755F05DB51
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 49a882750bf4161ab0eb4bf36d6677ed3a42e14ddbc98a48feef85d784d32496
                • Instruction ID: 926c2c5784688d6f950fa6c8da70d37577390b4359358d86d72c195552887d30
                • Opcode Fuzzy Hash: 49a882750bf4161ab0eb4bf36d6677ed3a42e14ddbc98a48feef85d784d32496
                • Instruction Fuzzy Hash: 86E0C2313463059BCF20E6F5980AB6332DAAB49714F2108EAE7059F3C0DAB2FC86C751
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57666e9c2a922e467b17ca5d48e0ffefb9ae641652301427170cc1afeebcb54b
                • Instruction ID: 859953c0e3ff8ed0ec238830d01707c469a4753f2dcb51e8fa04c90cde0a500c
                • Opcode Fuzzy Hash: 57666e9c2a922e467b17ca5d48e0ffefb9ae641652301427170cc1afeebcb54b
                • Instruction Fuzzy Hash: 45E0E570D09208EFCB95EFA8D54469DBBF9FB48300F1080AAD848A2350D6355A51DF85
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 614c22d60794af6f3a29d17e6e3e104d186821fb72ff52a5814e4c652e72704d
                • Instruction ID: cd89d0c7874c0ded738c26525a2212fa7e2dfeb9f998c92ef31d7a1ae6e89de6
                • Opcode Fuzzy Hash: 614c22d60794af6f3a29d17e6e3e104d186821fb72ff52a5814e4c652e72704d
                • Instruction Fuzzy Hash: 62F0AF78E012288FCB60DF64C888BDEBBB6FB49310F14A9E6C009B7210DB305AC08F11
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 53ca77dd6bdbfbb9a04e8d41181604f0f2a8db9bb8670a23a695e4adedfd654f
                • Instruction ID: 8b4e2c3265ac87832bb34c3e42b56f972a418c24f8a1d6ae28b7f98d4d8e4351
                • Opcode Fuzzy Hash: 53ca77dd6bdbfbb9a04e8d41181604f0f2a8db9bb8670a23a695e4adedfd654f
                • Instruction Fuzzy Hash: 82E0E574E05208EFCB84DFA8D5456ACBBF4FB48304F14C1AAD8A893340E6359A41CF45
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 53ca77dd6bdbfbb9a04e8d41181604f0f2a8db9bb8670a23a695e4adedfd654f
                • Instruction ID: 963f7bf8cd7f08280f413a4ce7985c7cdaef9f629b9d4974f76af2e3870d0c2f
                • Opcode Fuzzy Hash: 53ca77dd6bdbfbb9a04e8d41181604f0f2a8db9bb8670a23a695e4adedfd654f
                • Instruction Fuzzy Hash: 7EE0E574E09208EFCB44DFA9D5446ACBBF8FB48304F10C4AAD85893350D6359A02DF45
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9bde1dd0b830fa0ed6ca6457e9c87a3e53ea4de44249f902e6e1a6fd6153194b
                • Instruction ID: 7850c10a735703f5c38da8a96e387a0cba9b86c20d581f6e207eca5e1e6f255e
                • Opcode Fuzzy Hash: 9bde1dd0b830fa0ed6ca6457e9c87a3e53ea4de44249f902e6e1a6fd6153194b
                • Instruction Fuzzy Hash: 08E0DFB0D0930CDBDB00EFB8DA047AC7BB4FB09201F1001A9D8CCA3340EA345A00C705
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2ebf0943d81907379d77693ed3e9e8297998d3b0b46bc7c15b581df113732f0a
                • Instruction ID: e73d0bc34d7ddf4943d12ab4b56165a9ccd2d70c54459005cf59b522577be9f7
                • Opcode Fuzzy Hash: 2ebf0943d81907379d77693ed3e9e8297998d3b0b46bc7c15b581df113732f0a
                • Instruction Fuzzy Hash: 19D0177004E3D08EC753137C69AB2F8BFB89F47215F4858EAD8C586972895A042FD756
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 843b3e3dc5ebd9da950da5395f940614270d71af3c33d4391f3ace64ce1247e3
                • Instruction ID: 39e272b0f1a9cce9d6cd308fd97bcadcfaa6fe0bda6582b2d615548d4bd1f6d4
                • Opcode Fuzzy Hash: 843b3e3dc5ebd9da950da5395f940614270d71af3c33d4391f3ace64ce1247e3
                • Instruction Fuzzy Hash: 38E01A38205745DFC78ADB78D4A09197BF2BF8A62032585EAE449CB339D636A812CB11
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 39c269e7c7e2f68d34e1176ac37b073573da3d769dd7f4402a64949d8e65e06f
                • Instruction ID: fb20a35b0e7649ac8805ea612e2b6d861f80ae0ac5b5988b152e787a3082198f
                • Opcode Fuzzy Hash: 39c269e7c7e2f68d34e1176ac37b073573da3d769dd7f4402a64949d8e65e06f
                • Instruction Fuzzy Hash: A6E09A34C08208EFCB02EFA9D5445ACFBB8FB48301F10C0AADC8453341C736AA01DB84
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 96cc48c032a7f4a40b68556352ed424dca664b98df19b128282f9dbaf5021c92
                • Instruction ID: aee20be6f47d2081ff29fd8f6cca4416a39d52147c78f988f83ca8eb4cbed414
                • Opcode Fuzzy Hash: 96cc48c032a7f4a40b68556352ed424dca664b98df19b128282f9dbaf5021c92
                • Instruction Fuzzy Hash: A2F0D470A04369DFDB61DF14D888B9EBBB5FB0A341F1056D5D449A2250DB345ED88F02
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 508527866cf79bb49f201dbe80c704092246503ba409b5d1f38bd54e4e544055
                • Instruction ID: f381dcfd7e50d56e3b2f09c5e39a849a01025fca0fa3ce8584bc1937d9c5fcf5
                • Opcode Fuzzy Hash: 508527866cf79bb49f201dbe80c704092246503ba409b5d1f38bd54e4e544055
                • Instruction Fuzzy Hash: DEE01270E09308EFCB55EFA8D5442ACBBB9BB49300F1084AAD888A3380DA395A40DF45
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 408ecf65105548c2ea86f9bfb21047259f3fec585bf414d6373b4a1187358a9d
                • Instruction ID: 224acd7928eb6ddbb15a21e84f5a96c19f7f03b678a598b7fa95cea8f22d83e8
                • Opcode Fuzzy Hash: 408ecf65105548c2ea86f9bfb21047259f3fec585bf414d6373b4a1187358a9d
                • Instruction Fuzzy Hash: BEE0867490921CEBC704DFA4D9409ADBFBCFB45311F14D0DAE8C457351C6319A42DB95
                Memory Dump Source
                • Source File: 00000000.00000002.1883408004.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5350000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: da88e0a8d776c31a78cda67b14204540dd460fa29de500cbfcad17fd19474911
                • Instruction ID: cf9400a2af8e47a536687cdbb23b1dbdd2c2cb26dbf33f623c50d6b864e8666c
                • Opcode Fuzzy Hash: da88e0a8d776c31a78cda67b14204540dd460fa29de500cbfcad17fd19474911
                • Instruction Fuzzy Hash: 25D02B71807218EBC714D668CD15BAA332DEB41315F0000A9948862360D6374D40C6E9
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c3d04f52d39a4b2d20e13f1ec05df4d3039ffcff18344a4e3ac5420c97b0a1c6
                • Instruction ID: 3acbb94180cb760b0b49a8f6bdce1422db56df2f44bc08331c230a1b3e919101
                • Opcode Fuzzy Hash: c3d04f52d39a4b2d20e13f1ec05df4d3039ffcff18344a4e3ac5420c97b0a1c6
                • Instruction Fuzzy Hash: 1BE04674905208DFCB81EFA8C588A9CBBF8BB08215F1040EAD848D7360E6309A80CB51
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b79ead5ac1187d8c4523fc454565fffe66b716bde24b02398e712f14c688c857
                • Instruction ID: 7058f1c7e68d1a7993c0b5ad8b6b2be9f0cc1a161fc0e04dfbbea1dd1270669d
                • Opcode Fuzzy Hash: b79ead5ac1187d8c4523fc454565fffe66b716bde24b02398e712f14c688c857
                • Instruction Fuzzy Hash: C7E04F30905208DFCB40DFA8C54469CBBF4BB08304F1080AE8848D3341D731AE41CB41
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 63db14818fbf1c1a9aa9343b0348f429c5fbc0691109bc276a43c23c6707b338
                • Instruction ID: 33036473229730ee9cc05d3035069a40956c65238b3044c2c973f9c21d4bbcf1
                • Opcode Fuzzy Hash: 63db14818fbf1c1a9aa9343b0348f429c5fbc0691109bc276a43c23c6707b338
                • Instruction Fuzzy Hash: 37E01A34D0920CEBCB04DF99D5445ACBBB4AB49304F1480EAD89857341D6365A02EB55
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f37de8c541074aebfd89fc2302cedab7c13820db440a8bb666985ca106d7fcf1
                • Instruction ID: 45158e78f9ee06e1535abe86b23fd28a2c2520e5cbc57f2aeb0c3d4ae88a7b16
                • Opcode Fuzzy Hash: f37de8c541074aebfd89fc2302cedab7c13820db440a8bb666985ca106d7fcf1
                • Instruction Fuzzy Hash: 19E0C23A7400198B8704EF4DE44009DF7A2EBDC612310853AF946C3340CB319C6A9F90
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 359b560dd0a7a7b1c129f22dfc1dba1e5e3b304c46ededa575cf666e85c19e1d
                • Instruction ID: 603b8be11d54540cc25250dab59ec22f75e1af85756fd0464dc5e0c2d2e011b0
                • Opcode Fuzzy Hash: 359b560dd0a7a7b1c129f22dfc1dba1e5e3b304c46ededa575cf666e85c19e1d
                • Instruction Fuzzy Hash: FEE0C271801208DBC700EFB8D90968FBBB8EB0A205F0045A6D548A3250FA354A04D7A6
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d658ffd809369446b6b392b5f5068bb19793459f143e36881d5ce8736ebdd499
                • Instruction ID: 64a81807b1785a8737f8acba6253644565cfc73221945a0f741b48fcecee8367
                • Opcode Fuzzy Hash: d658ffd809369446b6b392b5f5068bb19793459f143e36881d5ce8736ebdd499
                • Instruction Fuzzy Hash: 24F015B8D09318CFCB24CF68EA587ACB7B1FB49305F004499C00A66391D7745D85CF00
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ddc0829a3fd355a5d82a0561b408cf0bd8a00288abb7731947d43515b21cebbb
                • Instruction ID: 709f9534a598d963e64dfe327ffe1b2333d98d86971d960d1ea0d82de5a6d28c
                • Opcode Fuzzy Hash: ddc0829a3fd355a5d82a0561b408cf0bd8a00288abb7731947d43515b21cebbb
                • Instruction Fuzzy Hash: CDE08C70C0930CEFCB40EFA8D5482ACBBB8FB05301F1000A9C84993340E6300A50CB49
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 61b91b15474c6d9b3435ba111fbaec382fcb9ca6a95930f3d68bad8da59d61cf
                • Instruction ID: 041ca97392c1414a263a0ed4296c5179ebe084db6cd4135eddb78b7ee333c2ce
                • Opcode Fuzzy Hash: 61b91b15474c6d9b3435ba111fbaec382fcb9ca6a95930f3d68bad8da59d61cf
                • Instruction Fuzzy Hash: 8FE0C23490920CDBCB04DFA4DA445ACBFB9FF45304F10A0DDC88867344CA325E02DB85
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a282d1f9bac6dc9d2ef2c600d0290ab4a5b7a93694512852ab841d4f5a8f1c78
                • Instruction ID: f8b909ba4309e07a163a9e86dbd58c63332d39412ea1a2ade05901caefc2724b
                • Opcode Fuzzy Hash: a282d1f9bac6dc9d2ef2c600d0290ab4a5b7a93694512852ab841d4f5a8f1c78
                • Instruction Fuzzy Hash: 67D02E727086220BCB01AA2DED4478B3BE2EBDC600F14857AB402C7308FE24DC028BC0
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ec37eb1bd6df2778547bf5d93e130454944f4a126080d04caa8efa3122876e50
                • Instruction ID: 09c5860f2313d3d6a0ab364154a0ebacdcc8fdfc9ef5ff0602d3cbd7ef70ffa7
                • Opcode Fuzzy Hash: ec37eb1bd6df2778547bf5d93e130454944f4a126080d04caa8efa3122876e50
                • Instruction Fuzzy Hash: 56F05A74D40229CFDB64CF25D988BD9BBB1AB59301F1081EA9889A3700EB741EC49F00
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9453585cd17915d81e4c4d1feb4eb28d8789bc510824289c7094564a359651d7
                • Instruction ID: bb56079be2f28823bca3534b1bea03e9df9133fbeaf6778a8d3662dac6a3b0e0
                • Opcode Fuzzy Hash: 9453585cd17915d81e4c4d1feb4eb28d8789bc510824289c7094564a359651d7
                • Instruction Fuzzy Hash: 82E01274D05208EFCB55EFA8D54929CBBF8BB04305F1044EAD889D3351E7345A54DB45
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4d8bc6921ee139ba271d3391f5fbb1af66a8a0559f7c39bbdfc6408fd630be0b
                • Instruction ID: 1e94bf0ea96f5f8a6e060657d0ed988c3bf414215848374556b069887cd8416c
                • Opcode Fuzzy Hash: 4d8bc6921ee139ba271d3391f5fbb1af66a8a0559f7c39bbdfc6408fd630be0b
                • Instruction Fuzzy Hash: D8E0C230A0020CEFCB04EFB4D91066EB7BAEB85200F2049A8E8089B240DA315E009B80
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4fc64c8808dd3ae092369d4b3bdff3d477ba88c716caac41e944f3f91807cf76
                • Instruction ID: cbc46e2e1a1874d94f453a62031ded92370080474dde6885649717fdb094b820
                • Opcode Fuzzy Hash: 4fc64c8808dd3ae092369d4b3bdff3d477ba88c716caac41e944f3f91807cf76
                • Instruction Fuzzy Hash: DAD0A73050A208DFC705DB98E940AA8BBBCEB46328F1480EDD8085B391DA779D01CB85
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 425e57351809813ecefd5af54bf3e82e6e41ea5c80b3a44f4b28603d605de721
                • Instruction ID: c0950f535911969413315403affae730ca74f7b42b283868c7d50894ca129e7b
                • Opcode Fuzzy Hash: 425e57351809813ecefd5af54bf3e82e6e41ea5c80b3a44f4b28603d605de721
                • Instruction Fuzzy Hash: F0E05B70A1110DEFCB00EFE8E51069EBBF6EB86300F2045A9E80CD7340D9755F159B91
                Memory Dump Source
                • Source File: 00000000.00000002.1883408004.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5350000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f2ca5d7ebdd71373ca9fa63ecd06734a815402cabf99fa4f5b2dc05563ca0e04
                • Instruction ID: f4cd4cba592bdfb8e08caa60bdd1bf38efcb7c8744516e6f4947b89dad4437d0
                • Opcode Fuzzy Hash: f2ca5d7ebdd71373ca9fa63ecd06734a815402cabf99fa4f5b2dc05563ca0e04
                • Instruction Fuzzy Hash: A2D0A77080B308EBC719DB64C504B6D736DE742315F001099C84812260C6774D40C7A9
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7680b4ac5261a671e2e220ff37dbbb16f78fab27ddae7d84f44d8da0476db3da
                • Instruction ID: 2107ec3afd2102f1f888b5d543fbeb124b492886e3a8876695dced182c1a7c7e
                • Opcode Fuzzy Hash: 7680b4ac5261a671e2e220ff37dbbb16f78fab27ddae7d84f44d8da0476db3da
                • Instruction Fuzzy Hash: 6DD09E793005089F8748EB69E5A491A77EABB8CA1032085A9E949C7329DA31EC018B51
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 165ca17a9915939f4bfd33b7f37fbddbd3d31f7bc3cf64dd27d489946abc4e14
                • Instruction ID: 7d66cf7941b205750b78d9acc2a6b831585a399e7cfb2d8360584b9aba575b49
                • Opcode Fuzzy Hash: 165ca17a9915939f4bfd33b7f37fbddbd3d31f7bc3cf64dd27d489946abc4e14
                • Instruction Fuzzy Hash: 06D0127E040104AFC7008B25D986FC07B64DB16335F15C051F509C7771C221E85A9954
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 53519c079ece27f5b023890424a63eefc2fac5a836770e54e4ed901e1b4f80ee
                • Instruction ID: 527c33b248dfcbf32ce15ecc38b01c8c4e65b9996ba64d6ac8a300cc559d7ad0
                • Opcode Fuzzy Hash: 53519c079ece27f5b023890424a63eefc2fac5a836770e54e4ed901e1b4f80ee
                • Instruction Fuzzy Hash: 02C08C313100265B0A2436E8B23C0AC768DFB8D8A1300001AE9CAC3340CF1E1C0307DA
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 705983db427df8b9e9bb030e4cbd9b8d2d406de9f18d8ef728719888cf574b9c
                • Instruction ID: 5b1d1461df4df188dc7f05b94b16e46be45509546ed538a379c1571fa9c2fbb2
                • Opcode Fuzzy Hash: 705983db427df8b9e9bb030e4cbd9b8d2d406de9f18d8ef728719888cf574b9c
                • Instruction Fuzzy Hash: 7BD0A736A080168BEB1A7F61F8243DC7215BF00B11F940865FDC157154CB349E099B82
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ad28c9ab3d1b25c18b0e7a8b07d168576aca3890774403d4aebcd8bcf2566447
                • Instruction ID: 0e7f0ef75a8ceb6050e7e6b1b1e8a30ee18a9e519b1989ec85b2dde1d01133b7
                • Opcode Fuzzy Hash: ad28c9ab3d1b25c18b0e7a8b07d168576aca3890774403d4aebcd8bcf2566447
                • Instruction Fuzzy Hash: 50D0C9316897818FC3439B74C4505947FB0AF57724B1640EBE445CB173E3B95C66CB21
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f045b5ebda0d840ff39c20cc78ff63de92007a2c338a856fee02481d8064beb7
                • Instruction ID: 67cf11a4d3b7649caa59b8d53e13e044355743f8760f0621b96ce52ac6ba2879
                • Opcode Fuzzy Hash: f045b5ebda0d840ff39c20cc78ff63de92007a2c338a856fee02481d8064beb7
                • Instruction Fuzzy Hash: 50D0123204B3C9AFD3030FB0682A0A13FB8A90322875800D3E4C9CA023D22E2E06CB25
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6a3f210862977179f1bc2064718e1a2635dc87dbf1802ba1c69d8421b2dcf2e4
                • Instruction ID: 867148881b8ab84e9d6a86fed1dc5ed2aa02d73d0abf53bdc3c88b453cafcbde
                • Opcode Fuzzy Hash: 6a3f210862977179f1bc2064718e1a2635dc87dbf1802ba1c69d8421b2dcf2e4
                • Instruction Fuzzy Hash: FAC08C3008F30882E2102254EF0C3B033AC6B06206F042841D68E045A2F6A82410C269
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d9f73b62857cb9d1ad3d1736f5c0fdc32eb606ca354c45f4275844c28586da8a
                • Instruction ID: 0db16fc5a8fbbd8d9ce5c0d5937c0f075a58037198d67c665a88d477fc11f94c
                • Opcode Fuzzy Hash: d9f73b62857cb9d1ad3d1736f5c0fdc32eb606ca354c45f4275844c28586da8a
                • Instruction Fuzzy Hash: 22C0807048130447D21037A4FF0C354F75C6704216F440C51D14C515D09B7C8454C65E
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b6e70d5bf423c246d45b1413ef41e3101b3bab5230d5a54aa9fe1501dcddf4b3
                • Instruction ID: 8727dfeab4154f1899653b0fa21d9d9785a4e716697f9827d8952b812d00242a
                • Opcode Fuzzy Hash: b6e70d5bf423c246d45b1413ef41e3101b3bab5230d5a54aa9fe1501dcddf4b3
                • Instruction Fuzzy Hash: 71D022BC6841088FD720EF48C468BEB73B7F78A740F40504A908E97786CE344D86CB21
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5cc7f3280092d09fe6e86b332504d2d129a69497e800143216e161a9dfcf8a1f
                • Instruction ID: 0c590f0e7330eb92f9e3309fd9d40d14250f0e99242404988794dac49105ed7c
                • Opcode Fuzzy Hash: 5cc7f3280092d09fe6e86b332504d2d129a69497e800143216e161a9dfcf8a1f
                • Instruction Fuzzy Hash: 86B092A16811052EEE208222CE077442214C392BA6F648000A30A986E9C580C04B4226
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cb4b1168b7145236cd303890625a3c05117b1d34c9d89e3512d1e46918e98eaf
                • Instruction ID: f8de4485c8198a6371ac74ee09802305c2a1244cc92dd97fd20b990011c9c7ce
                • Opcode Fuzzy Hash: cb4b1168b7145236cd303890625a3c05117b1d34c9d89e3512d1e46918e98eaf
                • Instruction Fuzzy Hash: 89D067BC904228CFCB14DF28EA54B59B7B1FB55305F044095D40967355D7705D948F01
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 91ba2c9a309bc321f19d9603f72e51ce3fd2e6821f7637c57ab8d398b708c592
                • Instruction ID: 9fac1b3ea14084d94f028c2a7bf02bb2871d51829a4259c44c3abdde3a6a0b3e
                • Opcode Fuzzy Hash: 91ba2c9a309bc321f19d9603f72e51ce3fd2e6821f7637c57ab8d398b708c592
                • Instruction Fuzzy Hash: 66C00276E5001A9A8B00DAD9E4508DCB774EB94321B004026D214A6104D63115268B50
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: daa98070aa485f8e6d6e4c8ba1b55bd25099af2a00191cafc87cb3ac8e1fe1b5
                • Instruction ID: 84bfb9665c2a7ea2f8b0d99ce723417adefd69ff2d03932110408ab911125013
                • Opcode Fuzzy Hash: daa98070aa485f8e6d6e4c8ba1b55bd25099af2a00191cafc87cb3ac8e1fe1b5
                • Instruction Fuzzy Hash: E1B022C3C0008003CA82B2C8C83AB8200E8CBB0320FFCC8E2C20CCF320F02C822022A3
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 46469c73c9fe05df0f30ceaec3200c133db946048d4787c5de3936a27428fb35
                • Instruction ID: a414b4c4efaf0c934ee8f19b39226a8956b10edae2c955d3562b8f864bd91a96
                • Opcode Fuzzy Hash: 46469c73c9fe05df0f30ceaec3200c133db946048d4787c5de3936a27428fb35
                • Instruction Fuzzy Hash: 55C08C3898001EDBEF10CB40C5068EEB7B2EB8E200F300844D002B2910CB302E088BA0
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                • Instruction ID: 308734e347fe5fbfc39d01466d26648a0473cab39bdc6a53ba3d68073832f9aa
                • Opcode Fuzzy Hash: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                • Instruction Fuzzy Hash: 93B01230240208CFC200DB5DD444C0033FCAF49A0434000D0F1098B731C721FC00CA40
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76ae62084b278da75b4bb12bd73f0cba7ebdcedf1ebbed258bb697a14e81c3e1
                • Instruction ID: 003b3b5e4436be57daef97f868f2816dcd26fcfa98ac1777052a97c94d27367e
                • Opcode Fuzzy Hash: 76ae62084b278da75b4bb12bd73f0cba7ebdcedf1ebbed258bb697a14e81c3e1
                • Instruction Fuzzy Hash: 50C08C318886D44BCB12CA20CE8BB4EBBA09FC1380F02902AD4808A024C7B00814DA00
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 51a0b16f63845f0590feb351cae1b7dfa59826dd6739c476eff1a4281f330939
                • Instruction ID: 1bb09449542b06db584a3d09564d2f8e8c22fd4bab161a4696856dcd91253033
                • Opcode Fuzzy Hash: 51a0b16f63845f0590feb351cae1b7dfa59826dd6739c476eff1a4281f330939
                • Instruction Fuzzy Hash: 4BB09232D0E3814FCF2B9B349939048BF726A1330931544DAD8C1C90A7E57D0994CB42
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8913b70fc36e6de15500b360c9f85bb29aca68d08641bac39902fe51d0714d16
                • Instruction ID: 88ddc62cb1f2a63d13a8c5ce8a3f5e6cbb51aae674466ace81410b790cf3cffc
                • Opcode Fuzzy Hash: 8913b70fc36e6de15500b360c9f85bb29aca68d08641bac39902fe51d0714d16
                • Instruction Fuzzy Hash: BA90223000020CCF00022382382A080330CA0000003800003A00C800020A0A28000280
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885478725.0000000005BF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5bf0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: (bq$,bq
                • API String ID: 0-1616511919
                • Opcode ID: d78e96e7c258faf9b8f45278354eba3a1d2fec39f54e1c3d689f0c6f969f7fe6
                • Instruction ID: 33b530c4e6ba4549c322716b8897a92d2718fe19f7c3f1cbeffc78518ef9bac0
                • Opcode Fuzzy Hash: d78e96e7c258faf9b8f45278354eba3a1d2fec39f54e1c3d689f0c6f969f7fe6
                • Instruction Fuzzy Hash: A6D12A34A006058FDB14DF69C584AAEBBF2FF89310F25C4A9E905AB365DB31EC85CB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: PH^q
                • API String ID: 0-2549759414
                • Opcode ID: e07f7540f32486d469b382bf8c58dd0557ba0a154efb15482dabcb9eda0601e8
                • Instruction ID: cb7afb9906229f7512396d9ab785436d3518dd05b7eceec9db4fdbef97c6defa
                • Opcode Fuzzy Hash: e07f7540f32486d469b382bf8c58dd0557ba0a154efb15482dabcb9eda0601e8
                • Instruction Fuzzy Hash: 23911674D04218CFEF14CFA9C9A4BADBBF2FB45315F10A16AD849AB254DB755984CF00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: N
                • API String ID: 0-1130791706
                • Opcode ID: 1c10a24c10e69f7747e3776c994152846f747b29b2c9920c5fd30e73222bcb45
                • Instruction ID: e1c8fe10c55337c47990ef9d1c9560557cad891d6d5b88fdf880f9cfad97f035
                • Opcode Fuzzy Hash: 1c10a24c10e69f7747e3776c994152846f747b29b2c9920c5fd30e73222bcb45
                • Instruction Fuzzy Hash: 61510B70D442298BEB29DF26C8887D9B7F2BF89344F10D0EAD44DA6244EB740B85CF01
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: k
                • API String ID: 0-140662621
                • Opcode ID: 7111eb80076ccef519de9c1dd63f2348b2e3a9402d6e9f82ee78e7e23ba79bfb
                • Instruction ID: 0d019e95a33cefdc4d7e681ece9ec937e4361ef2e4c60e1245ad6fa857e555d7
                • Opcode Fuzzy Hash: 7111eb80076ccef519de9c1dd63f2348b2e3a9402d6e9f82ee78e7e23ba79bfb
                • Instruction Fuzzy Hash: 2F319971D056198BDB59DF2BC94839ABAF7AFC8300F14D1FA840CA6224DB340A81CF01
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: N
                • API String ID: 0-1130791706
                • Opcode ID: c415c30d16817d87aa8de265d130f4a3ff6ccb49ba4e6a7156c0d81ec628941a
                • Instruction ID: 85e68299b22d0e0ebcf451b9e3b088046d749dbbb4812a09b3c3b560beb1a55a
                • Opcode Fuzzy Hash: c415c30d16817d87aa8de265d130f4a3ff6ccb49ba4e6a7156c0d81ec628941a
                • Instruction Fuzzy Hash: EA313E71D057548FEB59CF6B8C45299BBF2AFC6340F09C0EAD448A6255DB740A8ACF11
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID: k
                • API String ID: 0-140662621
                • Opcode ID: cdb84ced7a6cbd987b23fb60ced8197f5d0d952b5cffdcb7e7bfb2961ce7d02c
                • Instruction ID: 07b17d22e7ec61517db29633ab3663ed4df7781ed0daf34a64665961794b602a
                • Opcode Fuzzy Hash: cdb84ced7a6cbd987b23fb60ced8197f5d0d952b5cffdcb7e7bfb2961ce7d02c
                • Instruction Fuzzy Hash: 51317F71D056188BEB5DCF6BCD4469AFAF7AFC8300F14C1BA840CA6224DB350A81DF15
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0700f128fad4c25135e62c00a9887a96fe41b3f39ae4ecb0cb89fff193c04bb3
                • Instruction ID: f58bf5eab3ac987661c48f6ff2b8df12459c82def22027e8c29d8c9f56fbe8b4
                • Opcode Fuzzy Hash: 0700f128fad4c25135e62c00a9887a96fe41b3f39ae4ecb0cb89fff193c04bb3
                • Instruction Fuzzy Hash: F412C271E046198BDB14CFAAC98069EFBF2FF88304F28C569D458AB219D734A946CF54
                Memory Dump Source
                • Source File: 00000000.00000002.1885762406.0000000005E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5e60000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 289ec4fb143bad0aeef258d1a349c899136383ccfdf69bba69c8bde341554dea
                • Instruction ID: 2a21827da94d92d9412d52a45b72a3d29b492c1ea4570cf50e3ae765709cb9c4
                • Opcode Fuzzy Hash: 289ec4fb143bad0aeef258d1a349c899136383ccfdf69bba69c8bde341554dea
                • Instruction Fuzzy Hash: 2581E670E0421CCFDB24DF69C944BEDBBB6BF8A304F54A4AAD449A7251E7705986CF40
                Memory Dump Source
                • Source File: 00000000.00000002.1883408004.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5350000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a7c2e2b8522d19cad8abeed40704dc4fb14464b8e234a228e4fd7fdf2ae9f44
                • Instruction ID: c9de3fd9430e51bef7aee35d52339c2c3a546722c23af32df735ab0337feb0f9
                • Opcode Fuzzy Hash: 9a7c2e2b8522d19cad8abeed40704dc4fb14464b8e234a228e4fd7fdf2ae9f44
                • Instruction Fuzzy Hash: 3C813574A04218CFDB18DFA9D568BEDBBF6FB89310F10612AD80AA7394DB765845CF40
                Memory Dump Source
                • Source File: 00000000.00000002.1883408004.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5350000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0c048aeff455919860f327bc97b1d3a312a51e5e65c842225b8bbfc65e61917f
                • Instruction ID: 75eee69129e1854685b2ecd65a50f8a6f9c2ff865e5e6fc803d99b54f8fabd31
                • Opcode Fuzzy Hash: 0c048aeff455919860f327bc97b1d3a312a51e5e65c842225b8bbfc65e61917f
                • Instruction Fuzzy Hash: BB8114B4A05218CFDB18DFA9D568BEDBBF2FB89310F10612AD80AA7394DB755845CF40
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 950a78da3865002288f3db861fcd9aa24edbefc4f44457af055706bf400acac5
                • Instruction ID: 832fc2dc649443ea55dc79390584c4d252f077597aaf6586c0fe73a7f92c5d7b
                • Opcode Fuzzy Hash: 950a78da3865002288f3db861fcd9aa24edbefc4f44457af055706bf400acac5
                • Instruction Fuzzy Hash: 724158B1E016198BDB18CFABD94069EFBF3BFC8300F14C07AD958AB224DB3459468B54
                Memory Dump Source
                • Source File: 00000000.00000002.1885529486.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5c00000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6cb83056621641c8e37ab5c27efcea5e695af17f066c0be814f413cfcfae899
                • Instruction ID: dadb065e982fff906ea2b4deff90c389efd5f0f2236dec4b30dc708acf859f7a
                • Opcode Fuzzy Hash: c6cb83056621641c8e37ab5c27efcea5e695af17f066c0be814f413cfcfae899
                • Instruction Fuzzy Hash: 9A41D0B4D043489FDB14DFE9D884A9DBBF1BB09300F20A529E81ABB290D7749985CF85
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b7470ef7a4e271c35034475e970a11e7cd78d19403871f04d75912981f771174
                • Instruction ID: e9ab831198c8105485c8fd481fc64d180e1fda3b67034deb0bafda0e5d5b60fd
                • Opcode Fuzzy Hash: b7470ef7a4e271c35034475e970a11e7cd78d19403871f04d75912981f771174
                • Instruction Fuzzy Hash: D6412D71E05A188FEB59CF6B8D4469EFAF3AFC9301F14D1B9D84CAA255EB3409468F01
                Memory Dump Source
                • Source File: 00000000.00000002.1862833906.00000000013D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 013D0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_13d0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aad1e3bb9ecfba14796eba9bc48a8cfb7e5c9df82cc262312e59d20399496704
                • Instruction ID: be04069cb1d07fa4cf97aad897e4f757a7fc970c7f178750f1c322670bbabc4c
                • Opcode Fuzzy Hash: aad1e3bb9ecfba14796eba9bc48a8cfb7e5c9df82cc262312e59d20399496704
                • Instruction Fuzzy Hash: 623198B1D016188BEB58CF6BC95579EFBF7AFC9304F18C1AAC44CA6265DB7409868F01
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2c22a227a33e4431cb6441b69262a220e6d3654d304f432d56b870f76626a9c5
                • Instruction ID: 94f59b0ce971ad9a06d0d44e8d824095d2c780fd42e916381c27600e99b821fa
                • Opcode Fuzzy Hash: 2c22a227a33e4431cb6441b69262a220e6d3654d304f432d56b870f76626a9c5
                • Instruction Fuzzy Hash: 3021EFB5D142089FCB10DFA9D981AEEFBF5FB89320F50901AE819B7210C735A941CFA5
                Memory Dump Source
                • Source File: 00000000.00000002.1884661949.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_59e0000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ebdbf8fdf0a9c6fe093dc14fa42b5be87bc0cf0bf99f49e93fcc97f2ee600842
                • Instruction ID: 1fc5eb3d132c94f1c8c94a23a61d69a9b343d726b600c4670c38eb58af34e612
                • Opcode Fuzzy Hash: ebdbf8fdf0a9c6fe093dc14fa42b5be87bc0cf0bf99f49e93fcc97f2ee600842
                • Instruction Fuzzy Hash: 3121FF71D096948BDB1ACF668D442D9BFF7AFCA301F08C0FAC448AB265DA740945CB51
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 64dee2db0bd3548807ab6449887ccb67a9713a479f53e732959c4a4987164eac
                • Instruction ID: 14188eb9cc9ed9b5634574d5f8dbe82f54275126d38c820aaa3e9b351536ef73
                • Opcode Fuzzy Hash: 64dee2db0bd3548807ab6449887ccb67a9713a479f53e732959c4a4987164eac
                • Instruction Fuzzy Hash: FD21FEB5D042089FCB10DFA9D980AEEFBF5FB89320F50901AE819B7210C735A941CFA5
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cbd8e4d7b824cdb7113931fe740261b7ca85c68058c447a244ee952972096e86
                • Instruction ID: a4b5831a2d8374ab0b887cf746d0c4fd02ae57e72d7abd22f40983f62a03dca4
                • Opcode Fuzzy Hash: cbd8e4d7b824cdb7113931fe740261b7ca85c68058c447a244ee952972096e86
                • Instruction Fuzzy Hash: 23213771E046288BEF28CF9BC84479EFAF7AFC8300F14C17AD809AA254DB3409468F51
                Memory Dump Source
                • Source File: 00000000.00000002.1885668717.0000000005D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_5d50000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f8f773da6da0fe8de3a861bbb35f60c8783ae51e865d301dcc15587b7ad4640c
                • Instruction ID: 5bace05d51512bc617139a3a78063a95cb274099534276ca14e69db750a8a532
                • Opcode Fuzzy Hash: f8f773da6da0fe8de3a861bbb35f60c8783ae51e865d301dcc15587b7ad4640c
                • Instruction Fuzzy Hash: EB21A371E046289BEB28CF9BD94479EFBF7AFC8311F14C07AD809A6254DB7409458F51
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 799b5418f6a6f290d7b6a70c46d6d5843c2ab15529b3ad63682fc0f458ebdc61
                • Instruction ID: 8990aab675065eaa53057273ddf8483d8182c3567b001e152a9e11707268f5ba
                • Opcode Fuzzy Hash: 799b5418f6a6f290d7b6a70c46d6d5843c2ab15529b3ad63682fc0f458ebdc61
                • Instruction Fuzzy Hash: AFD17330A09A4D8FEBA8EF28C8557F977D1FF68301F04426AE84DC7295CF74A9458B81
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d9a1c44dc0c39c7702254b7a6bf065d00e1b418834d5c8f4dd07be591216f24e
                • Instruction ID: 0b67ee1fc26ac9bed395ed34a74dbe6dbf0ddcf5c426c764cd23ee772f5c66f0
                • Opcode Fuzzy Hash: d9a1c44dc0c39c7702254b7a6bf065d00e1b418834d5c8f4dd07be591216f24e
                • Instruction Fuzzy Hash: 56D16230A19A4E8FEBA8EF28C8557F977D1FB68310F14822ED80DC7295CF7499448B81
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID: $M_
                • API String ID: 0-1791070036
                • Opcode ID: 981bfea2c2696e8dcea2d6acd53c0c6c47efab25188507f8f6ec4c28f7546745
                • Instruction ID: 5bf04033f376397ad218c4c9990890f87689bcb31b44efcb058f94c407fac82c
                • Opcode Fuzzy Hash: 981bfea2c2696e8dcea2d6acd53c0c6c47efab25188507f8f6ec4c28f7546745
                • Instruction Fuzzy Hash: 57B19762B1DA4D0BE7A8AB7C44696B977D2FF98314F44027DE05EC72D6DE786C028780
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID: d
                • API String ID: 0-2564639436
                • Opcode ID: 317fa32b18005ee276f11377848f482c8f89ffc9c192f1eca658a9f1e306b7d0
                • Instruction ID: 546a769bb0652989f7c3f1125e2bdc2ac721de57aba9947ebaf2669fdc7d2072
                • Opcode Fuzzy Hash: 317fa32b18005ee276f11377848f482c8f89ffc9c192f1eca658a9f1e306b7d0
                • Instruction Fuzzy Hash: A7212232D0D24A4FEF50AFE4C8656F9BBE0EF46300F0601BAD45DD31A2CA686D44C7A2
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fc6ea02dfb73da9375979d610b09765ae7ed3c1aed0652c0e76c191ee47a09c6
                • Instruction ID: 8ca214928d3c3020e9884931510ac38dc6cc27e588bd325d13f2092e8d862041
                • Opcode Fuzzy Hash: fc6ea02dfb73da9375979d610b09765ae7ed3c1aed0652c0e76c191ee47a09c6
                • Instruction Fuzzy Hash: F4D11371B1991D8FD7A9EF2884A8AB477D1FF99314B4502B9E05EC72B6CE34A801CB41
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 94446a828cda6543c7868afea69890958b96cbcf10f0bffae0657f11f75f6300
                • Instruction ID: c9d8a220884e286a32bb2c860661d64d790461d2845d855689538bb14b3bc5d7
                • Opcode Fuzzy Hash: 94446a828cda6543c7868afea69890958b96cbcf10f0bffae0657f11f75f6300
                • Instruction Fuzzy Hash: 0C410753A0F6DA0EE762BBAC18790F83FA0DF52750B0A41F7D089CB1E3D8585D468352
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e42e906ceae5e22ef5a0bea9660cd30c775df77d95e09909e84a460c268349a3
                • Instruction ID: 4208488d74b9b2115ec670bbaea03ad497af103a5605622d7673767861e9dac1
                • Opcode Fuzzy Hash: e42e906ceae5e22ef5a0bea9660cd30c775df77d95e09909e84a460c268349a3
                • Instruction Fuzzy Hash: 64811731B0994C4FDBA9EB788865AFD77E1EF59320F05017AE00EC72E2CE68A941C741
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f9478598cc313b206512a5e419ba31ade26e354b912601f9897f5eeacd5f2723
                • Instruction ID: 39133c8b3e5269c08c527972b18da2a3dc7a5498e55b9a7ccb1e451836fa6d16
                • Opcode Fuzzy Hash: f9478598cc313b206512a5e419ba31ade26e354b912601f9897f5eeacd5f2723
                • Instruction Fuzzy Hash: 03812632F1E94E0FE7A8FB7888656B577D1FF45360F1502B9D018C71E6EE68A9068381
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5252cd7d0f6646f86656dd73f71e6b7d85ec490aa6d8b7c222fc67ce1121c98a
                • Instruction ID: a7e842c278f4c221d452f885a2679b17207282ced55a18e4d3545bef67961475
                • Opcode Fuzzy Hash: 5252cd7d0f6646f86656dd73f71e6b7d85ec490aa6d8b7c222fc67ce1121c98a
                • Instruction Fuzzy Hash: C6212562A0FBD90FD753AB6C18755B83FA0EF96210B0A41F3E049C71A7E8586D058392
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6fe1146fb9a25fdfa7ee38feefd9c4015399f760bdc5fdef2e365416abed6986
                • Instruction ID: f34ee5267a5368e82da449083ca81a589e1034474bb22d7e2b61ae19bd945fa7
                • Opcode Fuzzy Hash: 6fe1146fb9a25fdfa7ee38feefd9c4015399f760bdc5fdef2e365416abed6986
                • Instruction Fuzzy Hash: 9D21F662A0EA990FD753A76C58755B93FA0EF96210B0A01F3E049C71A7E9145D058392
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 825f403f9fe8eab054f4a9a3c8f92c9bf0cd242db4e0efe883c6ca0f24fb1a58
                • Instruction ID: 5b7158ef4120e96cdb629cbc247c4abe751be002ad6ae9029624f378087f10be
                • Opcode Fuzzy Hash: 825f403f9fe8eab054f4a9a3c8f92c9bf0cd242db4e0efe883c6ca0f24fb1a58
                • Instruction Fuzzy Hash: 8D914330A09A4D4FDBA8EF2CD4657F977E1FF68310F14822AE84DC7295CE7499458B81
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 42187e3bd296e1bbc9f631c4e373d60fd67fd2a329b13c680f39825379f8a018
                • Instruction ID: 23b8df469cfcae333f209f2a60f7b156b7c47e188157ad0c259346592b355bd4
                • Opcode Fuzzy Hash: 42187e3bd296e1bbc9f631c4e373d60fd67fd2a329b13c680f39825379f8a018
                • Instruction Fuzzy Hash: 59711A207189459FE798FBAC88B5B7977D2EFA8319F5405B5E01DC32E7CD28A841C742
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3231f18804ee50653736748e9f68515d1068253539c5a455199d77d9fbdedbe7
                • Instruction ID: 03242754ff7dd246e4e81d861f32e53a667d05d10778171ac0ea6d8f99799944
                • Opcode Fuzzy Hash: 3231f18804ee50653736748e9f68515d1068253539c5a455199d77d9fbdedbe7
                • Instruction Fuzzy Hash: BC519431A18A0C8FDB58EF58D855BEDB7F1FF98311F10426AD04DD3296CA74A946CB81
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b6277d9cc356e5d1fe9be671d5eaada377a19dd66e642c0de3d36775eed47285
                • Instruction ID: 3190cacf011d673e14ddf2af906908da5b75edd7025809889562e083f2a81acc
                • Opcode Fuzzy Hash: b6277d9cc356e5d1fe9be671d5eaada377a19dd66e642c0de3d36775eed47285
                • Instruction Fuzzy Hash: 83512921B1A94E0FD7A8FB7854B9AFD7BE1FF9821878505BDE00EC71DACD6869018740
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 09f5de91868e5d755ec3837fabd5f86146524e5d6679a80cd9bcdd8970590174
                • Instruction ID: 174457b0926bfabd98ffb5aaad88badcb974daca62250486a721acb1b2cd09fd
                • Opcode Fuzzy Hash: 09f5de91868e5d755ec3837fabd5f86146524e5d6679a80cd9bcdd8970590174
                • Instruction Fuzzy Hash: 9A518431B1990C4FDBA8EB68C4A9BBDB7E1FF58324F150179E00ED72A6CE64AC418741
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d1670737e50a4124c71fdd27d7f27db6a3331b43b051184489b709583eb2fe91
                • Instruction ID: e51127893142215bcd36807813a27ec0990cfe337320b4987a7d61838dea9ba0
                • Opcode Fuzzy Hash: d1670737e50a4124c71fdd27d7f27db6a3331b43b051184489b709583eb2fe91
                • Instruction Fuzzy Hash: 0B51A230F1990D9FEB94FB68D865AB877E1FF88310F4541B5E01DD32A6DE2869418B41
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d3e4bad81b1eda7ae9139b61f3dc08734d268509b332a0f3d50155dd021200ca
                • Instruction ID: 8ad53453e4a73fbeb027e5310d5dc11c6964c8b7e2ef82e6a4885a3af15dd5fe
                • Opcode Fuzzy Hash: d3e4bad81b1eda7ae9139b61f3dc08734d268509b332a0f3d50155dd021200ca
                • Instruction Fuzzy Hash: AD61F830F0E68A4FEB5AE77484616B97BA1EF26314F1902F9D05DC71E3CE686842C751
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8dcea3d581ae5570dcb211425bc67b9bd578b4349a80af4a3c678e91f03210de
                • Instruction ID: bc1f97359cd9c87990a89f393a08e74a1aa9873ce6360d109bba9345f0b08c30
                • Opcode Fuzzy Hash: 8dcea3d581ae5570dcb211425bc67b9bd578b4349a80af4a3c678e91f03210de
                • Instruction Fuzzy Hash: 7C513971A0D64D8FE768EF68C855AB87BE0EF65314F0441BED00EC71A2DB74A806CB91
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bcf68906a9e105631277d8ceb5299ed78882cbd31703946b35eab24714afc6d6
                • Instruction ID: 55d1c59d99975ea3b93995051a653ff529b8fb82dd75a4cf40cce58c699054db
                • Opcode Fuzzy Hash: bcf68906a9e105631277d8ceb5299ed78882cbd31703946b35eab24714afc6d6
                • Instruction Fuzzy Hash: 13517331D08A1C8FDB68DF58D855BE9BBF1FB59310F0082AAD04DD3252DE74A9858F81
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6c6f94e1152c52f9ee1560cbe5b3a6630403796557f075d09837b961323697ff
                • Instruction ID: cbddc93b11f061bed0a67e7658061af118aa133e136b665971569093888274ad
                • Opcode Fuzzy Hash: 6c6f94e1152c52f9ee1560cbe5b3a6630403796557f075d09837b961323697ff
                • Instruction Fuzzy Hash: 1B413C21F1D9490FE7A4FB3C886797977C1EF95324B0905B9E44EC32EADD58AC428741
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e009eecb69af105513bf020dae9eade1c4534db4c06a475a88b031b054381492
                • Instruction ID: 29be7a6ce71a64aab814d0e450d55534062d6714dc6cd16ddd14244427d2bc5d
                • Opcode Fuzzy Hash: e009eecb69af105513bf020dae9eade1c4534db4c06a475a88b031b054381492
                • Instruction Fuzzy Hash: 06519174A09A5D8FEBA9EF68D4A5BB977E0FF25311F14016ED00AC36A1CB75A841CF40
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0b2efe4b0d0b9b9f0655791db7ce5adc39b259c0a428e73f8f361bf9caca673b
                • Instruction ID: 131058f8273f3167520aee0c5556566eb10b96b7235fa3affd0506b7e0445e50
                • Opcode Fuzzy Hash: 0b2efe4b0d0b9b9f0655791db7ce5adc39b259c0a428e73f8f361bf9caca673b
                • Instruction Fuzzy Hash: 6E412621B1DA890FE799AB6C48796757BD2DF8A225F0901FEE04EC72E7CD585C428341
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 598c8999aae28598d25aa4ee9b21c87d4a4971a0bfa8c18d211590c06f779dbc
                • Instruction ID: eb5abbeddffb84912f8a6a1e3b0ee2d69603d94752da32589042448be9267f96
                • Opcode Fuzzy Hash: 598c8999aae28598d25aa4ee9b21c87d4a4971a0bfa8c18d211590c06f779dbc
                • Instruction Fuzzy Hash: 0731D521B19A4D0FE798FB2C986AA79B2C2EF99315F0506BEF00EC72D7DD645C428341
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1543c716106178e74caa6136ff8c71d1e1ea682fadbc5fd60a5d2abe582dfb0d
                • Instruction ID: 3fe667c33f8c985ecf27f02834de41baf9b89ea626d97905eaf7d010d155bbb9
                • Opcode Fuzzy Hash: 1543c716106178e74caa6136ff8c71d1e1ea682fadbc5fd60a5d2abe582dfb0d
                • Instruction Fuzzy Hash: A831B611B1990D0FEB94BBAC5C297B877D2EF98755F0503BAF01DC32E6DE58A9018381
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 73c6a0195c8f40ab8164b7e1a8394c0bc9cb155d437239a3a70fba97876be654
                • Instruction ID: 86d840d06f327181cfa792cb74c6e6463adfbd4a5fcf094336653cf30b464822
                • Opcode Fuzzy Hash: 73c6a0195c8f40ab8164b7e1a8394c0bc9cb155d437239a3a70fba97876be654
                • Instruction Fuzzy Hash: BC41E630B1964D4FEB94EB7888B56F97BA1FF98314F5406B9D009C72D6CD386801C740
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3113de8fbc705032159a201b38969ead5cdade74d79da00b266ba561be65b973
                • Instruction ID: 0b6c92535fb4dd45a775c176c5bb49e6d5c3c5a10efeae38c89359899e1f5eff
                • Opcode Fuzzy Hash: 3113de8fbc705032159a201b38969ead5cdade74d79da00b266ba561be65b973
                • Instruction Fuzzy Hash: C631C711B19D0D0BEB94BBAC582A7BC72C2EF9C766F0403BAF01DC32D6DD58A8018381
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 65373063f8abe04ca83565ee1635d2fc59f4f24c2d0f50aaf7f6e6b989f5408b
                • Instruction ID: 854fe21100669a3f1b9f1445f2927dc6a1da6fccc2d93b6dc1caa66dc9f0735e
                • Opcode Fuzzy Hash: 65373063f8abe04ca83565ee1635d2fc59f4f24c2d0f50aaf7f6e6b989f5408b
                • Instruction Fuzzy Hash: BC31A13190D7488FDB29DFA9D889AE9BBF0FF56320F0482AFD089C7552D764A405CB51
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 70880cde94cdf66160e9376d91a92bf71eae0aae314a9d8d713e269c4072eff7
                • Instruction ID: d7fe2a379c35815a0be323cea00ba2d07cfa22a87fbd130d22128715e8418edf
                • Opcode Fuzzy Hash: 70880cde94cdf66160e9376d91a92bf71eae0aae314a9d8d713e269c4072eff7
                • Instruction Fuzzy Hash: EF31F630A0DA8A9FEB96FF7CC4A55687BE1FF16314B0501A6D058C72A3DB38AD41CB41
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 394ec34c5e4e35e7aed578ead91d7a74bab48523db153e25b6b864b70b797085
                • Instruction ID: 8bd3df5319c77117a5e3779aeda489322906671cae6053f0d60ad3e112b187d1
                • Opcode Fuzzy Hash: 394ec34c5e4e35e7aed578ead91d7a74bab48523db153e25b6b864b70b797085
                • Instruction Fuzzy Hash: FB314632A5E68E0FE355A7A48C721F97BB1FF45360B4541BAE059CB0E3ED5C2A028341
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7178851c90e81b0968fa3a34dddab1883c68e3cdbfac4cf057146494f26eb471
                • Instruction ID: 9f85ec82af96320ec7cec83d55868d8ab29ce0c6f1c8efde2c14ebe3ce7df2a2
                • Opcode Fuzzy Hash: 7178851c90e81b0968fa3a34dddab1883c68e3cdbfac4cf057146494f26eb471
                • Instruction Fuzzy Hash: A3318D71B0990E5FEF98FB6C84656BD77E2FF98310B400479D41DD32A6DE38A9418740
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a848f69284052013bdce9a7951ced71c7a614030a69b8f4818ee87be7b251041
                • Instruction ID: 65388a88af3feff70bf2d4ff853d123f09ab6ddf5094e21179560265abaa2a6f
                • Opcode Fuzzy Hash: a848f69284052013bdce9a7951ced71c7a614030a69b8f4818ee87be7b251041
                • Instruction Fuzzy Hash: 3D210830B4D58E0FD756AFA88825AF53BD1EF9A210F0541B6E08AC71A3CD5C99068791
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ad16480294fa73b10a8e7dda8107b5cddd72ab74bc5daef9b71fd5425b8bd22b
                • Instruction ID: f80f46e9a7dbfa0d74c994c3d6cbe2f7cfe11fab6c5ae6d46b17266f60da705a
                • Opcode Fuzzy Hash: ad16480294fa73b10a8e7dda8107b5cddd72ab74bc5daef9b71fd5425b8bd22b
                • Instruction Fuzzy Hash: 51110222F09D0A0BE75CFBA888696B4B391FF54335F104779D01EC31E6DE78B8068280
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b95470c6babe9f9142d356301a353dbe74460ace23108573a0f9285f786e9d6a
                • Instruction ID: f62ced211d15d5ce6791e751aa5949eb066fe4a83c28beed1f999483e195615f
                • Opcode Fuzzy Hash: b95470c6babe9f9142d356301a353dbe74460ace23108573a0f9285f786e9d6a
                • Instruction Fuzzy Hash: 1F210510B2D9494BEB85BBAC58767B877D1EF59318F4502B5F01DC72D3CD6869008792
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5e4cdb0cc6ba2a3312b115550ab89df1fbc8824e8f069478c5c82283d0aaae10
                • Instruction ID: 67ed36b9189acaae3684267daf02740902e6c3566105196a75f32df1d7e53479
                • Opcode Fuzzy Hash: 5e4cdb0cc6ba2a3312b115550ab89df1fbc8824e8f069478c5c82283d0aaae10
                • Instruction Fuzzy Hash: 5C11511071890947EA98B3EC68627B9A2C7DFEC71AFA40275F00DC72FBCC58BD018652
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b17032412cf22a371fb0e094d47a14170fec868085783d602ec02f48ae699cd7
                • Instruction ID: 9cd2f5357098712fe3e03a05589d92db5905e836001f53412e3d5d43524210fa
                • Opcode Fuzzy Hash: b17032412cf22a371fb0e094d47a14170fec868085783d602ec02f48ae699cd7
                • Instruction Fuzzy Hash: 43110A15F0F68A0BE77A77B848725B83BA1AF92354F4A01F5E058CF1E3DD5C69064351
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee363ea1f4d901da8f4c37c70f999ff7aeb7376b78f1f6ae7aea528354f26df7
                • Instruction ID: ab8fdb37db4e4bf1acc1beead0112777a0a31bbccdc6fa0c1120b6c52bf733d9
                • Opcode Fuzzy Hash: ee363ea1f4d901da8f4c37c70f999ff7aeb7376b78f1f6ae7aea528354f26df7
                • Instruction Fuzzy Hash: 3B1108B1A0968C4FE798DF6488A96B93FE0EF69204F4841BFD48ED76A1DA7461018700
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e3e16f236ff2fe9d889a356cc5896927b8be66f73f8f92af298588be5a417d85
                • Instruction ID: 750fdd4d02780d969aeb1d5ff7cab43ed8131e4ac74b977625fe21c63e44e421
                • Opcode Fuzzy Hash: e3e16f236ff2fe9d889a356cc5896927b8be66f73f8f92af298588be5a417d85
                • Instruction Fuzzy Hash: 72010472E09A8D4FDB41EFA888695FD7BF0FF19210F4501B7D018C7196EB2999418782
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7dae7f0a20853d10b8975a28b03038e4c615a753901f3a4fac31fe8b98e81fdb
                • Instruction ID: d57492b5de1837501bf534478f1864a918651403d7a152fc42a54f0c992f882e
                • Opcode Fuzzy Hash: 7dae7f0a20853d10b8975a28b03038e4c615a753901f3a4fac31fe8b98e81fdb
                • Instruction Fuzzy Hash: BC01F910F2F59A4FFB697BB8047567826919F65308F9605F4E00DD71D7DD5C58018341
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 398256ec6a004e3bdea2ca41aba1c2bc931ac370be053fde549f4ebaf7aa8be1
                • Instruction ID: a6ccb14ff37ef0c06b3122f6dbc068b382546c67528aa5040d3ced31138e60d3
                • Opcode Fuzzy Hash: 398256ec6a004e3bdea2ca41aba1c2bc931ac370be053fde549f4ebaf7aa8be1
                • Instruction Fuzzy Hash: 76F0F430F0D40A8BE3B5EBA8856067873A1AFA1324F150674D01DC73E2DE78B9418780
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 982f510d3889d0179028e5794f3ccaafc8ee00174df5fe05695656eb30f1905c
                • Instruction ID: 0967464579a5e3d2ca2c7bc72e3c69cc507aa510d980094cdb0c31cecb65e7b4
                • Opcode Fuzzy Hash: 982f510d3889d0179028e5794f3ccaafc8ee00174df5fe05695656eb30f1905c
                • Instruction Fuzzy Hash: 70E02B3286938C4FD7626FB058221EA7B34FF51204F4605CBF41CC70A2E72097188383
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be749fb374e119204ea1432ed6411a1594da0bdab888e07c5ebe139f8a5d1d13
                • Instruction ID: 76e15de2d47e7ef7a1114f71fbca34f944ef168f52518c327fab5770bbebe2f1
                • Opcode Fuzzy Hash: be749fb374e119204ea1432ed6411a1594da0bdab888e07c5ebe139f8a5d1d13
                • Instruction Fuzzy Hash: 2DD0C200C4E2CA0BE71B23B80C625A47F609A131A0F4A02D1D444C70E3E88D159A4272
                Memory Dump Source
                • Source File: 00000002.00000002.4108803923.00007FFD9BAC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9bac0000_airlineagancy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b9e65dd4ba68bbb97a4f2f36a3ef5b2bb626c93ac90d9831ab7b834ad64c2e06
                • Instruction ID: 9d775127c18b15faa6c8292c2e3c5b9aede7892cb9d8ad64ec262222c5b48043
                • Opcode Fuzzy Hash: b9e65dd4ba68bbb97a4f2f36a3ef5b2bb626c93ac90d9831ab7b834ad64c2e06
                • Instruction Fuzzy Hash: 20B09200F7B88A48D42933BA096B0B8BB60AB8A124FE614B1D48841092988E16A64282

                Execution Graph

                Execution Coverage:11.4%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:7.7%
                Total number of Nodes:156
                Total number of Limit Nodes:15
                execution_graph 31835 150f150 DuplicateHandle 31836 150f1e6 31835->31836 31962 150cb00 31963 150cb14 31962->31963 31964 150cb39 31963->31964 31966 150bc08 31963->31966 31967 150cce0 LoadLibraryExW 31966->31967 31969 150cd59 31967->31969 31969->31964 31837 7757df0 31839 7757dfd 31837->31839 31838 7757e5b 31839->31838 31842 7757f32 31839->31842 31847 7757f38 31839->31847 31843 7757f58 31842->31843 31844 7757f71 31843->31844 31852 7758118 31843->31852 31856 7758108 31843->31856 31844->31839 31848 7757f58 31847->31848 31849 7757f71 31848->31849 31850 7758118 4 API calls 31848->31850 31851 7758108 4 API calls 31848->31851 31849->31839 31850->31849 31851->31849 31854 775812a 31852->31854 31853 7758157 31853->31844 31854->31853 31860 77581bd 31854->31860 31858 775812a 31856->31858 31857 7758157 31857->31844 31858->31857 31859 77581bd 4 API calls 31858->31859 31859->31858 31861 77581c9 31860->31861 31862 77581e5 31861->31862 31866 7758287 31861->31866 31877 775824a 31861->31877 31862->31854 31863 77581f3 31863->31854 31867 775825c 31866->31867 31873 7758296 31866->31873 31868 7758271 31867->31868 31869 7758269 31867->31869 31871 7758277 31868->31871 31876 7758287 4 API calls 31868->31876 31870 775826e 31869->31870 31887 7758b40 31869->31887 31892 7758b3a 31869->31892 31870->31863 31871->31863 31872 7758280 31872->31863 31876->31871 31878 7758255 31877->31878 31879 7758271 31878->31879 31880 7758269 31878->31880 31883 7758287 4 API calls 31879->31883 31884 7758277 31879->31884 31881 775826e 31880->31881 31885 7758b40 4 API calls 31880->31885 31886 7758b3a 4 API calls 31880->31886 31881->31863 31882 7758280 31882->31863 31883->31884 31884->31863 31885->31882 31886->31882 31888 7758b54 31887->31888 31897 7758c68 31888->31897 31911 7758c5a 31888->31911 31889 7758ba7 31889->31872 31893 7758b40 31892->31893 31895 7758c68 4 API calls 31893->31895 31896 7758c5a 4 API calls 31893->31896 31894 7758ba7 31894->31872 31895->31894 31896->31894 31908 7758c68 3 API calls 31897->31908 31910 7758c5a 3 API calls 31897->31910 31925 7758cd8 31897->31925 31898 7758c7a 31899 7758cb1 31898->31899 31900 7758ccd 31898->31900 31901 7756a74 GetSystemTimes 31899->31901 31931 7756a74 31900->31931 31902 7758cc4 31901->31902 31902->31889 31905 775902e GetSystemTimes 31906 775906b 31905->31906 31906->31889 31907 7758d43 31907->31889 31908->31898 31910->31898 31912 7758c7a 31911->31912 31922 7758c68 3 API calls 31911->31922 31923 7758cd8 2 API calls 31911->31923 31924 7758c5a 3 API calls 31911->31924 31913 7758cb1 31912->31913 31916 7758ccd 31912->31916 31914 7756a74 GetSystemTimes 31913->31914 31915 7758cc4 31914->31915 31915->31889 31917 7756a74 GetSystemTimes 31916->31917 31918 7758d3f 31917->31918 31919 775902e GetSystemTimes 31918->31919 31921 7758d43 31918->31921 31920 775906b 31919->31920 31920->31889 31921->31889 31922->31912 31923->31912 31924->31912 31926 7756a74 GetSystemTimes 31925->31926 31927 7758d3f 31925->31927 31926->31927 31928 775902e GetSystemTimes 31927->31928 31930 7758d43 31927->31930 31929 775906b 31928->31929 31929->31898 31930->31898 31932 7758fe0 GetSystemTimes 31931->31932 31934 7758d3f 31932->31934 31934->31905 31934->31907 31935 150ca58 31936 150caa0 GetModuleHandleW 31935->31936 31937 150ca9a 31935->31937 31938 150cacd 31936->31938 31937->31936 31939 150e9e8 31940 150e9f5 31939->31940 31942 150ea2f 31940->31942 31943 150d5c0 31940->31943 31944 150d5cb 31943->31944 31945 150f748 31944->31945 31947 150ebe4 31944->31947 31948 150ebef 31947->31948 31951 150f830 31948->31951 31949 150f7c6 31949->31945 31952 150f85e 31951->31952 31954 150f887 31952->31954 31956 150f92f 31952->31956 31957 150ec80 31952->31957 31955 150f92a KiUserCallbackDispatcher 31954->31955 31954->31956 31955->31956 31958 150ec8b 31957->31958 31961 150ecf4 GetFocus 31958->31961 31960 150fe4d 31960->31954 31961->31960 31970 150ef08 31971 150ef4e GetCurrentProcess 31970->31971 31973 150efa0 GetCurrentThread 31971->31973 31974 150ef99 31971->31974 31975 150efd6 31973->31975 31976 150efdd GetCurrentProcess 31973->31976 31974->31973 31975->31976 31977 150f013 GetCurrentThreadId 31976->31977 31979 150f06c 31977->31979 31980 5884160 DispatchMessageW 31981 58841cc 31980->31981 31982 5882e60 31983 5883168 31982->31983 31984 5882e88 31982->31984 31985 5882e91 31984->31985 31988 58815fc 31984->31988 31987 5882eb4 31990 5881607 31988->31990 31989 58831ab 31989->31987 31990->31989 31992 5881618 31990->31992 31993 58831e0 OleInitialize 31992->31993 31994 5883244 31993->31994 31994->31989 31995 5880b70 SendMessageW 31996 5880bdc 31995->31996 31997 5883471 32000 5883475 31997->32000 31998 58838c0 WaitMessage 31998->32000 31999 58834aa 32000->31998 32000->31999 32001 7756188 32002 77561af 32001->32002 32006 5881d2b 32002->32006 32011 5881d07 32002->32011 32003 77561d3 32007 5881d3e 32006->32007 32016 5882008 PostMessageW 32007->32016 32018 5882000 32007->32018 32008 5881d61 32008->32003 32012 5881d2c 32011->32012 32013 5881d0d 32011->32013 32014 5882008 PostMessageW 32012->32014 32015 5882000 PostMessageW 32012->32015 32013->32003 32014->32013 32015->32013 32017 5882074 32016->32017 32017->32008 32019 5882008 PostMessageW 32018->32019 32020 5882074 32019->32020 32020->32008

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 645 5883471-5883473 646 58834bd-58834e8 645->646 647 5883475-58834a8 645->647 650 5883919 646->650 651 58834ee-5883502 646->651 656 58834aa-58834ac 647->656 657 58834b1-58834ba 647->657 655 588391e-5883934 650->655 652 5883531-5883550 651->652 653 5883504-588352e 651->653 664 5883568-588356a 652->664 665 5883552-5883558 652->665 653->652 660 588396a-588397f 655->660 656->660 657->646 668 5883589-5883592 664->668 669 588356c-5883584 664->669 666 588355a 665->666 667 588355c-588355e 665->667 666->664 667->664 671 588359a-58835a1 668->671 669->655 672 58835ab-58835b2 671->672 673 58835a3-58835a9 671->673 675 58835bc 672->675 676 58835b4-58835ba 672->676 674 58835bf-58835dc call 5881678 673->674 679 5883731-5883735 674->679 680 58835e2-58835e9 674->680 675->674 676->674 682 588373b-588373f 679->682 683 5883904-5883917 679->683 680->650 681 58835ef-588362c 680->681 691 58838fa-58838fe 681->691 692 5883632-5883637 681->692 684 5883759-5883762 682->684 685 5883741-5883754 682->685 683->655 687 5883791-5883798 684->687 688 5883764-588378e 684->688 685->655 689 588379e-58837a5 687->689 690 5883837-588384c 687->690 688->687 693 58837d4-58837f6 689->693 694 58837a7-58837d1 689->694 690->691 706 5883852-5883854 690->706 691->671 691->683 695 5883669-588367e call 588169c 692->695 696 5883639-5883647 call 5881684 692->696 693->690 729 58837f8-5883802 693->729 694->693 704 5883683-5883687 695->704 696->695 709 5883649-5883667 call 5881690 696->709 710 58836f8-5883705 704->710 711 5883689-588369b call 58816a8 704->711 707 58838a1-58838be call 5881678 706->707 708 5883856-588388f 706->708 707->691 726 58838c0-58838ec WaitMessage 707->726 723 5883898-588389f 708->723 724 5883891-5883897 708->724 709->704 710->691 727 588370b-5883715 call 58816b8 710->727 734 58836db-58836f3 711->734 735 588369d-58836cd 711->735 723->691 724->723 731 58838ee 726->731 732 58838f3 726->732 739 5883724-588372c call 58816d0 727->739 740 5883717-588371a call 58816c4 727->740 742 588381a-5883835 729->742 743 5883804-588380a 729->743 731->732 732->691 734->655 750 58836cf 735->750 751 58836d4 735->751 739->691 746 588371f 740->746 742->690 742->729 747 588380c 743->747 748 588380e-5883810 743->748 746->691 747->742 748->742 750->751 751->734
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2aa56c2f87ffe7ecb5c3bd29e19e7fe28bed5001a21952ad6fad997d875749c5
                • Instruction ID: e7e460416e5e01ac03647a482b708285b0ac5a3c8488b3593002b928acc04196
                • Opcode Fuzzy Hash: 2aa56c2f87ffe7ecb5c3bd29e19e7fe28bed5001a21952ad6fad997d875749c5
                • Instruction Fuzzy Hash: 88E12970A002098FDB14EFA9C848BADBBF2FF48714F158959E816EB265DB74ED45CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 754 7758c68-7758c72 787 7758c74 call 7758c68 754->787 788 7758c74 call 7758cd8 754->788 789 7758c74 call 7758c5a 754->789 755 7758c7a-7758caf 759 7758cb1-7758ccc call 7756a74 755->759 760 7758ccd-7758d41 call 7756a74 755->760 766 7758d43-7758d4c 760->766 767 7758d4d-7758d59 760->767 768 7758fc4-7759069 GetSystemTimes 767->768 769 7758d5f-7758d70 767->769 776 7759072-7759093 768->776 777 775906b-7759071 768->777 769->768 770 7758d76-7758d7c 769->770 770->768 771 7758d82-7758d88 770->771 771->768 773 7758d8e-7758d97 771->773 773->768 774 7758d9d-7758ec1 773->774 782 7758ec3-7758edb 774->782 783 7758edd-7758ef0 774->783 777->776 784 7758ef5-7758fc3 782->784 783->784 787->755 788->755 789->755
                Memory Dump Source
                • Source File: 00000003.00000002.2867098655.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_7750000_new policy.jbxd
                Similarity
                • API ID: SystemTimes
                • String ID:
                • API String ID: 375623090-0
                • Opcode ID: b7961a83725bf87eca1d427baa48b7ad5690961eb9bea04560af57e4a7c121fb
                • Instruction ID: e623612f0e4d28f2bcf988252d01ae38e39658bff7fefe73a5b148264cf413c6
                • Opcode Fuzzy Hash: b7961a83725bf87eca1d427baa48b7ad5690961eb9bea04560af57e4a7c121fb
                • Instruction Fuzzy Hash: 6DE107B1D0021ACFDB10DF68D880A99FBB5FF48310F14C6AAD919AB345D770AA85CF91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 322 150ef08-150ef97 GetCurrentProcess 326 150efa0-150efd4 GetCurrentThread 322->326 327 150ef99-150ef9f 322->327 328 150efd6-150efdc 326->328 329 150efdd-150f011 GetCurrentProcess 326->329 327->326 328->329 331 150f013-150f019 329->331 332 150f01a-150f032 329->332 331->332 335 150f03b-150f06a GetCurrentThreadId 332->335 336 150f073-150f0d5 335->336 337 150f06c-150f072 335->337 337->336
                APIs
                • GetCurrentProcess.KERNEL32 ref: 0150EF86
                • GetCurrentThread.KERNEL32 ref: 0150EFC3
                • GetCurrentProcess.KERNEL32 ref: 0150F000
                • GetCurrentThreadId.KERNEL32 ref: 0150F059
                Memory Dump Source
                • Source File: 00000003.00000002.2831074524.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_1500000_new policy.jbxd
                Similarity
                • API ID: Current$ProcessThread
                • String ID:
                • API String ID: 2063062207-0
                • Opcode ID: 7939f4d1d0e4c5c7fa244957e0900b5ffd8011571e9ecba92d3d6e942ef889d1
                • Instruction ID: bd8d67e7571fba3c1e29331f61cc9dd62563137719c3290463cd2dd4d2941f06
                • Opcode Fuzzy Hash: 7939f4d1d0e4c5c7fa244957e0900b5ffd8011571e9ecba92d3d6e942ef889d1
                • Instruction Fuzzy Hash: BF5165B0D013098FEB14DFAAD948B9EBBF1FF88304F248859E419A7290D7745984CF65

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 936 150f150-150f1e4 DuplicateHandle 937 150f1e6-150f1ec 936->937 938 150f1ed-150f20a 936->938 937->938
                APIs
                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0150F1D7
                Memory Dump Source
                • Source File: 00000003.00000002.2831074524.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_1500000_new policy.jbxd
                Similarity
                • API ID: DuplicateHandle
                • String ID:
                • API String ID: 3793708945-0
                • Opcode ID: 40a12e46b8a3b73694d2bfe6891325ab1b243d3f7401aedeb676b4821f65af25
                • Instruction ID: e2abc8005cee706fa34c4e27fc969f2a991c5601ebea21ef4695a1fb54b1518d
                • Opcode Fuzzy Hash: 40a12e46b8a3b73694d2bfe6891325ab1b243d3f7401aedeb676b4821f65af25
                • Instruction Fuzzy Hash: DE21E2B5D002099FDB10CFAAD884ADEBFF9FB48310F14841AE918A7350C374A944CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 941 7756a74-7759069 GetSystemTimes 944 7759072-7759093 941->944 945 775906b-7759071 941->945 945->944
                APIs
                • GetSystemTimes.KERNEL32(00000000,00000000,?), ref: 0775905C
                Memory Dump Source
                • Source File: 00000003.00000002.2867098655.0000000007750000.00000040.00000800.00020000.00000000.sdmp, Offset: 07750000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_7750000_new policy.jbxd
                Similarity
                • API ID: SystemTimes
                • String ID:
                • API String ID: 375623090-0
                • Opcode ID: 7c525826511b9d2b9a97fbbb46c19a774509b68a2397384f01dfa23cf23269a2
                • Instruction ID: 40166bfd03553b53f94b07a7088a341fd9a9f22ca8db8bcbcb45fd1eb9c29484
                • Opcode Fuzzy Hash: 7c525826511b9d2b9a97fbbb46c19a774509b68a2397384f01dfa23cf23269a2
                • Instruction Fuzzy Hash: 6B21F3B1C012099FCB50DFA9D984BDEFBF8EF48310F24806AE908AB241D3749944CFA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 947 150bc08-150cd20 949 150cd22-150cd25 947->949 950 150cd28-150cd57 LoadLibraryExW 947->950 949->950 951 150cd60-150cd7d 950->951 952 150cd59-150cd5f 950->952 952->951
                APIs
                • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,0150CB39,00000800,00000000,00000000), ref: 0150CD4A
                Memory Dump Source
                • Source File: 00000003.00000002.2831074524.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_1500000_new policy.jbxd
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: b18b28ea4fdcaa098cdb26d78b727c4f7b08b2a5c6e8d4fe8908579351f12fab
                • Instruction ID: 38525f0248e7b8a1b17ec50c88bf45c7b66cd71eaa1480428f78e805c251ea4b
                • Opcode Fuzzy Hash: b18b28ea4fdcaa098cdb26d78b727c4f7b08b2a5c6e8d4fe8908579351f12fab
                • Instruction Fuzzy Hash: 471142B6C003498FDB10CF9AD848A9EFBF4FB89310F10846AE919AB240C374A545CFA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 955 5882000-5882072 PostMessageW 957 588207b-588209c 955->957 958 5882074-588207a 955->958 958->957
                APIs
                • PostMessageW.USER32(?,?,?,?), ref: 05882065
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: MessagePost
                • String ID:
                • API String ID: 410705778-0
                • Opcode ID: 9bab220d6d56770c84514c9233837ff0633790821243d168ec66b5937c64c6a5
                • Instruction ID: 32b31d0878bb2a8ffbf00229980403c70bb7138a53c4f19729127b71a3bf59a1
                • Opcode Fuzzy Hash: 9bab220d6d56770c84514c9233837ff0633790821243d168ec66b5937c64c6a5
                • Instruction Fuzzy Hash: 8F1128B58003499FDB10DF9AD845BEEBFF8EB48324F108459E955A3251C375A944CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 960 5882008-5882072 PostMessageW 961 588207b-588209c 960->961 962 5882074-588207a 960->962 962->961
                APIs
                • PostMessageW.USER32(?,?,?,?), ref: 05882065
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: MessagePost
                • String ID:
                • API String ID: 410705778-0
                • Opcode ID: 51fcc9cfacbfb8c91aa153ce5976cb33bd9046c9af8ddf4507e546bbcf020a06
                • Instruction ID: 33230450aab085ac1fe10cb6b688c36d7ca926061a34556adedeeaf69ea56a2a
                • Opcode Fuzzy Hash: 51fcc9cfacbfb8c91aa153ce5976cb33bd9046c9af8ddf4507e546bbcf020a06
                • Instruction Fuzzy Hash: 341106B58003499FDB10DF9AC845BEEFBF8EB48320F108459E955A3251D379A944CFA5
                APIs
                • GetModuleHandleW.KERNEL32(00000000), ref: 0150CABE
                Memory Dump Source
                • Source File: 00000003.00000002.2831074524.0000000001500000.00000040.00000800.00020000.00000000.sdmp, Offset: 01500000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_1500000_new policy.jbxd
                Similarity
                • API ID: HandleModule
                • String ID:
                • API String ID: 4139908857-0
                • Opcode ID: d757d29312fda0dfa3a5a10c26a0e8f6a6df9c65d4aaa0946535c4342906783a
                • Instruction ID: 6d3c2281826de64cd90dda4eb6c1c25c5edd19a2994aa46777b77a606ea18f94
                • Opcode Fuzzy Hash: d757d29312fda0dfa3a5a10c26a0e8f6a6df9c65d4aaa0946535c4342906783a
                • Instruction Fuzzy Hash: A51110B6C002498FDB10DF9AD844ADEFBF4EB89314F14856AD419A7240C375A545CFA1
                APIs
                • OleInitialize.OLE32(00000000), ref: 05883235
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: 30346a7be493f99bd22eae36a554a336ef5f7829daac45854c62485bab4347c9
                • Instruction ID: b0a79c97e2504ad650dd3cc9a267b8682aadc65dde1676d94e5733dbd9b8f8a2
                • Opcode Fuzzy Hash: 30346a7be493f99bd22eae36a554a336ef5f7829daac45854c62485bab4347c9
                • Instruction Fuzzy Hash: 181145B4C003498FCB10EF9AD848BDEBFF4EB48714F108859E919A3200C375A944CFA5
                APIs
                • SendMessageW.USER32(?,?,?,?), ref: 05880BCD
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: MessageSend
                • String ID:
                • API String ID: 3850602802-0
                • Opcode ID: f223a2b141ca666a2ce9932d1c1e4a5e39f9a9ac07de37fa22bf3cf57c1471b1
                • Instruction ID: 8bb0ce777799f1c2143f8516aa3b7cfc4bbb81f5e783f6119fadf0c73ac25b34
                • Opcode Fuzzy Hash: f223a2b141ca666a2ce9932d1c1e4a5e39f9a9ac07de37fa22bf3cf57c1471b1
                • Instruction Fuzzy Hash: 3B1103B5800349DFDB10DF9AD949BDEBFF8EB48314F14845AE918A7200C375A948CFA1
                APIs
                • OleInitialize.OLE32(00000000), ref: 05883235
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: 64f5fe038a6c581d37995ae19d3af39b78e9ae376412444cae2a2d74f4db99b8
                • Instruction ID: 12ce3d5469887397e66e78ea0c613918a6845626c39479ae0a22d0d152c2456e
                • Opcode Fuzzy Hash: 64f5fe038a6c581d37995ae19d3af39b78e9ae376412444cae2a2d74f4db99b8
                • Instruction Fuzzy Hash: 021103B1C043498FDB10EF9AD849B9EBFF8EB48314F108459D959A7210C778A945CFA5
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: DispatchMessage
                • String ID:
                • API String ID: 2061451462-0
                • Opcode ID: cb0e99dccc51ff3d7b8beb5788602e5f22afd860203584f6de79a52391eef136
                • Instruction ID: 8096e40ba6a2e0f78b627d88785072ad66c43d62442bf12a23a362496f57c93c
                • Opcode Fuzzy Hash: cb0e99dccc51ff3d7b8beb5788602e5f22afd860203584f6de79a52391eef136
                • Instruction Fuzzy Hash: 7511F2B5C043498FDB10EF9AE948BDEFBF8EB48314F10846AD819A3210D374A545CFA5
                APIs
                • SendMessageW.USER32(?,?,?,?), ref: 05880BCD
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: MessageSend
                • String ID:
                • API String ID: 3850602802-0
                • Opcode ID: 1c485369fd15b50829589ab9e749246fd146077ba7b24ed1f61b713e82904943
                • Instruction ID: 4d78183bc26363276b4647976276620b0e3525e13977643c02d32f299dc44dce
                • Opcode Fuzzy Hash: 1c485369fd15b50829589ab9e749246fd146077ba7b24ed1f61b713e82904943
                • Instruction Fuzzy Hash: 9711D3B5800349DFDB10DF9AD849BDEBBF8EB48314F148459D919A7200C375A944CFA1
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.2857886207.0000000005880000.00000040.00000800.00020000.00000000.sdmp, Offset: 05880000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_5880000_new policy.jbxd
                Similarity
                • API ID: DispatchMessage
                • String ID:
                • API String ID: 2061451462-0
                • Opcode ID: 1c1b0466365387c331070f48f6d1f60ea292654cf3d573c0f2ed1cf9eea6ae7f
                • Instruction ID: aeab5836a84331520ef8027f9bf06ccc3b4194f6013a319f63509245e57405b4
                • Opcode Fuzzy Hash: 1c1b0466365387c331070f48f6d1f60ea292654cf3d573c0f2ed1cf9eea6ae7f
                • Instruction Fuzzy Hash: 3E1100B5C002498FDB10EF9AD848BDEFBF8EB48314F10842AD819A3210C378A544CFA5
                Memory Dump Source
                • Source File: 00000003.00000002.2830620912.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_145d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a37b195f884deaf70c2368a1842430eb9c000dc3a180a0c30674126094aff780
                • Instruction ID: 941a96996898419a97f21deeb7105fa687917e95825721ddadbf14ed7ead67cf
                • Opcode Fuzzy Hash: a37b195f884deaf70c2368a1842430eb9c000dc3a180a0c30674126094aff780
                • Instruction Fuzzy Hash: A321F1B1904240DFDB45DF98D9C0B67BF65FF84314F24C56AED090A267C336E456CAA1
                Memory Dump Source
                • Source File: 00000003.00000002.2830701799.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_146d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 520abfc42331d6755b3c1deda7cfab72d95bcdcc8b1fbdd722a04a6b9bb85799
                • Instruction ID: 6f4cce4bd6ae4ed74df19695b86de6030adaf7b9b28a6f5bbcd8953c2e74b97c
                • Opcode Fuzzy Hash: 520abfc42331d6755b3c1deda7cfab72d95bcdcc8b1fbdd722a04a6b9bb85799
                • Instruction Fuzzy Hash: B52125B1A04240DFDB15DF58D9C0B26BBA9EB8431CF24C56ED98A0B366C337D407CA62
                Memory Dump Source
                • Source File: 00000003.00000002.2830701799.000000000146D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0146D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_146d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4fef5b8c3dc3150e7dd7c07319742249d1d7da6ab6db2fc67a336fbb373f852e
                • Instruction ID: d73d77668c290b05d1dc90cf73e9a2f9c7b3c7c227e3a5c69c18e28a50ce307a
                • Opcode Fuzzy Hash: 4fef5b8c3dc3150e7dd7c07319742249d1d7da6ab6db2fc67a336fbb373f852e
                • Instruction Fuzzy Hash: 192180755093808FDB03CF24D594716BF71EB46218F28C5DBD8898B6A7C33A980ACB62
                Memory Dump Source
                • Source File: 00000003.00000002.2830620912.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_145d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                • Instruction ID: 2c89e0d826f68fa128f4c3c6bfcbaacd2391da3ddc03a0e34277a93da17e555c
                • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
                • Instruction Fuzzy Hash: E011AC72804280CFCB02CF54D9C4B56BF61FB84214F24C5AAD8490A667C336E45ACBA1
                Memory Dump Source
                • Source File: 00000003.00000002.2830620912.000000000145D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0145D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_145d000_new policy.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa1e9185094c5ef16796e3ad083ad76acf2c070f471405f1e3bc79715ba4438c
                • Instruction ID: b690637d7a1c7d73b034ca9d5fdcdc3a9ea823bf6c531f6c2a515adf444a8a70
                • Opcode Fuzzy Hash: aa1e9185094c5ef16796e3ad083ad76acf2c070f471405f1e3bc79715ba4438c
                • Instruction Fuzzy Hash: 272104F09042409FDB54EF58D580B26BBA5EF84B58F20C56EDD0A4B353C33AD447C661

                Execution Graph

                Execution Coverage:10.1%
                Dynamic/Decrypted Code Coverage:97.7%
                Signature Coverage:0%
                Total number of Nodes:309
                Total number of Limit Nodes:6
                execution_graph 56643 5d97548 56644 5d9755d 56643->56644 56649 5d97588 56644->56649 56654 5d9780f 56644->56654 56659 5d9757b 56644->56659 56645 5d97573 56651 5d975b2 56649->56651 56650 5d975f1 56650->56645 56651->56650 56664 5d9b5f8 56651->56664 56668 5d9b600 56651->56668 56656 5d975e2 56654->56656 56655 5d975f1 56655->56645 56656->56655 56657 5d9b5f8 SleepEx 56656->56657 56658 5d9b600 SleepEx 56656->56658 56657->56656 56658->56656 56661 5d97588 56659->56661 56660 5d975f1 56660->56645 56661->56660 56662 5d9b5f8 SleepEx 56661->56662 56663 5d9b600 SleepEx 56661->56663 56662->56661 56663->56661 56665 5d9b600 SleepEx 56664->56665 56667 5d9b6a4 56665->56667 56667->56651 56669 5d9b644 SleepEx 56668->56669 56671 5d9b6a4 56669->56671 56671->56651 56696 5c4ef00 56697 5c4ef44 VirtualAlloc 56696->56697 56699 5c4efb1 56697->56699 57033 fbd01c 57034 fbd034 57033->57034 57035 fbd08f 57034->57035 57037 5c4e420 57034->57037 57038 5c4e479 57037->57038 57041 5c4e9b0 57038->57041 57039 5c4e4ae 57042 5c4e9dd 57041->57042 57043 5c4d438 VirtualProtect 57042->57043 57045 5c4eb73 57042->57045 57044 5c4eb64 57043->57044 57044->57039 57045->57039 56672 5d9e6e0 56673 5d9e72f NtProtectVirtualMemory 56672->56673 56675 5d9e7a7 56673->56675 56676 2b26a88 56677 2b26aa5 56676->56677 56678 2b26ab5 56677->56678 56681 5c43a77 56677->56681 56685 5c408fe 56677->56685 56682 5c43a96 56681->56682 56688 5c4d438 56682->56688 56687 5c4d438 VirtualProtect 56685->56687 56686 5c401eb 56687->56686 56690 5c4d45f 56688->56690 56692 5c4d938 56690->56692 56693 5c4d981 VirtualProtect 56692->56693 56695 5c43ac1 56693->56695 56700 2b595e8 56701 2b595fd 56700->56701 56702 2b59613 56701->56702 56709 2b596a2 56701->56709 56713 2b59a03 56701->56713 56717 2b598db 56701->56717 56721 2b59618 56701->56721 56725 2b59628 56701->56725 56729 2b59b82 56701->56729 56711 2b59685 56709->56711 56710 2b5969a 56710->56702 56711->56710 56733 2b5a988 56711->56733 56715 2b59685 56713->56715 56714 2b5969a 56714->56702 56715->56714 56716 2b5a988 10 API calls 56715->56716 56716->56715 56718 2b59685 56717->56718 56720 2b5969a 56717->56720 56719 2b5a988 10 API calls 56718->56719 56718->56720 56719->56718 56720->56702 56723 2b59652 56721->56723 56722 2b5969a 56722->56702 56723->56722 56724 2b5a988 10 API calls 56723->56724 56724->56723 56727 2b59652 56725->56727 56726 2b5969a 56726->56702 56727->56726 56728 2b5a988 10 API calls 56727->56728 56728->56727 56731 2b59685 56729->56731 56730 2b5969a 56730->56702 56731->56730 56732 2b5a988 10 API calls 56731->56732 56732->56731 56734 2b5a9ad 56733->56734 56738 2b5acc5 56734->56738 56743 2b5ad86 56734->56743 56739 2b5accb 56738->56739 56748 2b5b0e8 56739->56748 56788 2b5b0d8 56739->56788 56740 2b5acf1 56744 2b5acc6 56743->56744 56745 2b5acf1 56744->56745 56746 2b5b0e8 10 API calls 56744->56746 56747 2b5b0d8 10 API calls 56744->56747 56746->56745 56747->56745 56749 2b5b0fd 56748->56749 56750 2b5b11f 56749->56750 56828 2b5b868 56749->56828 56833 2b5b769 56749->56833 56839 2b5b129 56749->56839 56842 2b5b3ee 56749->56842 56846 2b5b362 56749->56846 56851 2b5b262 56749->56851 56854 2b5c3a2 56749->56854 56857 2b5b2e1 56749->56857 56860 2b5c426 56749->56860 56863 2b5b827 56749->56863 56866 2b5b6a5 56749->56866 56869 2b5ba3a 56749->56869 56872 2b5b138 56749->56872 56875 2b5bbf9 56749->56875 56878 2b5befc 56749->56878 56881 2b5bb72 56749->56881 56887 2b5c0b3 56749->56887 56890 2b5b4f1 56749->56890 56893 2b5c04e 56749->56893 56896 2b5be4d 56749->56896 56899 2b5b58d 56749->56899 56902 2b5c48d 56749->56902 56905 2b5bdc0 56749->56905 56908 2b5b286 56749->56908 56911 2b5bd1a 56749->56911 56914 2b5bc5a 56749->56914 56920 2b5c299 56749->56920 56923 2b5b65c 56749->56923 56926 2b5b31c 56749->56926 56932 2b5b8d3 56749->56932 56935 2b5b210 56749->56935 56938 2b5bf51 56749->56938 56944 2b5b916 56749->56944 56948 2b5bcd6 56749->56948 56952 2b5bfd6 56749->56952 56955 2b5bd95 56749->56955 56958 2b5b2ab 56749->56958 56750->56740 56789 2b5b0fd 56788->56789 56790 2b5b11f 56789->56790 56791 2b5b4f1 2 API calls 56789->56791 56792 2b5c0b3 2 API calls 56789->56792 56793 2b5bb72 4 API calls 56789->56793 56794 2b5befc 2 API calls 56789->56794 56795 2b5bbf9 2 API calls 56789->56795 56796 2b5b138 2 API calls 56789->56796 56797 2b5ba3a 2 API calls 56789->56797 56798 2b5b6a5 2 API calls 56789->56798 56799 2b5b827 2 API calls 56789->56799 56800 2b5c426 2 API calls 56789->56800 56801 2b5b2e1 2 API calls 56789->56801 56802 2b5c3a2 2 API calls 56789->56802 56803 2b5b262 2 API calls 56789->56803 56804 2b5b362 2 API calls 56789->56804 56805 2b5b3ee 2 API calls 56789->56805 56806 2b5b129 2 API calls 56789->56806 56807 2b5b769 4 API calls 56789->56807 56808 2b5b868 4 API calls 56789->56808 56809 2b5b2ab 2 API calls 56789->56809 56810 2b5bd95 2 API calls 56789->56810 56811 2b5bfd6 2 API calls 56789->56811 56812 2b5bcd6 2 API calls 56789->56812 56813 2b5b916 2 API calls 56789->56813 56814 2b5bf51 4 API calls 56789->56814 56815 2b5b210 2 API calls 56789->56815 56816 2b5b8d3 2 API calls 56789->56816 56817 2b5b31c 4 API calls 56789->56817 56818 2b5b65c 2 API calls 56789->56818 56819 2b5c299 2 API calls 56789->56819 56820 2b5bc5a 4 API calls 56789->56820 56821 2b5bd1a 2 API calls 56789->56821 56822 2b5b286 2 API calls 56789->56822 56823 2b5bdc0 2 API calls 56789->56823 56824 2b5c48d 2 API calls 56789->56824 56825 2b5b58d 2 API calls 56789->56825 56826 2b5be4d 2 API calls 56789->56826 56827 2b5c04e 2 API calls 56789->56827 56790->56740 56791->56790 56792->56790 56793->56790 56794->56790 56795->56790 56796->56790 56797->56790 56798->56790 56799->56790 56800->56790 56801->56790 56802->56790 56803->56790 56804->56790 56805->56790 56806->56790 56807->56790 56808->56790 56809->56790 56810->56790 56811->56790 56812->56790 56813->56790 56814->56790 56815->56790 56816->56790 56817->56790 56818->56790 56819->56790 56820->56790 56821->56790 56822->56790 56823->56790 56824->56790 56825->56790 56826->56790 56827->56790 56961 5d9f2f3 56828->56961 56965 5d9f2f8 56828->56965 56829 2b5b1ad 56969 2b5dd88 56829->56969 56834 2b5b781 56833->56834 56982 5d9f9b8 56834->56982 56986 5d9f9b0 56834->56986 56835 2b5b1ad 56838 2b5dd88 2 API calls 56835->56838 56838->56835 56840 2b5b16b 56839->56840 56841 2b5dd88 2 API calls 56840->56841 56841->56840 56843 2b5b40a 56842->56843 56845 2b5dd88 2 API calls 56843->56845 56844 2b5b432 56845->56844 56847 2b5b37f 56846->56847 56849 5d9f9b8 WriteProcessMemory 56847->56849 56850 5d9f9b0 WriteProcessMemory 56847->56850 56848 2b5b3ca 56848->56750 56849->56848 56850->56848 56852 2b5b1ad 56851->56852 56853 2b5dd88 2 API calls 56852->56853 56853->56852 56855 2b5b1ad 56854->56855 56856 2b5dd88 2 API calls 56855->56856 56856->56855 56858 2b5b1ad 56857->56858 56859 2b5dd88 2 API calls 56858->56859 56859->56858 56861 2b5b1ad 56860->56861 56862 2b5dd88 2 API calls 56861->56862 56862->56861 56864 2b5b1ad 56863->56864 56865 2b5dd88 2 API calls 56864->56865 56865->56864 56867 2b5b1ad 56866->56867 56868 2b5dd88 2 API calls 56867->56868 56868->56867 56870 2b5b1ad 56869->56870 56871 2b5dd88 2 API calls 56870->56871 56871->56870 56873 2b5b16b 56872->56873 56874 2b5dd88 2 API calls 56873->56874 56874->56873 56876 2b5b1ad 56875->56876 56877 2b5dd88 2 API calls 56876->56877 56877->56876 56879 2b5b1ad 56878->56879 56880 2b5dd88 2 API calls 56879->56880 56880->56879 56882 2b5bb79 56881->56882 56990 2b5c6d0 56882->56990 56996 2b5c6c0 56882->56996 56883 2b5b1ad 56886 2b5dd88 2 API calls 56883->56886 56886->56883 56888 2b5b1ad 56887->56888 56889 2b5dd88 2 API calls 56888->56889 56889->56888 56891 2b5b1ad 56890->56891 56892 2b5dd88 2 API calls 56891->56892 56892->56891 56894 2b5b1ad 56893->56894 56895 2b5dd88 2 API calls 56894->56895 56895->56894 56897 2b5b1ad 56896->56897 56898 2b5dd88 2 API calls 56897->56898 56898->56897 56900 2b5b1ad 56899->56900 56901 2b5dd88 2 API calls 56900->56901 56901->56900 56903 2b5b1ad 56902->56903 56904 2b5dd88 2 API calls 56903->56904 56904->56903 56906 2b5b1ad 56905->56906 56907 2b5dd88 2 API calls 56906->56907 56907->56906 56909 2b5b1ad 56908->56909 56910 2b5dd88 2 API calls 56909->56910 56910->56909 56912 2b5b1ad 56911->56912 56913 2b5dd88 2 API calls 56912->56913 56913->56912 56915 2b5bc72 56914->56915 56917 5d9f9b8 WriteProcessMemory 56915->56917 56918 5d9f9b0 WriteProcessMemory 56915->56918 56916 2b5b1ad 56919 2b5dd88 2 API calls 56916->56919 56917->56916 56918->56916 56919->56916 56921 2b5b1ad 56920->56921 56921->56920 56922 2b5dd88 2 API calls 56921->56922 56922->56921 56924 2b5b1ad 56923->56924 56925 2b5dd88 2 API calls 56924->56925 56925->56924 56927 2b5bf77 56926->56927 56928 2b5b1ad 56926->56928 57025 5d9fbd0 56927->57025 57029 5d9fbc8 56927->57029 56929 2b5dd88 2 API calls 56928->56929 56929->56928 56933 2b5b1ad 56932->56933 56934 2b5dd88 2 API calls 56933->56934 56934->56933 56936 2b5b1ad 56935->56936 56937 2b5dd88 2 API calls 56936->56937 56937->56936 56939 2b5bf5b 56938->56939 56941 5d9fbc8 NtResumeThread 56939->56941 56942 5d9fbd0 NtResumeThread 56939->56942 56940 2b5b1ad 56943 2b5dd88 2 API calls 56940->56943 56941->56940 56942->56940 56943->56940 56946 5d9f2f8 Wow64SetThreadContext 56944->56946 56947 5d9f2f3 Wow64SetThreadContext 56944->56947 56945 2b5b930 56946->56945 56947->56945 56949 2b5bcdb 56948->56949 56950 2b5b1ad 56948->56950 56949->56949 56951 2b5dd88 2 API calls 56950->56951 56951->56950 56953 2b5b1ad 56952->56953 56954 2b5dd88 2 API calls 56953->56954 56954->56953 56956 2b5b1ad 56955->56956 56957 2b5dd88 2 API calls 56956->56957 56957->56956 56959 2b5b1ad 56958->56959 56960 2b5dd88 2 API calls 56959->56960 56960->56959 56962 5d9f2f8 Wow64SetThreadContext 56961->56962 56964 5d9f3b9 56962->56964 56964->56829 56966 5d9f341 Wow64SetThreadContext 56965->56966 56968 5d9f3b9 56966->56968 56968->56829 56970 2b5ddad 56969->56970 56974 5d9f858 56970->56974 56978 5d9f851 56970->56978 56971 2b5ddcf 56971->56829 56975 5d9f89c VirtualAllocEx 56974->56975 56977 5d9f914 56975->56977 56977->56971 56979 5d9f89c VirtualAllocEx 56978->56979 56981 5d9f914 56979->56981 56981->56971 56983 5d9fa04 WriteProcessMemory 56982->56983 56985 5d9fa9d 56983->56985 56985->56835 56987 5d9fa04 WriteProcessMemory 56986->56987 56989 5d9fa9d 56987->56989 56989->56835 56991 2b5c6e7 56990->56991 56992 2b5c709 56991->56992 57002 2b5cb06 56991->57002 57007 2b5cdab 56991->57007 57012 2b5cb62 56991->57012 56992->56883 56997 2b5c6e7 56996->56997 56998 2b5c709 56997->56998 56999 2b5cb06 2 API calls 56997->56999 57000 2b5cb62 2 API calls 56997->57000 57001 2b5cdab 2 API calls 56997->57001 56998->56883 56999->56998 57000->56998 57001->56998 57003 2b5cb0f 57002->57003 57017 5d9ef40 57003->57017 57021 5d9ef34 57003->57021 57008 2b5cdb7 57007->57008 57009 2b5c7b8 57008->57009 57010 5d9ef40 CreateProcessA 57008->57010 57011 5d9ef34 CreateProcessA 57008->57011 57010->57009 57011->57009 57013 2b5cb87 57012->57013 57015 5d9ef40 CreateProcessA 57013->57015 57016 5d9ef34 CreateProcessA 57013->57016 57014 2b5c7b8 57015->57014 57016->57014 57018 5d9efc0 CreateProcessA 57017->57018 57020 5d9f1bc 57018->57020 57022 5d9efc0 CreateProcessA 57021->57022 57024 5d9f1bc 57022->57024 57026 5d9fc19 NtResumeThread 57025->57026 57028 5d9fc70 57026->57028 57028->56928 57030 5d9fc19 NtResumeThread 57029->57030 57032 5d9fc70 57030->57032 57032->56928
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: ,bq$4$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                • API String ID: 0-312445597
                • Opcode ID: 56ced6d7fe3bf022dfb7cd3f5ce8c496500fb1d4d003057aa0b0e80660268846
                • Instruction ID: 95f43814d2c57cbbbe15179053df0e085c0bed27186d2d28c893917d4e2b7dde
                • Opcode Fuzzy Hash: 56ced6d7fe3bf022dfb7cd3f5ce8c496500fb1d4d003057aa0b0e80660268846
                • Instruction Fuzzy Hash: 5AB21834A00258CFDB14DFA8C895BADB7B6BF88700F158999E505AB3A5CB70ED85CF50
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: ,bq$4$$^q$$^q$$^q$$^q
                • API String ID: 0-2546334966
                • Opcode ID: 68db8b920d2a6dab488215d03386c8bebb5aa4c08a641aa4d06a2f5471877e21
                • Instruction ID: db0ebe33f742160088e534bf0cd64e7f8ce52d57bbf6ce6e3139f04f0b7f90e2
                • Opcode Fuzzy Hash: 68db8b920d2a6dab488215d03386c8bebb5aa4c08a641aa4d06a2f5471877e21
                • Instruction Fuzzy Hash: F6223B34A00258CFDB24DFA4C985BADB7B2BF48700F1489A9E509AB3A5DB70DD81CF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 713 2b2b178-2b2b199 714 2b2b1a0-2b2b287 713->714 715 2b2b19b 713->715 717 2b2b989-2b2b9b1 714->717 718 2b2b28d-2b2b3ce call 2b27210 714->718 715->714 721 2b2c0b7-2b2c0c0 717->721 764 2b2b952-2b2b97c 718->764 765 2b2b3d4-2b2b42f 718->765 723 2b2c0c6-2b2c0dd 721->723 724 2b2b9bf-2b2b9c9 721->724 725 2b2b9d0-2b2bac4 call 2b27210 724->725 726 2b2b9cb 724->726 747 2b2bac6-2b2bad2 725->747 748 2b2baee 725->748 726->725 750 2b2bad4-2b2bada 747->750 751 2b2badc-2b2bae2 747->751 749 2b2baf4-2b2bb14 748->749 755 2b2bb16-2b2bb6f 749->755 756 2b2bb74-2b2bbf4 749->756 753 2b2baec 750->753 751->753 753->749 768 2b2c0b4 755->768 776 2b2bbf6-2b2bc49 756->776 777 2b2bc4b-2b2bc8e call 2b27210 756->777 778 2b2b986 764->778 779 2b2b97e 764->779 771 2b2b431 765->771 772 2b2b434-2b2b43f 765->772 768->721 771->772 775 2b2b867-2b2b86d 772->775 780 2b2b873-2b2b8ef call 2b2013c 775->780 781 2b2b444-2b2b462 775->781 802 2b2bc99-2b2bca2 776->802 777->802 778->717 779->778 821 2b2b93c-2b2b942 780->821 783 2b2b464-2b2b468 781->783 784 2b2b4b9-2b2b4ce 781->784 783->784 787 2b2b46a-2b2b475 783->787 789 2b2b4d0 784->789 790 2b2b4d5-2b2b4eb 784->790 793 2b2b4ab-2b2b4b1 787->793 789->790 791 2b2b4f2-2b2b509 790->791 792 2b2b4ed 790->792 797 2b2b510-2b2b526 791->797 798 2b2b50b 791->798 792->791 799 2b2b4b3-2b2b4b4 793->799 800 2b2b477-2b2b47b 793->800 805 2b2b528 797->805 806 2b2b52d-2b2b534 797->806 798->797 808 2b2b537-2b2b5a2 799->808 803 2b2b481-2b2b499 800->803 804 2b2b47d 800->804 809 2b2bd02-2b2bd11 802->809 810 2b2b4a0-2b2b4a8 803->810 811 2b2b49b 803->811 804->803 805->806 806->808 812 2b2b5b6-2b2b76b 808->812 813 2b2b5a4-2b2b5b0 808->813 815 2b2bd13-2b2bd9b 809->815 816 2b2bca4-2b2bccc 809->816 810->793 811->810 823 2b2b7cf-2b2b7e4 812->823 824 2b2b76d-2b2b771 812->824 813->812 851 2b2bf14-2b2bf20 815->851 818 2b2bcd3-2b2bcfc 816->818 819 2b2bcce 816->819 818->809 819->818 827 2b2b8f1-2b2b939 821->827 828 2b2b944-2b2b94a 821->828 829 2b2b7e6 823->829 830 2b2b7eb-2b2b80c 823->830 824->823 825 2b2b773-2b2b782 824->825 831 2b2b7c1-2b2b7c7 825->831 827->821 828->764 829->830 832 2b2b813-2b2b832 830->832 833 2b2b80e 830->833 838 2b2b784-2b2b788 831->838 839 2b2b7c9-2b2b7ca 831->839 835 2b2b834 832->835 836 2b2b839-2b2b859 832->836 833->832 835->836 844 2b2b860 836->844 845 2b2b85b 836->845 842 2b2b792-2b2b7b3 838->842 843 2b2b78a-2b2b78e 838->843 846 2b2b864 839->846 847 2b2b7b5 842->847 848 2b2b7ba-2b2b7be 842->848 843->842 844->846 845->844 846->775 847->848 848->831 853 2b2bda0-2b2bda9 851->853 854 2b2bf26-2b2bf81 851->854 855 2b2bdb2-2b2bf08 853->855 856 2b2bdab 853->856 869 2b2bf83-2b2bfb6 854->869 870 2b2bfb8-2b2bfe2 854->870 874 2b2bf0e 855->874 856->855 858 2b2be42-2b2be82 856->858 859 2b2be87-2b2bec7 856->859 860 2b2bdb8-2b2bdf8 856->860 861 2b2bdfd-2b2be3d 856->861 858->874 859->874 860->874 861->874 878 2b2bfeb-2b2c07e 869->878 870->878 874->851 882 2b2c085-2b2c0a5 878->882 882->768
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: TJcq$Te^q$pbq$xbaq
                • API String ID: 0-1954897716
                • Opcode ID: 0f3acf19551241b97ee5128b9e792beb28b44200e92d73f406775e3ba00e670f
                • Instruction ID: da9ce5f5c9598c81bfa5884a899b67eafa079c65644060e0c764e21fede23a5c
                • Opcode Fuzzy Hash: 0f3acf19551241b97ee5128b9e792beb28b44200e92d73f406775e3ba00e670f
                • Instruction Fuzzy Hash: C1A29475A002288FDB64DF69C984B99BBB2FF89304F1581D9E50DAB325DB319E85CF40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1808 5c34368-5c3437f 1809 5c34385-5c34394 1808->1809 1810 5c3470c-5c34731 1808->1810 1813 5c34396-5c34398 1809->1813 1814 5c3439d-5c343b6 1809->1814 1823 5c34738-5c34740 1810->1823 1815 5c34704-5c3470b 1813->1815 1818 5c343b8-5c343bf 1814->1818 1819 5c343df-5c343e1 1814->1819 1821 5c343c1-5c343c8 1818->1821 1822 5c343e6-5c34442 call 5c32798 1818->1822 1819->1815 1821->1823 1824 5c343ce-5c343dd 1821->1824 1836 5c34448-5c3444e 1822->1836 1837 5c3451c-5c34523 1822->1837 1830 5c34742-5c34780 1823->1830 1831 5c347ad-5c34802 1823->1831 1824->1819 1824->1822 1832 5c3480c 1831->1832 1906 5c34806 call 5c3480f 1831->1906 1836->1823 1838 5c34454-5c3446c 1836->1838 1839 5c34525-5c34527 1837->1839 1840 5c3452c-5c34545 1837->1840 1845 5c344c7-5c344d8 1838->1845 1846 5c3446e-5c3447a 1838->1846 1839->1815 1843 5c34547-5c34553 1840->1843 1844 5c3455a-5c34596 1840->1844 1843->1844 1868 5c346f7-5c346fb 1844->1868 1869 5c3459c 1844->1869 1850 5c344da-5c344de 1845->1850 1851 5c3450f-5c34516 1845->1851 1852 5c34483-5c34487 1846->1852 1853 5c3447c-5c3447e 1846->1853 1854 5c344e0-5c344ef 1850->1854 1855 5c344f8-5c3450c call 5c32bc0 1850->1855 1851->1836 1851->1837 1856 5c34489-5c34495 1852->1856 1857 5c344ae-5c344c5 call 5c32bc0 1852->1857 1853->1815 1854->1855 1866 5c344f1-5c344f3 1854->1866 1855->1851 1856->1857 1867 5c34497-5c344a5 1856->1867 1857->1851 1866->1815 1867->1857 1876 5c344a7-5c344a9 1867->1876 1870 5c34701 1868->1870 1871 5c346fd-5c346ff 1868->1871 1873 5c3459f-5c345bd 1869->1873 1870->1815 1871->1815 1878 5c345c3-5c345cc 1873->1878 1879 5c346e5-5c346f1 1873->1879 1876->1815 1880 5c345e5-5c345f1 1878->1880 1881 5c345ce 1878->1881 1879->1868 1879->1873 1882 5c34691-5c3469c 1880->1882 1883 5c345f7-5c345fd 1880->1883 1884 5c345d1-5c345e3 1881->1884 1887 5c346d1-5c346d3 1882->1887 1888 5c3469e 1882->1888 1885 5c34603-5c3460c 1883->1885 1886 5c3467f-5c3468b 1883->1886 1884->1880 1884->1884 1885->1823 1889 5c34612-5c34623 1885->1889 1886->1882 1886->1883 1887->1879 1891 5c346d5-5c346e2 1887->1891 1890 5c346a1-5c346aa 1888->1890 1889->1823 1896 5c34629-5c34642 1889->1896 1892 5c346b3-5c346bb 1890->1892 1893 5c346ac-5c346b1 1890->1893 1891->1879 1892->1823 1895 5c346bd-5c346cf 1892->1895 1893->1887 1895->1887 1895->1890 1900 5c34644-5c34664 1896->1900 1901 5c34679-5c3467d 1896->1901 1900->1901 1904 5c34666-5c3466f 1900->1904 1901->1885 1901->1886 1904->1823 1905 5c34675 1904->1905 1905->1901 1906->1832
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$,bq
                • API String ID: 0-1616511919
                • Opcode ID: 66d4b2c77c314d57d0bcba3f24d9ea95426a0f2187b88d1573cf16d0570bbfde
                • Instruction ID: 0d0186135696f82a8991c961d6b8d9a665f2a9e18c736cf0672c08587a6c0ada
                • Opcode Fuzzy Hash: 66d4b2c77c314d57d0bcba3f24d9ea95426a0f2187b88d1573cf16d0570bbfde
                • Instruction Fuzzy Hash: B3E13D75A042088FCB19DF69C5C9AADBBF2FF89311F2588A9E4059B362D734DD81CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2352 2b26bbf-2b26be2 2353 2b26be4 2352->2353 2354 2b26be9-2b26bf0 2352->2354 2353->2354 2355 2b26bfb-2b26e6e 2354->2355
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: 9dc8b421bd9418885499e2a756f813fa410b8d6bb3a097b742ca122c3f3b4827
                • Instruction ID: 1984e86616964897e21bbe6b05c1b550604c09215a0c5af6ec9e7abe17609cc3
                • Opcode Fuzzy Hash: 9dc8b421bd9418885499e2a756f813fa410b8d6bb3a097b742ca122c3f3b4827
                • Instruction Fuzzy Hash: 66712CB0D102498BDB08EF6AE99179ABBF3FFC9304F14C529E404EB265DB3859069F40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2385 2b26bc8-2b26be2 2386 2b26be4 2385->2386 2387 2b26be9-2b26bf0 2385->2387 2386->2387 2388 2b26bfb-2b26e6e 2387->2388
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: 58d5f9cd33137b2e62ae9c66379eff2baa99bda0a54d59a0ecb85ae1051391c3
                • Instruction ID: e645125fd8a4476875f8a101bba6e06fc52ee9678b50dece577d4d22ec5bfd41
                • Opcode Fuzzy Hash: 58d5f9cd33137b2e62ae9c66379eff2baa99bda0a54d59a0ecb85ae1051391c3
                • Instruction Fuzzy Hash: 75711BB0D102498BDB08EF6AE98579ABBF7FFC9304F14C529E405EB264DB3859459F40
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 2c6bbcfb7eab26da6440d6236201f740ee4cd89780a759bdc565119d4998d6df
                • Instruction ID: 70a4426b724f904e6739b2528e687e081abb7db3eb3c5ad85b4c394848a6d9ac
                • Opcode Fuzzy Hash: 2c6bbcfb7eab26da6440d6236201f740ee4cd89780a759bdc565119d4998d6df
                • Instruction Fuzzy Hash: 07F10474E05218CFEB64CF69D984BEAB7F2BB49305F1091AAD45DA7254EBB05E80CF01
                APIs
                • NtResumeThread.NTDLL(?,?), ref: 05D9FC5E
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 109321661f635b22d597df7cfbca1ebd1ff00b7f2975b95b911c3899bfaed5c2
                • Instruction ID: a0a4af7ec998ce6e38a60528152510fe7add1583b655fca8cec7af10b7759af6
                • Opcode Fuzzy Hash: 109321661f635b22d597df7cfbca1ebd1ff00b7f2975b95b911c3899bfaed5c2
                • Instruction Fuzzy Hash: 4B31C8B4D012199FCF10CFA9D984A9EFBF1BB49310F20942AE819B7300C734A945CF94
                APIs
                • NtResumeThread.NTDLL(?,?), ref: 05D9FC5E
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 995f142c20f46ca9a351975288ebf90e7a5159e0bc77379fb011fbcd42500bda
                • Instruction ID: 305420fe6eb20e0bd8db245591eb7ef536345b3c97293665978826231f1997f0
                • Opcode Fuzzy Hash: 995f142c20f46ca9a351975288ebf90e7a5159e0bc77379fb011fbcd42500bda
                • Instruction Fuzzy Hash: 4A31C8B9D012199FCF14CFA9D985AAEFBF1BB49310F20942AE819B7300C774A9458F94
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 325218c6528709f91188f5fdf93d4aa51862d573212cf499d1e66463a32b8ddf
                • Instruction ID: be6816abeb88d9c92fa6014f6b4872eceb26bce936fe3d4ea59bae77998c818f
                • Opcode Fuzzy Hash: 325218c6528709f91188f5fdf93d4aa51862d573212cf499d1e66463a32b8ddf
                • Instruction Fuzzy Hash: E8A11774D04208CFEB14CFA9D984BEEBBF2BB49305F10A46AD459AB255DBB45D85CF00
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: ef5f63fd2fe1d331f3f5dd9d50caef6d2c1b9fa384a232af93cff07cbe776262
                • Instruction ID: a8ce28a964d38357ec5d6f05469ddbae94c0b338d2b7ed971c4c217b18b262f9
                • Opcode Fuzzy Hash: ef5f63fd2fe1d331f3f5dd9d50caef6d2c1b9fa384a232af93cff07cbe776262
                • Instruction Fuzzy Hash: FCB1F474E09228CFDB24CFA9D945BADBBF2FB89300F1091AAD419A7255DB745A85CF00
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: Te^q
                • API String ID: 0-671973202
                • Opcode ID: 88197cad746594d9052730f3f8748905514ec974629cc04fd059cf501e49ed4a
                • Instruction ID: 80222bb5c459c5ad5eafd37e76538118c4a02fd8201f5786fb5757b1a0d5a907
                • Opcode Fuzzy Hash: 88197cad746594d9052730f3f8748905514ec974629cc04fd059cf501e49ed4a
                • Instruction Fuzzy Hash: 34B1F474E05228CFDB24CFA9D985BADBBF2FB89300F1481AAD419E7255DB745A85CF00
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8b5a44e7d6d23b73da11c251427c8320fb024a939a6f3b42dc8f8d1afb40504d
                • Instruction ID: f6fc39f75045959433482e0cbd07d58477fa2a2b98ba3038a8429f50f9f81f6b
                • Opcode Fuzzy Hash: 8b5a44e7d6d23b73da11c251427c8320fb024a939a6f3b42dc8f8d1afb40504d
                • Instruction Fuzzy Hash: B7B14C74E05258CFCB14DFA4E494BADBBF1FB4A300F1481AAD809AB255DB389E85DF11
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 036e584bf44c17e4a21fd72c21504d59ee8af16269216d7106288d3b843e62ec
                • Instruction ID: 79b6f59aa17a71820f966ba5a6aef39e4114fb03b3751d1c8d2e751ca5ddccc7
                • Opcode Fuzzy Hash: 036e584bf44c17e4a21fd72c21504d59ee8af16269216d7106288d3b843e62ec
                • Instruction Fuzzy Hash: 9EB10574E05218CFDB54EF69E994BADBBF2FB4A300F1091AAD809AB254DB745D81CF40
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 565a3d1c50a983a5e342aa50fd9a8ea3ba7ac38932d6aad55e4beb6601fd3f71
                • Instruction ID: af3721e8b8e6ab9eb8da9053329dd8ee5b3d406dccf2e5eeda93cf328c8693f9
                • Opcode Fuzzy Hash: 565a3d1c50a983a5e342aa50fd9a8ea3ba7ac38932d6aad55e4beb6601fd3f71
                • Instruction Fuzzy Hash: BFB10574E05258CFDB14EF69E994BADBBF2FB4A300F1091AAD809AB254DB745D81CF40
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a13fb5d15c1e54c720c2407c56fe3b43c9976bf42d6aa823e1ea93328d6e5a34
                • Instruction ID: 856f58708f346d44b86100802b8741d84caa3b91d235f9218d6833b4b8f2fb0b
                • Opcode Fuzzy Hash: a13fb5d15c1e54c720c2407c56fe3b43c9976bf42d6aa823e1ea93328d6e5a34
                • Instruction Fuzzy Hash: 32811570D0A228CFEB24CF69D946FADBBF2FB49300F1091AAD409A7251DB755A85CF11
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bb42ef7d7411e39e919d66c8c82b7104a1f8b5ee262bb7e9a98efffb00b8bafe
                • Instruction ID: c9f6ca6c1076c54129fca585abfd3047c0d0a86c18a9d02bed5153e62c406f41
                • Opcode Fuzzy Hash: bb42ef7d7411e39e919d66c8c82b7104a1f8b5ee262bb7e9a98efffb00b8bafe
                • Instruction Fuzzy Hash: F341E870D052288BEB58CF6AC945BEDBBF7BF89300F14C1AAD40DA6255DB745A85CF01

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 645 5c39e28-5c39e74 649 5c39ff2-5c3a05e 645->649 650 5c39e7a-5c39e8c 645->650 662 5c3a064-5c3a06d 649->662 663 5c3a2ad-5c3a2b4 649->663 653 5c39e8e-5c39eda 650->653 654 5c39edc-5c39f25 650->654 682 5c39f28-5c39f3c 653->682 654->682 666 5c3a0e3-5c3a0fc 662->666 667 5c3a06f-5c3a073 662->667 680 5c3a102 666->680 681 5c3a229-5c3a239 666->681 668 5c3a075-5c3a08a 667->668 669 5c3a08c-5c3a098 667->669 673 5c3a0a1-5c3a0de 668->673 669->673 673->663 683 5c3a151-5c3a194 680->683 684 5c3a1e1-5c3a224 680->684 685 5c3a109-5c3a14c 680->685 686 5c3a199-5c3a1dc 680->686 691 5c3a252-5c3a25e 681->691 692 5c3a23b-5c3a250 681->692 690 5c39f47-5c39f68 682->690 683->663 684->663 685->663 686->663 700 5c39f72-5c39f7c 690->700 701 5c39f6a-5c39f70 690->701 695 5c3a267-5c3a2a8 691->695 692->695 695->663 702 5c39f7f-5c39fc2 700->702 701->702 709 5c39fc4-5c39fe0 702->709 710 5c39fe8-5c39fef 702->710 709->710
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$4'^q$4'^q$4'^q$4'^q$pbq
                • API String ID: 0-723292480
                • Opcode ID: 60f8762b3136169528d8852edfcd25eb258b0071dcb9eed4d651736dd1d66701
                • Instruction ID: 42c7f84c0a66223b107bac45b8bbd5ea43f9ee4398527dd7d8c307c3746dfd07
                • Opcode Fuzzy Hash: 60f8762b3136169528d8852edfcd25eb258b0071dcb9eed4d651736dd1d66701
                • Instruction Fuzzy Hash: 6ED17076A00119DFCB05DFA4C844E99BBB2FF88310F0684A8E509AB272DB32ED55DF40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 884 5c38f68-5c38f90 886 5c38f92-5c38fd9 884->886 887 5c38fde-5c38fec 884->887 937 5c39435-5c3943c 886->937 888 5c38ffb 887->888 889 5c38fee-5c38ff9 call 5c36a88 887->889 892 5c38ffd-5c39004 888->892 889->892 893 5c3900a-5c3900e 892->893 894 5c390ed-5c390f1 892->894 896 5c39014-5c39018 893->896 897 5c3943d-5c39465 893->897 899 5c390f3-5c39102 call 5c34c88 894->899 900 5c39147-5c39151 894->900 901 5c3902a-5c39088 call 5c367c8 call 5c37230 896->901 902 5c3901a-5c39024 896->902 906 5c3946c-5c39496 897->906 914 5c39106-5c3910b 899->914 903 5c39153-5c39162 call 5c34368 900->903 904 5c3918a-5c391b0 900->904 946 5c394fb-5c39516 901->946 947 5c3908e-5c390e8 901->947 902->901 902->906 918 5c39168-5c39185 903->918 919 5c3949e-5c394b4 903->919 925 5c391b2-5c391bb 904->925 926 5c391bd 904->926 906->919 921 5c39104 914->921 922 5c3910d-5c39142 call 5c38a30 914->922 918->937 944 5c394bc-5c394f4 919->944 921->914 922->937 935 5c391bf-5c391e7 925->935 926->935 950 5c392b8-5c392bc 935->950 951 5c391ed-5c39206 935->951 944->946 962 5c39518-5c3951c 946->962 963 5c3951d-5c39525 946->963 947->937 954 5c39336-5c39340 950->954 955 5c392be-5c392d7 950->955 951->950 980 5c3920c-5c3921b call 5c33d90 951->980 959 5c39342-5c3934c 954->959 960 5c3939d-5c393a6 954->960 955->954 983 5c392d9-5c392e8 call 5c33d90 955->983 978 5c39352-5c39364 959->978 979 5c3934e-5c39350 959->979 965 5c393a8-5c393d6 call 5c35fc0 call 5c35fe0 960->965 966 5c393de-5c3942b 960->966 962->963 969 5c39527-5c3952d 963->969 970 5c3952f-5c39535 963->970 965->966 992 5c39433 966->992 969->970 975 5c39536-5c39573 969->975 984 5c39366-5c39368 978->984 979->984 994 5c39233-5c39248 980->994 995 5c3921d-5c39223 980->995 1009 5c39300-5c3930b 983->1009 1010 5c392ea-5c392f0 983->1010 989 5c39396-5c3939b 984->989 990 5c3936a-5c3936e 984->990 989->959 989->960 998 5c39370-5c39389 990->998 999 5c3938c-5c39391 call 5c32b90 990->999 992->937 1005 5c3924a-5c39276 call 5c35110 994->1005 1006 5c3927c-5c39285 994->1006 1001 5c39227-5c39229 995->1001 1002 5c39225 995->1002 998->999 999->989 1001->994 1002->994 1005->944 1005->1006 1006->946 1014 5c3928b-5c392b2 1006->1014 1009->946 1011 5c39311-5c39334 1009->1011 1015 5c392f2 1010->1015 1016 5c392f4-5c392f6 1010->1016 1011->954 1011->983 1014->950 1014->980 1015->1009 1016->1009
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: Hbq$Hbq$Hbq
                • API String ID: 0-2297679979
                • Opcode ID: e861c67b94d2574693fe43efabdf9ad0405738c81008394992b4a191540f1425
                • Instruction ID: ddcddf9c360d849aee0000f538a92ebe0eaf6165c2e488bebbdb810efe2ffcc3
                • Opcode Fuzzy Hash: e861c67b94d2574693fe43efabdf9ad0405738c81008394992b4a191540f1425
                • Instruction Fuzzy Hash: 00127170B006099FCB24DFA9C895A6EBBF2FF88300F148929E4469B351DB75ED46CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1029 5c3a820-5c3a84b 1143 5c3a84d call 5c3ad40 1029->1143 1144 5c3a84d call 5c3ad29 1029->1144 1030 5c3a853-5c3a85d 1031 5c3a87f-5c3a895 call 5c3a628 1030->1031 1032 5c3a85f-5c3a862 1030->1032 1038 5c3ac0b-5c3ac1f 1031->1038 1039 5c3a89b-5c3a8a7 1031->1039 1145 5c3a864 call 5c3b190 1032->1145 1146 5c3a864 call 5c3b129 1032->1146 1147 5c3a864 call 5c3b138 1032->1147 1034 5c3a86a-5c3a86c 1034->1031 1036 5c3a86e-5c3a876 1034->1036 1036->1031 1048 5c3ac5f-5c3ac68 1038->1048 1040 5c3a9d8-5c3a9df 1039->1040 1041 5c3a8ad-5c3a8b0 1039->1041 1044 5c3a9e5-5c3a9ee 1040->1044 1045 5c3ab0e-5c3ab48 call 5c3a030 1040->1045 1042 5c3a8b3-5c3a8bc 1041->1042 1046 5c3a8c2-5c3a8d6 1042->1046 1047 5c3ad00 1042->1047 1044->1045 1049 5c3a9f4-5c3ab00 call 5c3a030 call 5c3a5c0 call 5c3a030 1044->1049 1150 5c3ab4b call 5c3d3d0 1045->1150 1151 5c3ab4b call 5c3d3ca 1045->1151 1064 5c3a9c8-5c3a9d2 1046->1064 1065 5c3a8dc-5c3a971 call 5c3a628 * 2 call 5c3a030 call 5c3a5c0 call 5c3a668 call 5c3a710 call 5c3a778 1046->1065 1053 5c3ad05-5c3ad09 1047->1053 1051 5c3ac6a-5c3ac71 1048->1051 1052 5c3ac2d-5c3ac36 1048->1052 1140 5c3ab02 1049->1140 1141 5c3ab0b-5c3ab0c 1049->1141 1057 5c3ac73-5c3acb6 call 5c3a030 1051->1057 1058 5c3acbf-5c3acc6 1051->1058 1052->1047 1055 5c3ac3c-5c3ac4e 1052->1055 1060 5c3ad14 1053->1060 1061 5c3ad0b 1053->1061 1074 5c3ac50-5c3ac55 1055->1074 1075 5c3ac5e 1055->1075 1057->1058 1062 5c3aceb-5c3acfe 1058->1062 1063 5c3acc8-5c3acd8 1058->1063 1072 5c3ad15 1060->1072 1061->1060 1062->1053 1063->1062 1078 5c3acda-5c3ace2 1063->1078 1064->1040 1064->1042 1121 5c3a973-5c3a98b call 5c3a710 call 5c3a030 call 5c3a2e0 1065->1121 1122 5c3a990-5c3a9c3 call 5c3a778 1065->1122 1072->1072 1148 5c3ac58 call 5c3db60 1074->1148 1149 5c3ac58 call 5c3db70 1074->1149 1075->1048 1078->1062 1088 5c3ab51-5c3ac02 call 5c3a030 1088->1038 1121->1122 1122->1064 1140->1141 1141->1045 1143->1030 1144->1030 1145->1034 1146->1034 1147->1034 1148->1075 1149->1075 1150->1088 1151->1088
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q$4'^q
                • API String ID: 0-1196845430
                • Opcode ID: 83de1c25d0595982c1d70036a714ea04330097d4e950af485f814ece3fb023e4
                • Instruction ID: 5cda69e18c9bebd7e81f62ed4133debdc66426218f7b2acd4daa844a6303ddf5
                • Opcode Fuzzy Hash: 83de1c25d0595982c1d70036a714ea04330097d4e950af485f814ece3fb023e4
                • Instruction Fuzzy Hash: 31F1A834A10118DFCB04DFA4D999AADBBB2FF88301F158559E446AB3A5DF71EC42CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1152 5c3f1f0-5c3f210 1153 5c3f216-5c3f21a 1152->1153 1154 5c3f329-5c3f34e 1152->1154 1155 5c3f220-5c3f229 1153->1155 1156 5c3f355-5c3f37a 1153->1156 1154->1156 1157 5c3f381-5c3f3b7 1155->1157 1158 5c3f22f-5c3f256 1155->1158 1156->1157 1176 5c3f3be-5c3f414 1157->1176 1169 5c3f31e-5c3f328 1158->1169 1170 5c3f25c-5c3f25e 1158->1170 1172 5c3f260-5c3f263 1170->1172 1173 5c3f27f-5c3f281 1170->1173 1175 5c3f269-5c3f273 1172->1175 1172->1176 1174 5c3f284-5c3f288 1173->1174 1177 5c3f28a-5c3f299 1174->1177 1178 5c3f2e9-5c3f2f5 1174->1178 1175->1176 1180 5c3f279-5c3f27d 1175->1180 1191 5c3f416-5c3f42a call 5c3f6d0 1176->1191 1192 5c3f438-5c3f44f 1176->1192 1177->1176 1186 5c3f29f-5c3f2e6 call 5c32bc0 1177->1186 1178->1176 1181 5c3f2fb-5c3f318 call 5c32bc0 1178->1181 1180->1173 1180->1174 1181->1169 1181->1170 1186->1178 1269 5c3f42d call 5c3f780 1191->1269 1270 5c3f42d call 5c3f790 1191->1270 1271 5c3f42d call 5c3f918 1191->1271 1272 5c3f42d call 5c3fa78 1191->1272 1200 5c3f540-5c3f550 1192->1200 1201 5c3f455-5c3f53b call 5c3a628 call 5c3a030 * 2 call 5c3a668 call 5c3e238 call 5c3a030 call 5c3d3d0 call 5c3aed0 1192->1201 1199 5c3f433 1203 5c3f663-5c3f66e 1199->1203 1212 5c3f556-5c3f630 call 5c3a628 * 2 call 5c3ade0 call 5c3a030 * 2 call 5c3a2e0 call 5c3a778 call 5c3a030 1200->1212 1213 5c3f63e-5c3f65a call 5c3a030 1200->1213 1201->1200 1209 5c3f670-5c3f680 1203->1209 1210 5c3f69d-5c3f6be call 5c3a778 1203->1210 1222 5c3f682-5c3f688 1209->1222 1223 5c3f690-5c3f698 call 5c3aed0 1209->1223 1265 5c3f632 1212->1265 1266 5c3f63b 1212->1266 1213->1203 1222->1223 1223->1210 1265->1266 1266->1213 1269->1199 1270->1199 1271->1199 1272->1199
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$(bq$Hbq
                • API String ID: 0-2835675688
                • Opcode ID: 02e20fe62857a25da46b9d08912a494fd75a1e81ee92df270a20f5662cafc928
                • Instruction ID: 97d26bb49c1768d6473a274180a8fa477d3d959452adaf62abdc26f7f31345eb
                • Opcode Fuzzy Hash: 02e20fe62857a25da46b9d08912a494fd75a1e81ee92df270a20f5662cafc928
                • Instruction Fuzzy Hash: ECE13F34B00109DFCB04EF64D9959ADBBB2FF89300F108969E846AB365DB34ED46DB91
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238196970.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_59e0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: 27948373e4ae5a9bc0540f04f4a290c3bf9577b1d1624e8c89b112a40f80f703
                • Instruction ID: f3e9d99eee674cea41b545d81735fb8f7990838a4443ad5b7b84ff6f047a58cb
                • Opcode Fuzzy Hash: 27948373e4ae5a9bc0540f04f4a290c3bf9577b1d1624e8c89b112a40f80f703
                • Instruction Fuzzy Hash: 12725BB4E08209DFCB16DBA9C849BEEBBB6FF49300F14846AE502AB391D7745841DF51

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1562 5c3545b-5c35461 1563 5c35463-5c3548e 1562->1563 1564 5c35404-5c3540f 1562->1564 1565 5c35490-5c3549d 1563->1565 1566 5c3549f-5c354a8 1563->1566 1567 5c35411-5c35431 1564->1567 1568 5c3544a-5c3544e 1564->1568 1565->1566 1569 5c354ab-5c354b8 1565->1569 1572 5c3543a-5c3543c 1567->1572 1570 5c354c3 1569->1570 1571 5c354ba-5c354c1 1569->1571 1573 5c354ca-5c354f4 1570->1573 1571->1573 1572->1568 1574 5c3543e-5c35445 call 5c32b90 1572->1574 1576 5c354f6 1573->1576 1577 5c354fd-5c35510 call 5c35148 1573->1577 1574->1568 1576->1577 1580 5c35516-5c35529 1577->1580 1581 5c35654-5c3565b 1577->1581 1587 5c35537-5c35551 1580->1587 1588 5c3552b-5c35532 1580->1588 1582 5c35661-5c35676 1581->1582 1583 5c358f5-5c358fc 1581->1583 1597 5c35696-5c3569c 1582->1597 1598 5c35678-5c3567a 1582->1598 1585 5c3596b-5c35972 1583->1585 1586 5c358fe-5c35907 1583->1586 1589 5c35978-5c35981 1585->1589 1590 5c35a0e-5c35a15 1585->1590 1586->1585 1592 5c35909-5c3591c 1586->1592 1609 5c35553-5c35556 1587->1609 1610 5c35558-5c35565 1587->1610 1593 5c3564d 1588->1593 1589->1590 1594 5c35987-5c3599a 1589->1594 1595 5c35a31-5c35a37 1590->1595 1596 5c35a17-5c35a28 1590->1596 1592->1585 1614 5c3591e-5c35963 call 5c325c0 1592->1614 1593->1581 1618 5c359ad-5c359b1 1594->1618 1619 5c3599c-5c359ab 1594->1619 1599 5c35a49-5c35a52 1595->1599 1600 5c35a39-5c35a3f 1595->1600 1596->1595 1620 5c35a2a 1596->1620 1601 5c356a2-5c356a4 1597->1601 1602 5c35764-5c35768 1597->1602 1598->1597 1604 5c3567c-5c35693 1598->1604 1606 5c35a41-5c35a47 1600->1606 1607 5c35a55-5c35aca 1600->1607 1601->1602 1608 5c356aa-5c3572b call 5c325c0 * 4 1601->1608 1602->1583 1611 5c3576e-5c35770 1602->1611 1604->1597 1606->1599 1606->1607 1689 5c35ad8 1607->1689 1690 5c35acc-5c35ad6 1607->1690 1680 5c35742-5c35761 call 5c325c0 1608->1680 1681 5c3572d-5c3573f call 5c325c0 1608->1681 1616 5c35567-5c3557b 1609->1616 1610->1616 1611->1583 1617 5c35776-5c3577f 1611->1617 1614->1585 1650 5c35965-5c35968 1614->1650 1616->1593 1649 5c35581-5c355d5 1616->1649 1627 5c358d2-5c358d8 1617->1627 1621 5c359b3-5c359b5 1618->1621 1622 5c359d1-5c359d3 1618->1622 1619->1618 1620->1595 1621->1622 1628 5c359b7-5c359ce 1621->1628 1622->1590 1629 5c359d5-5c359db 1622->1629 1630 5c358eb 1627->1630 1631 5c358da-5c358e9 1627->1631 1628->1622 1629->1590 1635 5c359dd-5c35a0b 1629->1635 1638 5c358ed-5c358ef 1630->1638 1631->1638 1635->1590 1638->1583 1642 5c35784-5c35792 call 5c33d90 1638->1642 1657 5c35794-5c3579a 1642->1657 1658 5c357aa-5c357c4 1642->1658 1692 5c355e3-5c355e7 1649->1692 1693 5c355d7-5c355d9 1649->1693 1650->1585 1660 5c3579e-5c357a0 1657->1660 1661 5c3579c 1657->1661 1658->1627 1666 5c357ca-5c357ce 1658->1666 1660->1658 1661->1658 1669 5c357d0-5c357d9 1666->1669 1670 5c357ef 1666->1670 1673 5c357e0-5c357e3 1669->1673 1674 5c357db-5c357de 1669->1674 1675 5c357f2-5c3580c 1670->1675 1679 5c357ed 1673->1679 1674->1679 1675->1627 1694 5c35812-5c35893 call 5c325c0 * 4 1675->1694 1679->1675 1680->1602 1681->1680 1695 5c35add-5c35adf 1689->1695 1690->1695 1692->1593 1696 5c355e9-5c35601 1692->1696 1693->1692 1722 5c35895-5c358a7 call 5c325c0 1694->1722 1723 5c358aa-5c358d0 call 5c325c0 1694->1723 1697 5c35ae1-5c35ae4 1695->1697 1698 5c35ae6-5c35aeb 1695->1698 1696->1593 1702 5c35603-5c3560f 1696->1702 1700 5c35af1-5c35b1e 1697->1700 1698->1700 1703 5c35611-5c35614 1702->1703 1704 5c3561e-5c35624 1702->1704 1703->1704 1707 5c35626-5c35629 1704->1707 1708 5c3562c-5c35635 1704->1708 1707->1708 1710 5c35637-5c3563a 1708->1710 1711 5c35644-5c3564a 1708->1711 1710->1711 1711->1593 1722->1723 1723->1583 1723->1627
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: $^q$$^q
                • API String ID: 0-355816377
                • Opcode ID: 55f702345307a4e93300c653497b90f908ca2cbf59701f3343c5ffa668347357
                • Instruction ID: 5c6457f1e5bad57292c5d5054e6820f7ee2f050355cb1058d140742b0f5980ec
                • Opcode Fuzzy Hash: 55f702345307a4e93300c653497b90f908ca2cbf59701f3343c5ffa668347357
                • Instruction Fuzzy Hash: B3323735A102198FCF15DFA5D899ABDBBB2FF48700F148815E812AB394DB349E46DF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1907 59e18c0-59e18e8 1908 59e18ef-59e1918 1907->1908 1909 59e18ea 1907->1909 1910 59e191a-59e1923 1908->1910 1911 59e1939 1908->1911 1909->1908 1913 59e192a-59e192d 1910->1913 1914 59e1925-59e1928 1910->1914 1912 59e193c-59e1940 1911->1912 1916 59e1cf7-59e1d0e 1912->1916 1915 59e1937 1913->1915 1914->1915 1915->1912 1918 59e1d14-59e1d18 1916->1918 1919 59e1945-59e1949 1916->1919 1920 59e1d4d-59e1d51 1918->1920 1921 59e1d1a-59e1d4a 1918->1921 1922 59e194e-59e1952 1919->1922 1923 59e194b-59e19a8 1919->1923 1927 59e1d72 1920->1927 1928 59e1d53-59e1d5c 1920->1928 1921->1920 1925 59e197b-59e199f 1922->1925 1926 59e1954-59e1978 1922->1926 1931 59e19ad-59e19b1 1923->1931 1932 59e19aa-59e1a1b 1923->1932 1925->1916 1926->1925 1929 59e1d75-59e1d7b 1927->1929 1933 59e1d5e-59e1d61 1928->1933 1934 59e1d63-59e1d66 1928->1934 1938 59e19da-59e19eb 1931->1938 1939 59e19b3-59e19d7 1931->1939 1942 59e1a1d-59e1a7a 1932->1942 1943 59e1a20-59e1a24 1932->1943 1935 59e1d70 1933->1935 1934->1935 1935->1929 2032 59e19ee call 5d93d89 1938->2032 2033 59e19ee call 5d93d98 1938->2033 1939->1938 1951 59e1a7f-59e1a83 1942->1951 1952 59e1a7c-59e1ad8 1942->1952 1948 59e1a4d-59e1a71 1943->1948 1949 59e1a26-59e1a4a 1943->1949 1948->1916 1949->1948 1958 59e1aac-59e1acf 1951->1958 1959 59e1a85-59e1aa9 1951->1959 1964 59e1add-59e1ae1 1952->1964 1965 59e1ada-59e1b3c 1952->1965 1955 59e19f4-59e1a01 1962 59e1a03-59e1a09 1955->1962 1963 59e1a11-59e1a12 1955->1963 1958->1916 1959->1958 1962->1963 1963->1916 1971 59e1b0a-59e1b22 1964->1971 1972 59e1ae3-59e1b07 1964->1972 1974 59e1b3e-59e1ba0 1965->1974 1975 59e1b41-59e1b45 1965->1975 1984 59e1b24-59e1b2a 1971->1984 1985 59e1b32-59e1b33 1971->1985 1972->1971 1986 59e1ba5-59e1ba9 1974->1986 1987 59e1ba2-59e1c04 1974->1987 1981 59e1b6e-59e1b86 1975->1981 1982 59e1b47-59e1b6b 1975->1982 1995 59e1b88-59e1b8e 1981->1995 1996 59e1b96-59e1b97 1981->1996 1982->1981 1984->1985 1985->1916 1991 59e1bab-59e1bcf 1986->1991 1992 59e1bd2-59e1bea 1986->1992 1997 59e1c09-59e1c0d 1987->1997 1998 59e1c06-59e1c68 1987->1998 1991->1992 2006 59e1bec-59e1bf2 1992->2006 2007 59e1bfa-59e1bfb 1992->2007 1995->1996 1996->1916 2002 59e1c0f-59e1c33 1997->2002 2003 59e1c36-59e1c4e 1997->2003 2008 59e1c6d-59e1c71 1998->2008 2009 59e1c6a-59e1cc3 1998->2009 2002->2003 2017 59e1c5e-59e1c5f 2003->2017 2018 59e1c50-59e1c56 2003->2018 2006->2007 2007->1916 2013 59e1c9a-59e1cbd 2008->2013 2014 59e1c73-59e1c97 2008->2014 2019 59e1cec-59e1cef 2009->2019 2020 59e1cc5-59e1ce9 2009->2020 2013->1916 2014->2013 2017->1916 2018->2017 2019->1916 2020->2019 2032->1955 2033->1955
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238196970.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_59e0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: e4b04d4484156278e6f953aa32de8ee09ea5420cf3954058e51d37f688827998
                • Instruction ID: 20a29d7458c0659f6ba96cef6a5d12a46d8c149505f8257e74405c34cc096b90
                • Opcode Fuzzy Hash: e4b04d4484156278e6f953aa32de8ee09ea5420cf3954058e51d37f688827998
                • Instruction Fuzzy Hash: 02F1C474E05208DFCB19DFA8E8996ECBBB6FF8A315F208529E406A7350DB755981DF00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2034 5c38618-5c3862a 2035 5c38654-5c38658 2034->2035 2036 5c3862c-5c3864d 2034->2036 2037 5c38664-5c38673 2035->2037 2038 5c3865a-5c3865c 2035->2038 2036->2035 2039 5c38675 2037->2039 2040 5c3867f-5c386ab 2037->2040 2038->2037 2039->2040 2044 5c386b1-5c386b7 2040->2044 2045 5c388d8-5c388ee 2040->2045 2047 5c38789-5c3878d 2044->2047 2048 5c386bd-5c386c3 2044->2048 2058 5c388f0-5c388f4 2045->2058 2059 5c388f5-5c3891f 2045->2059 2049 5c387b0-5c387b9 2047->2049 2050 5c3878f-5c38798 2047->2050 2048->2045 2051 5c386c9-5c386d6 2048->2051 2054 5c387bb-5c387db 2049->2054 2055 5c387de-5c387e1 2049->2055 2050->2045 2053 5c3879e-5c387ae 2050->2053 2056 5c38768-5c38771 2051->2056 2057 5c386dc-5c386e5 2051->2057 2061 5c387e4-5c387ea 2053->2061 2054->2055 2055->2061 2056->2045 2062 5c38777-5c38783 2056->2062 2057->2045 2060 5c386eb-5c38703 2057->2060 2058->2059 2078 5c38921 2059->2078 2079 5c38935-5c38941 2059->2079 2063 5c38705 2060->2063 2064 5c3870f-5c38721 2060->2064 2061->2045 2066 5c387f0-5c38803 2061->2066 2062->2047 2062->2048 2063->2064 2064->2056 2073 5c38723-5c38729 2064->2073 2066->2045 2068 5c38809-5c38819 2066->2068 2068->2045 2072 5c3881f-5c3882c 2068->2072 2072->2045 2074 5c38832-5c38847 2072->2074 2076 5c38735-5c3873b 2073->2076 2077 5c3872b 2073->2077 2074->2045 2083 5c3884d-5c38870 2074->2083 2076->2045 2081 5c38741-5c38765 2076->2081 2077->2076 2082 5c38924-5c38926 2078->2082 2084 5c38943 2079->2084 2085 5c3894d-5c38969 2079->2085 2086 5c3896a-5c38997 call 5c33d90 2082->2086 2087 5c38928-5c38933 2082->2087 2083->2045 2092 5c38872-5c3887d 2083->2092 2084->2085 2098 5c38999-5c3899f 2086->2098 2099 5c389af-5c389b1 2086->2099 2087->2079 2087->2082 2095 5c3887f-5c38889 2092->2095 2096 5c388ce-5c388d5 2092->2096 2095->2096 2101 5c3888b-5c388a1 2095->2101 2102 5c389a3-5c389a5 2098->2102 2103 5c389a1 2098->2103 2122 5c389b3 call 5c38a20 2099->2122 2123 5c389b3 call 5c38a30 2099->2123 2124 5c389b3 call 5c39bcf 2099->2124 2108 5c388a3 2101->2108 2109 5c388ad-5c388c6 2101->2109 2102->2099 2103->2099 2104 5c389b9-5c389bd 2106 5c38a08-5c38a18 2104->2106 2107 5c389bf-5c389d6 2104->2107 2107->2106 2114 5c389d8-5c389e2 2107->2114 2108->2109 2109->2096 2117 5c389f5-5c38a05 2114->2117 2118 5c389e4-5c389f3 2114->2118 2118->2117 2122->2104 2123->2104 2124->2104
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$d
                • API String ID: 0-3334038649
                • Opcode ID: 6d6fd343a48ae4569836c4de86d3b878cf289d09d812a94ae107eed8fe5abe45
                • Instruction ID: 0a698b65baa37fdcb631f63c95bc0573707fad491d2b66c8c431d32801eba492
                • Opcode Fuzzy Hash: 6d6fd343a48ae4569836c4de86d3b878cf289d09d812a94ae107eed8fe5abe45
                • Instruction Fuzzy Hash: 84D16A3460160ACFCB14DF19C485D6ABBF2FF89310B25C969E45A9B361DB30F946CB81

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2194 59e2858-59e287d 2195 59e287f 2194->2195 2196 59e2884-59e28a3 2194->2196 2195->2196 2197 59e28c4 2196->2197 2198 59e28a5-59e28ae 2196->2198 2199 59e28c7-59e28cb 2197->2199 2200 59e28b5-59e28b8 2198->2200 2201 59e28b0-59e28b3 2198->2201 2202 59e2a86-59e2a9d 2199->2202 2203 59e28c2 2200->2203 2201->2203 2205 59e2aa3-59e2aa7 2202->2205 2206 59e28d0-59e28d4 2202->2206 2203->2199 2207 59e2aa9-59e2acd 2205->2207 2208 59e2ad0-59e2ad4 2205->2208 2209 59e28d9-59e28dd 2206->2209 2210 59e28d6-59e2931 2206->2210 2207->2208 2214 59e2ad6-59e2adf 2208->2214 2215 59e2af5 2208->2215 2212 59e28df-59e2903 2209->2212 2213 59e2906-59e2928 2209->2213 2216 59e2936-59e293a 2210->2216 2217 59e2933-59e2994 2210->2217 2212->2213 2213->2202 2220 59e2ae6-59e2ae9 2214->2220 2221 59e2ae1-59e2ae4 2214->2221 2219 59e2af8-59e2afe 2215->2219 2223 59e293c-59e2960 2216->2223 2224 59e2963-59e297a 2216->2224 2228 59e2999-59e299d 2217->2228 2229 59e2996-59e29f7 2217->2229 2226 59e2af3 2220->2226 2221->2226 2223->2224 2241 59e297c-59e2982 2224->2241 2242 59e298a-59e298b 2224->2242 2226->2219 2233 59e299f-59e29c3 2228->2233 2234 59e29c6-59e29dd 2228->2234 2238 59e29fc-59e2a00 2229->2238 2239 59e29f9-59e2a52 2229->2239 2233->2234 2252 59e29df-59e29e5 2234->2252 2253 59e29ed-59e29ee 2234->2253 2244 59e2a29-59e2a4c 2238->2244 2245 59e2a02-59e2a26 2238->2245 2250 59e2a7b-59e2a7e 2239->2250 2251 59e2a54-59e2a78 2239->2251 2241->2242 2242->2202 2244->2202 2245->2244 2250->2202 2251->2250 2252->2253 2253->2202
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238196970.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_59e0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$4'^q
                • API String ID: 0-2697143702
                • Opcode ID: 7c2601847608d330eaeeb6c4242b3ee1660fe089690c24c3a91fd29959828ae1
                • Instruction ID: 16415174283ae3d5d73def6f896e3b725ec633235cfcecd5b3338a524261b587
                • Opcode Fuzzy Hash: 7c2601847608d330eaeeb6c4242b3ee1660fe089690c24c3a91fd29959828ae1
                • Instruction Fuzzy Hash: 4691BE78E05208DBCF19DFA9D4886EDBBBAFF89311F50942AD416B7290CB755881CF20

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 2265 5c37048-5c37080 2267 5c37086-5c3708a 2265->2267 2268 5c3716c-5c37191 2265->2268 2269 5c3709e-5c370a2 2267->2269 2270 5c3708c-5c37098 2267->2270 2275 5c37198-5c371bc 2268->2275 2271 5c371c3-5c371e8 2269->2271 2272 5c370a8-5c370bf 2269->2272 2270->2269 2270->2275 2290 5c371ef-5c37242 2271->2290 2283 5c370d3-5c370d7 2272->2283 2284 5c370c1-5c370cd 2272->2284 2275->2271 2285 5c37103-5c3711c call 5c33cc8 2283->2285 2286 5c370d9-5c370f2 2283->2286 2284->2283 2284->2290 2298 5c37145-5c37169 2285->2298 2299 5c3711e-5c37142 2285->2299 2286->2285 2300 5c370f4-5c370f7 2286->2300 2308 5c37244-5c37264 2290->2308 2309 5c3727a-5c3729f 2290->2309 2304 5c37100 2300->2304 2304->2285 2316 5c372a6-5c372fa 2308->2316 2317 5c37266-5c37277 2308->2317 2309->2316 2323 5c373a1-5c373d8 2316->2323 2324 5c37300-5c3730c 2316->2324 2337 5c37361-5c3736d 2323->2337 2338 5c373da-5c373ef 2323->2338 2327 5c37316-5c3732a call 5c324d0 2324->2327 2328 5c3730e-5c37315 2324->2328 2333 5c37399-5c373a0 2327->2333 2334 5c3732c-5c37351 2327->2334 2347 5c37394-5c37397 2334->2347 2349 5c37353-5c3735d 2334->2349 2337->2347 2348 5c3736f-5c37378 2337->2348 2340 5c373f1-5c37415 2338->2340 2341 5c3741f-5c37425 2338->2341 2340->2341 2343 5c37417 2340->2343 2344 5c37437-5c37446 2341->2344 2345 5c37427-5c37434 2341->2345 2343->2341 2347->2333 2347->2334 2350 5c37387-5c37393 2348->2350 2351 5c3737a-5c3737d 2348->2351 2349->2337 2351->2350
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$(bq
                • API String ID: 0-4224401849
                • Opcode ID: faa7258632226590f40fa591b9ed0518b5a808262ee211d3b032206a398894cb
                • Instruction ID: af40bf4b119615a28ce515f30da17fdcb5933c26a7e33b200405f958ed16e39c
                • Opcode Fuzzy Hash: faa7258632226590f40fa591b9ed0518b5a808262ee211d3b032206a398894cb
                • Instruction Fuzzy Hash: 9F51AF313002198FCB15DF68D855AAE3BA2FF84341F248969F9068B391CF79DE56CB90
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$Hbq
                • API String ID: 0-4081012451
                • Opcode ID: 37d0c59f24b5d8c024d9e6f87f2eae8b3d5cc875ccf5826609a2ccf9ea1902d7
                • Instruction ID: cbc338bcb9d7be832963b21c7c91324b7a63811211c6a5f19799031773b3a730
                • Opcode Fuzzy Hash: 37d0c59f24b5d8c024d9e6f87f2eae8b3d5cc875ccf5826609a2ccf9ea1902d7
                • Instruction Fuzzy Hash: A05168347006148FC759AF29C4A9A2E7BB2EFD5344724886DE4468B3A1DF35ED06CB91
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq$Hbq
                • API String ID: 0-4081012451
                • Opcode ID: 9d7e6b5903e4264b9c190c64149106b7840a571d372a1db1721afff4fc4d738f
                • Instruction ID: e8fc342632ddd54f77937d2c5d75b666324433a2a269d9eec6edc6c3a166c373
                • Opcode Fuzzy Hash: 9d7e6b5903e4264b9c190c64149106b7840a571d372a1db1721afff4fc4d738f
                • Instruction Fuzzy Hash: E551DE712047458FD324DF6AC49171ABBF2EF85310F188A29E48ACB6D2DB79E949CB50
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q$pbq
                • API String ID: 0-3872760177
                • Opcode ID: 57f0597eba1c9c347938ce4465ccdf3a2cac615715760ea46626f3fe52ebf20a
                • Instruction ID: e8b9d0738185ddd094d877232355b60747ca674ad02ce157287e483f0b8b27fa
                • Opcode Fuzzy Hash: 57f0597eba1c9c347938ce4465ccdf3a2cac615715760ea46626f3fe52ebf20a
                • Instruction Fuzzy Hash: 7D41B3B0A043069FC705DF78C8417AFBBB3FF89304F148869E4499B256DB75AD468BA1
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: %$3
                • API String ID: 0-2415910313
                • Opcode ID: ecc6308b20bc69c5952c8f103cdd33b1fd0a667da21d0c8941df2131b7bc0c57
                • Instruction ID: cfc8c3f392466b7e5fa06a7eb7be3838278e163f8f101f41c860a41ffe7de3d0
                • Opcode Fuzzy Hash: ecc6308b20bc69c5952c8f103cdd33b1fd0a667da21d0c8941df2131b7bc0c57
                • Instruction Fuzzy Hash: 7C01D278D8122BCBCB61DF64D844BACBBB1BB08308F0440E9E819A7250DB315E80DF45
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: ,bq
                • API String ID: 0-2474004448
                • Opcode ID: 3a0c7d25a6f2f9b493f105f73d8772e8caaa4a00aa5ca61165d3759c6411dac1
                • Instruction ID: df2f879c93f7bf3066011a53ee8335d0f3596c1643dc2240d56a659c05eb153c
                • Opcode Fuzzy Hash: 3a0c7d25a6f2f9b493f105f73d8772e8caaa4a00aa5ca61165d3759c6411dac1
                • Instruction Fuzzy Hash: F0521B75A002298FDB64DF69C991BEDBBF2BF88300F1584D9E509A7351DA309E81CF61
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (_^q
                • API String ID: 0-538443824
                • Opcode ID: b5502369387d28b8e7d28a00d67b983c0888af4145dab22d8650176a9334fa99
                • Instruction ID: bb010087e10698335e21c3e1419bb8c3ee551bf6e2528f6cee359953537bbca5
                • Opcode Fuzzy Hash: b5502369387d28b8e7d28a00d67b983c0888af4145dab22d8650176a9334fa99
                • Instruction Fuzzy Hash: 26228E71A10208AFDB04DFA9D495AADBBF2FF88314F148469E906DB391CB71ED85CB50
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05D9FA8B
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 00aa7d8cc53fab353f8d18270b06f41c0d10ebb29fe6a0a3bc1fecde4831f20f
                • Instruction ID: f3c3077455e3b9b15056212f22df73373470480c64cce2ae95485b9be46fdeca
                • Opcode Fuzzy Hash: 00aa7d8cc53fab353f8d18270b06f41c0d10ebb29fe6a0a3bc1fecde4831f20f
                • Instruction Fuzzy Hash: 4841B8B5D012599FCF00CFA9D984AEEFBF1BB49310F20902AE819B7210D374AA45CF64
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05D9FA8B
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: fabd21274edd45688d13bdc33b70812417f4cb72a1154c1f9057e23cfb2630a4
                • Instruction ID: 21f693ef4025db406dcac2bfa50928777ded2beac39fa36abca3f3c5822f223e
                • Opcode Fuzzy Hash: fabd21274edd45688d13bdc33b70812417f4cb72a1154c1f9057e23cfb2630a4
                • Instruction Fuzzy Hash: 7B41B9B5D012598FCF04CFA9D984AEEFBF1BB49310F24942AE819B7250D374AA45CF64
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05D9F902
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 0f4c00e8c1ba8e8e82cf73d17d38fc59c63922c5af2504bed19e0d382382e6f2
                • Instruction ID: 51a71a328a956522367fe1398728eaeff1661def7a04a4f12daec28e0e7da31c
                • Opcode Fuzzy Hash: 0f4c00e8c1ba8e8e82cf73d17d38fc59c63922c5af2504bed19e0d382382e6f2
                • Instruction Fuzzy Hash: 713197B8D00259AFCF10CFA9D980A9EFBB1BB49310F10942AE819B7210D735A941CF55
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05D9F902
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 868c1489ec31ec2a0d313d2b5c9b5f1d13045e6b9b269f798a1caa834442a084
                • Instruction ID: 1e20086bd6fe0d323fdaa8f9a20119fea6a1aa63735ae6765d321ab4b32e0d05
                • Opcode Fuzzy Hash: 868c1489ec31ec2a0d313d2b5c9b5f1d13045e6b9b269f798a1caa834442a084
                • Instruction Fuzzy Hash: 4231B8B9D00259DFCF10CFA9D980AAEFBB1BB49310F10A42AE815B7210D734A901CF54
                APIs
                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05C4D9DC
                Memory Dump Source
                • Source File: 00000006.00000002.2238732596.0000000005C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c40000_Networks!.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: dfa1ad570eea1557ffe0bb05ebd4a0e31d113de1cb3f78680695a16291eb36b5
                • Instruction ID: 7dbc83c82e8fe914de621de72d50adb4e4a77d3d6e68de08279f9706e5cb08e2
                • Opcode Fuzzy Hash: dfa1ad570eea1557ffe0bb05ebd4a0e31d113de1cb3f78680695a16291eb36b5
                • Instruction Fuzzy Hash: D831A7B8D002489FCF10DFA9D984ADEFBB1BB49310F20942AE819B7210D735A945CF94
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238196970.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_59e0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: 93c4f5db997a8a6b734e04595da890da0b3fef70bc4c370ac0a2849edf03c107
                • Instruction ID: d1f92302796bb02090c74e8592392cb069ca13fe17faade88ee434ebbf195455
                • Opcode Fuzzy Hash: 93c4f5db997a8a6b734e04595da890da0b3fef70bc4c370ac0a2849edf03c107
                • Instruction Fuzzy Hash: 53D1B4B09093889FD717DB78CC59B9A7FB9AF03304F1941D6E1809B2E3C6B85845CB62
                APIs
                Memory Dump Source
                • Source File: 00000006.00000002.2238914072.0000000005D90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05D90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5d90000_Networks!.jbxd
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 8db50b00a95fe559fcfdd876cb339f64fde56caababcfa9ce9a7d536a712fc4d
                • Instruction ID: dcc1ecd797a8250b23fc36a86da27067bc86103f99b5900c1de3b6820bb92d69
                • Opcode Fuzzy Hash: 8db50b00a95fe559fcfdd876cb339f64fde56caababcfa9ce9a7d536a712fc4d
                • Instruction Fuzzy Hash: BD31CAB5D052589FCF10CFA9E980AEEFBF5BB49310F14942AE815B7200C734A946CF94
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: ,bq
                • API String ID: 0-2474004448
                • Opcode ID: 131c69b637d76cc8e3c2e6f63bb7e67da56c0bf8ada3cead21e5ef83715eb34b
                • Instruction ID: 46d88df7f0a8da4880296d1a690c27a6a63d5e2da513b32a36c007874ca7e456
                • Opcode Fuzzy Hash: 131c69b637d76cc8e3c2e6f63bb7e67da56c0bf8ada3cead21e5ef83715eb34b
                • Instruction Fuzzy Hash: C2C150B5A001298FDB18DF68C995BEDBBF2FF88700F158099E509AB351DA709D81CF61
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: 15129f134b2cb4cc1e7e28418c6f26c9dba9eb701504bb2581548a2ebc9a99d6
                • Instruction ID: a5580ced99c4befda1fa39b3fef55804babaa8e4121927250a744788a43cbb70
                • Opcode Fuzzy Hash: 15129f134b2cb4cc1e7e28418c6f26c9dba9eb701504bb2581548a2ebc9a99d6
                • Instruction Fuzzy Hash: B3A1B1357002049FC7199F68D855F6A7BB3FF89710F1588A9E10A8B3A2DB35EC42DB81
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: Pl^q
                • API String ID: 0-2831078282
                • Opcode ID: 999e35cd9935aaed37d692b9eb08fc20f1f78f54f10267c2b8ea3066281877d0
                • Instruction ID: 2a335783161a1ba1f1a5f535cf3e97b512f8203fa246df3c6f26590e74c2f2db
                • Opcode Fuzzy Hash: 999e35cd9935aaed37d692b9eb08fc20f1f78f54f10267c2b8ea3066281877d0
                • Instruction Fuzzy Hash: 4791F470B002189FCB14DF69C484A6A7BF6BF89710B1184A9E506DF3B5DB71ED81CB91
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: 434a2d22126f8d68ff2dc65a802fc98915fd7d9e7bcf57e6398012bb136d51ab
                • Instruction ID: f0a683048f2054b8d08d42a88f6bfdc88d0cd9434ce5d3d22e3eee94d845bf8b
                • Opcode Fuzzy Hash: 434a2d22126f8d68ff2dc65a802fc98915fd7d9e7bcf57e6398012bb136d51ab
                • Instruction Fuzzy Hash: 00A1CC34A10118DFCB04EFA4D999AADBBB2FF88300F558559E446AB365DF70EC46CB90
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: d6f95448f75cabb51675384813e5283c15f7a6e9f8e8054bb30965de4d9648f3
                • Instruction ID: 15f70f465a959501eae34e984f9f8cfe4bdddbd5a7d21af27e47d4ead24d4c6d
                • Opcode Fuzzy Hash: d6f95448f75cabb51675384813e5283c15f7a6e9f8e8054bb30965de4d9648f3
                • Instruction Fuzzy Hash: F751D035B0061A8FCB10DF59C484A6AFBB1FF89320B1A8A6AE91597341C730F952CBD5
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: pbq
                • API String ID: 0-3896149868
                • Opcode ID: 8bdb704bb37497a21b51d58388c88152ded05f260e5c23dc54506cba59545700
                • Instruction ID: 67eaca6abe9ad231628df2996da598afbd79c50fe6e18aec560286502071081f
                • Opcode Fuzzy Hash: 8bdb704bb37497a21b51d58388c88152ded05f260e5c23dc54506cba59545700
                • Instruction Fuzzy Hash: 15515C76600104AFCB459FA9C855D29BFF7FF8D31471A8494E2099B272DA32DC21EB51
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: f458559fb00a57e18faa1622c90e487cb167ef64b5ef57c884dd41923b78cbab
                • Instruction ID: d96333520237f95e5d635697a1d071e508a30a480f9bb75eaad8d49f2f48c08a
                • Opcode Fuzzy Hash: f458559fb00a57e18faa1622c90e487cb167ef64b5ef57c884dd41923b78cbab
                • Instruction Fuzzy Hash: 92413234B106198FCB04EB64C899AAE77BBBFC9700F10482AE4479B394CF749D56DB91
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: TJcq
                • API String ID: 0-1911830065
                • Opcode ID: 3e18d3cad307f060c0318397b3355829b36cb7f0180c98f44d6f47fff9f014e9
                • Instruction ID: 986db4e9138f4ed720dfc0949110f1d251b3a866b74fca5467ac9d1e2edcafd0
                • Opcode Fuzzy Hash: 3e18d3cad307f060c0318397b3355829b36cb7f0180c98f44d6f47fff9f014e9
                • Instruction Fuzzy Hash: 0E51E678D00218DFDB04DFAAD9586ADBBF2FF89300F108569E919A7364DB34A949CF41
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: %
                • API String ID: 0-2567322570
                • Opcode ID: c79d0db68b8057a3bcdc042e91383f9e04eed35ec1fe4b83ee1ba3476882a230
                • Instruction ID: dc1d4020991dbe6418ae382f2ea37cde704ed0fad52b19bdc33652e95857b9d4
                • Opcode Fuzzy Hash: c79d0db68b8057a3bcdc042e91383f9e04eed35ec1fe4b83ee1ba3476882a230
                • Instruction Fuzzy Hash: 4341F574D05229CFDBA4DF69D844BADBBB2BB88304F0080EAD809BB254DB355A85CF54
                APIs
                • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05C4EF9F
                Memory Dump Source
                • Source File: 00000006.00000002.2238732596.0000000005C40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C40000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c40000_Networks!.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: efa5b775d7cdfa86653ffdda9b8c087e39564c912618deeff0dd2f5e275f9ab8
                • Instruction ID: 48ff9d55fd37a0e170671da366e14ce5e680881d26739877473187c6848a2ab6
                • Opcode Fuzzy Hash: efa5b775d7cdfa86653ffdda9b8c087e39564c912618deeff0dd2f5e275f9ab8
                • Instruction Fuzzy Hash: DB31A7B8D042589FDF10CFA9E884ADEFBB5BF49310F20942AE819B7210D735A945CF95
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (bq
                • API String ID: 0-149360118
                • Opcode ID: e1ce386a2a3230f76517debae5f312f6413c6f27443377ae70ec578286177706
                • Instruction ID: f0d7aeb542e436fc45766becbc713e971a4b40c66594980cbe8a8bb4902a71c8
                • Opcode Fuzzy Hash: e1ce386a2a3230f76517debae5f312f6413c6f27443377ae70ec578286177706
                • Instruction Fuzzy Hash: B421E1363042559FDB159F6DD884A6E7BA6EFC9320B14847AF909CB3A0CE319D11CB90
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4'^q
                • API String ID: 0-1614139903
                • Opcode ID: d4c30a17268f4f993652bedf25e42d9f88b6a8f8f177b7e84ecfae6f4dfe0494
                • Instruction ID: 39db16de6601426dd78332e64e097e49fb47be626b7441075f2986f90ab75486
                • Opcode Fuzzy Hash: d4c30a17268f4f993652bedf25e42d9f88b6a8f8f177b7e84ecfae6f4dfe0494
                • Instruction Fuzzy Hash: 90318272A10105AFCF049F98CC45E69BFB7FF8C710B0544A9EA0A9B365DA71DD12CB90
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: p<^q
                • API String ID: 0-1680888324
                • Opcode ID: c5cc445e06021790535f6613b2194ff0078ea90dee0341f2a0afa1f2623ccf07
                • Instruction ID: 6b70c5ddf213d57b631de7f4f8d59d1a2ff4c12b70c556ea97736ccd5c34a646
                • Opcode Fuzzy Hash: c5cc445e06021790535f6613b2194ff0078ea90dee0341f2a0afa1f2623ccf07
                • Instruction Fuzzy Hash: 8A218B753082489FCB05CF2AC845AAA7BFAFF89311B144495FC05CB3A1CAB1DC51CB20
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: p<^q
                • API String ID: 0-1680888324
                • Opcode ID: c0154146e5f3459f3256e21d670822e07604c14403111718aeb1af79c58234e9
                • Instruction ID: 080e3d6b0dd72de1a36396ba8e0b3a7cc5388faa8f43a3db5c8d3465da761c0a
                • Opcode Fuzzy Hash: c0154146e5f3459f3256e21d670822e07604c14403111718aeb1af79c58234e9
                • Instruction Fuzzy Hash: D02158753082489FCB15CF2AC845EAA7BFAFF8A211B154496F905CB3A1CA70DC51CB20
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: ?
                • API String ID: 0-1684325040
                • Opcode ID: b265edb1b257b0cada7b0a1a86b75203bccdc8e295527d872beeb560993c3ee0
                • Instruction ID: c36f674f53959184564851f9af56cddbc439a46cd9f2e06909bed184ff558b50
                • Opcode Fuzzy Hash: b265edb1b257b0cada7b0a1a86b75203bccdc8e295527d872beeb560993c3ee0
                • Instruction Fuzzy Hash: 92218AB4D05229DFDB61CF64C899BECBBB2BB08304F0442EAD909AB254DB755AC1DF50
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 8
                • API String ID: 0-4194326291
                • Opcode ID: 66fc0533bdc4cb12491e96ec3c59060a320132d95d3adf6a1b7dd84104f73705
                • Instruction ID: 3556aee0ef038e6c7422435b6fd56dcdba9d689b54570a7c00645f3e27fadc84
                • Opcode Fuzzy Hash: 66fc0533bdc4cb12491e96ec3c59060a320132d95d3adf6a1b7dd84104f73705
                • Instruction Fuzzy Hash: 3521AF7494122D8FCBA0DF64C888BEDBBB1BB48304F1041EAD809AB254DB355F81DF51
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 8bq
                • API String ID: 0-187764589
                • Opcode ID: 20b82aaf7299e3f5d1b87198e71269de9d69140ca58e5d1187b7d57d8ecdc3a8
                • Instruction ID: 43ed485ff8f6209911c00b4015d2c7270b046d935aa17e98e7b347a645918823
                • Opcode Fuzzy Hash: 20b82aaf7299e3f5d1b87198e71269de9d69140ca58e5d1187b7d57d8ecdc3a8
                • Instruction Fuzzy Hash: 8D01C0786193508FC702EB2CE844BA577A2AB85300F1894F9E40DCB2ABCB395C49DB42
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: %
                • API String ID: 0-2567322570
                • Opcode ID: a359b398fdf07e3c1eb1a204dc91a79adcd3d8e230e71ffa9deaa56e5ee2198d
                • Instruction ID: 252fbbb06d640f5f7d41bb9c7bdc50c38f6cefc19702e0671b32d023fc515800
                • Opcode Fuzzy Hash: a359b398fdf07e3c1eb1a204dc91a79adcd3d8e230e71ffa9deaa56e5ee2198d
                • Instruction Fuzzy Hash: 28119374D4122BCFDB64DF54D944BACBBB1BB48308F0481EAE819A7254E7355E80DF40
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: $
                • API String ID: 0-3993045852
                • Opcode ID: 0c577be30be56f28cdce7d4262c3f8dcfbe49db01a98e8776b9e8b9629a6792a
                • Instruction ID: 8feed8552f18145dc6cd8212372b245b127793260e38768c794a4ae178369699
                • Opcode Fuzzy Hash: 0c577be30be56f28cdce7d4262c3f8dcfbe49db01a98e8776b9e8b9629a6792a
                • Instruction Fuzzy Hash: 6411B0789052298FCB60DF64C988BDCBBB1BB09304F0481DAD84DB7255DB329E85DF40
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: M
                • API String ID: 0-3664761504
                • Opcode ID: 50ef6ae33764553d38f1eaf02097adf7a3f1709b84d38daa5d4d8fbd06d69673
                • Instruction ID: d845ce8df8d37a97d7d2495e1435c0a920c7048f311c4f999057745761efde60
                • Opcode Fuzzy Hash: 50ef6ae33764553d38f1eaf02097adf7a3f1709b84d38daa5d4d8fbd06d69673
                • Instruction Fuzzy Hash: 3501C2B4A00228CFDB60DF24D888BE8B7B2BB19304F1098E5E499A7640DB746FC4CF11
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: E
                • API String ID: 0-3568589458
                • Opcode ID: 4c2b1a70a7096637d2ce89f6fec6d2894394307108b6f9a0b118bcab7c427177
                • Instruction ID: ef25a1853821515a4461645a8788980bd2aea81bc7a7fff4e3ae81cdd3e6a0de
                • Opcode Fuzzy Hash: 4c2b1a70a7096637d2ce89f6fec6d2894394307108b6f9a0b118bcab7c427177
                • Instruction Fuzzy Hash: C2F0277560020C4BCB94DF78E8850CC7F21FF49A65B4046AEE90893242C7344E0E8B40
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: N
                • API String ID: 0-1130791706
                • Opcode ID: e8865d789403acfd264aa9f67afa2fc4edb1a7cdf3309ff02c51879e7f02aa68
                • Instruction ID: a51498f0cbb94da9193c12226486a434c0f8172c1396cf6b0ea5495661cfb96f
                • Opcode Fuzzy Hash: e8865d789403acfd264aa9f67afa2fc4edb1a7cdf3309ff02c51879e7f02aa68
                • Instruction Fuzzy Hash: CA01C474E01228CFDFA0DF68D889FADBBB6BB49314F1095A6C419B2610DB744AC1CF15
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: '
                • API String ID: 0-1997036262
                • Opcode ID: c8db0398accbde205104252178878bfcab9fc5af542a693e28f9d841524f75fd
                • Instruction ID: bc7973ed02ba318ca7e41383901fa776c551000e3da1e1ced3aff85d6fff4ceb
                • Opcode Fuzzy Hash: c8db0398accbde205104252178878bfcab9fc5af542a693e28f9d841524f75fd
                • Instruction Fuzzy Hash: 10F07474946228DFEF61DF64D894BDCBBB1BB08300F1041DAE909A6390D7369E809F00
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: 4
                • API String ID: 0-4088798008
                • Opcode ID: 38aa95c85266bcb02369750ea48ffd9124707e5e8dcf2c149c7ed72456dc28e6
                • Instruction ID: 073e0a84354b4a9ff8920dbbd2a6f681ca1548e49f0d4148a631cf0238879136
                • Opcode Fuzzy Hash: 38aa95c85266bcb02369750ea48ffd9124707e5e8dcf2c149c7ed72456dc28e6
                • Instruction Fuzzy Hash: 3EE0B67090922C8BDB60DF64C9487A9BAF0BB06318F0052D9848D66255CB360AC9CF11
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: (
                • API String ID: 0-3887548279
                • Opcode ID: ab8c1c8e7e95c037344be1249807aa4587adb6ef7abe6de67d7383e7ad82e7f4
                • Instruction ID: 51d5043184c7aa501a92e25b7a4ef7c9db50703333ca78df3441f384991f580e
                • Opcode Fuzzy Hash: ab8c1c8e7e95c037344be1249807aa4587adb6ef7abe6de67d7383e7ad82e7f4
                • Instruction Fuzzy Hash: 99E09278904229CFCB50DF60C948B9CBBB1BB48309F1482EA8809A7351D7369A86DF40
                Strings
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID: A
                • API String ID: 0-3554254475
                • Opcode ID: 3b30887fa4dea32153be783d34c22b80336f88c231c5f450a0aa1eb6bf838555
                • Instruction ID: dadf0cf00dd59e6a688693e973815674acad8272ab4639732e1c667c1b95e33c
                • Opcode Fuzzy Hash: 3b30887fa4dea32153be783d34c22b80336f88c231c5f450a0aa1eb6bf838555
                • Instruction Fuzzy Hash: 35D017B4B1426A8FCB00FB24E90879AB7F6BB85300F508A84D8499A244DBB88D818F51
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9f43d23eb29b3af86fd6c523d7cd8cc8fa47632d2bd5f86587a7801bbe4832fa
                • Instruction ID: a8b390859ed1b7441953d4ed9f414ea150f4468447647b81988ee46c6a8adc52
                • Opcode Fuzzy Hash: 9f43d23eb29b3af86fd6c523d7cd8cc8fa47632d2bd5f86587a7801bbe4832fa
                • Instruction Fuzzy Hash: 03120A34B102198FCB14EF68C995BADB7B2BF89300F5189A9D44AAB355DF30AD85DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fc64b6fe36b228d5aa24a4448652820182dc9b07e94bc5b5c6cae42bda1ba72c
                • Instruction ID: 8375997be6cf7d92c7e71fb4c77fd72b062b700ab94bf07efc2f8ac681251c8e
                • Opcode Fuzzy Hash: fc64b6fe36b228d5aa24a4448652820182dc9b07e94bc5b5c6cae42bda1ba72c
                • Instruction Fuzzy Hash: 9A917C39B112089FCB15CF69D99AAADBBB2FF88311F148469E902A7350CB31DD45CB50
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ff4e0ebe43c6352f4550b8a9d288d7a7c63354d6852556f09b0193f32436794
                • Instruction ID: 390b75a81cf16234921f3dfd172135d834a5ad261b9d2b7033979237f4dac8d6
                • Opcode Fuzzy Hash: 6ff4e0ebe43c6352f4550b8a9d288d7a7c63354d6852556f09b0193f32436794
                • Instruction Fuzzy Hash: 38C1E774E01268CFDB54EFA4E854B9DBBB2FB49300F1081AAD909AB355CB386D85DF50
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8820b80d8bba798391a0bb011bf6dd7dda3359ac76c2b90aa7d42e279be950fc
                • Instruction ID: f0ef946603180e410d0383f113ace567331966e5a1b3eb838dc3b792dde3454d
                • Opcode Fuzzy Hash: 8820b80d8bba798391a0bb011bf6dd7dda3359ac76c2b90aa7d42e279be950fc
                • Instruction Fuzzy Hash: 43A10774E05268DFCF14DFA8D556AADBBF2FB4A301F20846AE415EB641C7389A42DF10
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2c6452c23535eb3bc947301afbd057cb0d11d2e547c60660968cf5c359faeb07
                • Instruction ID: 26deae6a2480e7fdd9b09c006d806fd1ac3f3552ab15be127cb369897f869432
                • Opcode Fuzzy Hash: 2c6452c23535eb3bc947301afbd057cb0d11d2e547c60660968cf5c359faeb07
                • Instruction Fuzzy Hash: 52B11774E01268CFDB54EF64E854B9DBBB2FB89300F1081AAD909AB355CB385D85DF50
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5832a104df210e8c4dc7f6a17aa9fc00b61ffc21e89302bd916db084d7212d02
                • Instruction ID: 41af95f84bf16928de2d22abf26d8a9ccf2fbcdaef1b5c8d783cf70fc1d6c20f
                • Opcode Fuzzy Hash: 5832a104df210e8c4dc7f6a17aa9fc00b61ffc21e89302bd916db084d7212d02
                • Instruction Fuzzy Hash: 98A12D34B002198FCB14DF24C999BA9B7B2BF88300F5089A9E54AAB365DF74DD85DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 10490d049777d3af582e77d795bc2a7a744da628fae75429f69fc9ed21715259
                • Instruction ID: cfa3526a2b8279590d80bf736184ab6d6d016e551fe257e671f2691dc518a00b
                • Opcode Fuzzy Hash: 10490d049777d3af582e77d795bc2a7a744da628fae75429f69fc9ed21715259
                • Instruction Fuzzy Hash: 9C811C34B50118DFCB14DF68D899A6DB7B6BF88700F148869E8069B3A1CB74ED41CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5515cc3469a7effcc226a032ecc16b4663cf2c271b64acd2257bf5c29e99725c
                • Instruction ID: 79088c4470e71d99fa2bd1ad3524c28207582457f6737d39eba43567e6125957
                • Opcode Fuzzy Hash: 5515cc3469a7effcc226a032ecc16b4663cf2c271b64acd2257bf5c29e99725c
                • Instruction Fuzzy Hash: EF811CB5A00618CFCB15DFA9C485D9DBBF6FF49310B1585A9E8069B360DB30EE41CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1e821fa14d9d739e8938b0b5f3128d638bf8c83f693f52eccecfa69a0ac35415
                • Instruction ID: 31e2871e26173e8b7bbf6e6248974c3b57f5bf3896edabf4b64ae89cc3a7fadd
                • Opcode Fuzzy Hash: 1e821fa14d9d739e8938b0b5f3128d638bf8c83f693f52eccecfa69a0ac35415
                • Instruction Fuzzy Hash: 53911874E05268CFDB14EF95E854BADBBF2FB89300F1081AAD909AB254CB385D85CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 00427c3fb5c9a4759104f907a38797fb3447e9ac64699a8ffa6781c99ab060ae
                • Instruction ID: bba669032223839c120112e6f25247fad7eeb528628085dbbfbe6d6e786687f7
                • Opcode Fuzzy Hash: 00427c3fb5c9a4759104f907a38797fb3447e9ac64699a8ffa6781c99ab060ae
                • Instruction Fuzzy Hash: CC910774E05268CFDB14EF95E854BADBBF2FB89300F1081AAD909AB254CB385D85CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 09cd7aa53be7163dcac187285de10717a02c8eee4a308bdac368d6965bd0a488
                • Instruction ID: 3417e9cf8a6c19892a53b6cd9d600cc4f2de90bf6b8810cd8e1003b80815ca58
                • Opcode Fuzzy Hash: 09cd7aa53be7163dcac187285de10717a02c8eee4a308bdac368d6965bd0a488
                • Instruction Fuzzy Hash: 6C91E874E01258CFDB54EF94E854B9DBBF2FB49300F1081AAD909AB254CB385D85CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 247dde40862a446335bcdb44e264890c743faee3008f15b8f82ee484c70b4da5
                • Instruction ID: 2c48b5285d4e463eb176945562a9b66f669f5aefdf672387e80ba6007432db59
                • Opcode Fuzzy Hash: 247dde40862a446335bcdb44e264890c743faee3008f15b8f82ee484c70b4da5
                • Instruction Fuzzy Hash: 5F710974E05268CFDB54EF94E854BADBBF2FB49300F1081AAD909AB254CB385D85CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3895831cbf2b31507bdd35c20e84170d654ee4646e169120221862ef774c71dd
                • Instruction ID: 19ee078e9e6ff5eb28f5a43d652b81cdeeed945c1ec04aa61527502eee41e188
                • Opcode Fuzzy Hash: 3895831cbf2b31507bdd35c20e84170d654ee4646e169120221862ef774c71dd
                • Instruction Fuzzy Hash: B2612B34B10618DFCB14DF68D899AADB7B6FF88700F158969E8069B365CB34ED41CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3025f6a498a96b1adb8bbaeec930e140d81907695d79634b4eb805305888279f
                • Instruction ID: 85d8088bc00c8034207d68c24dc61787065da57410ed5f92da603dd3210821e7
                • Opcode Fuzzy Hash: 3025f6a498a96b1adb8bbaeec930e140d81907695d79634b4eb805305888279f
                • Instruction Fuzzy Hash: 8F516334B20509DFCB04DF68E859AADBBB6FF88B11F10851AF90697364DF349946CB81
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 490480eb792ec5097bc044ff083ccdce72c1728c3a1b585ec39ae392458eb5eb
                • Instruction ID: 6ff9559d353bc5baec2600a54344d5634564f42e213e8fdbddb8109981d2e564
                • Opcode Fuzzy Hash: 490480eb792ec5097bc044ff083ccdce72c1728c3a1b585ec39ae392458eb5eb
                • Instruction Fuzzy Hash: BF5102B4E08228DFEB04DFA9D8446EEBBBABF49306F10A42AD415B3350D7B55945CF50
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f1681a923c5d230c94dcd5a0252c9cf44a3d28ac16dac279d856b21810d63a5e
                • Instruction ID: 4b12ba03762d6b5a51c7868233fb3ab8693555350500f8083f521dd63adbf7d3
                • Opcode Fuzzy Hash: f1681a923c5d230c94dcd5a0252c9cf44a3d28ac16dac279d856b21810d63a5e
                • Instruction Fuzzy Hash: FC51B274D01218DFDB18DFA9D585A9DBBB2FF89304F20812AD41AAB350DB359A42CF41
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 28c6f8ea4ee527cb8cda2e1c1961625aad1bde95dac516cd4bd0521df9ce740c
                • Instruction ID: a23aa603adfb5e5a80b221d166be1d6e50515dbc209ccbf51c525fc80652d10f
                • Opcode Fuzzy Hash: 28c6f8ea4ee527cb8cda2e1c1961625aad1bde95dac516cd4bd0521df9ce740c
                • Instruction Fuzzy Hash: 8D41D270D01218DFDB18DFB9D595AADBBB2FF89304F24912AD419AB261DB319942CF40
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a497fab2e3488f506d879af4d288e564d6227d2212c62f1e2579a4e6e90687cc
                • Instruction ID: aaa437c615415f6bd4c69a6eb8b7a0be480f970c060855ff8ef18a74f33945fb
                • Opcode Fuzzy Hash: a497fab2e3488f506d879af4d288e564d6227d2212c62f1e2579a4e6e90687cc
                • Instruction Fuzzy Hash: 70418D30A14310CFC711DB68D0847AEB7B3EB81300F5582B9C14EAB29AC7759E8ACB81
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 742e1f3438b4c275c7748a824dc44d21d8d6195ebfbe59692da6f6f9c29ab0ed
                • Instruction ID: 5569e8bf3634b08c515e87c1767cd88b75b8f6112f310f44c233016e3048ca95
                • Opcode Fuzzy Hash: 742e1f3438b4c275c7748a824dc44d21d8d6195ebfbe59692da6f6f9c29ab0ed
                • Instruction Fuzzy Hash: 6A414B35A0011CDFDB04DF64D956AEEB7B6FF88310F148469E806AB360DB349E16DBA0
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c2631c37120ece3ecca7d0378c79fe2929629a925dece004c8cc0e33a5818816
                • Instruction ID: ed396b7a2bdb22c0169aee8074c68b050141496bc37885feab7337faf3b0c47e
                • Opcode Fuzzy Hash: c2631c37120ece3ecca7d0378c79fe2929629a925dece004c8cc0e33a5818816
                • Instruction Fuzzy Hash: 8931F7366101089FCB05DF69D889EA9BBB2FF48320B1644A9E90A9F372C731ED55CB40
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 571feb4d80253c53efcfd3bcb8be9da873106007b575aabebac7ecbb48951663
                • Instruction ID: d36e0565e8c471f8e96378bc907b0b2cc85c6a5a5209490114a543d67b07dbef
                • Opcode Fuzzy Hash: 571feb4d80253c53efcfd3bcb8be9da873106007b575aabebac7ecbb48951663
                • Instruction Fuzzy Hash: FA416A75A102198FCF14CFA9C946BBEBBB2FF88300F01886AE556E7251D735DA45CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 71872da8c1d22f320f3d69dcf3d45ffc8d6666045ac313b10225d1b5f402e125
                • Instruction ID: fddc3a376b3aebbd65661e888ca4ea6e200718bc6b629cae90dbd994aef72a44
                • Opcode Fuzzy Hash: 71872da8c1d22f320f3d69dcf3d45ffc8d6666045ac313b10225d1b5f402e125
                • Instruction Fuzzy Hash: 98413A34A10215CFC715EF98D1847AEB7B3FB84305F5082B9C50DAB39AD7759A8ACB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fa41efa3e5090075e719d3a6af103fe34bda6aeefcae446dc8e66cfe7fac27d2
                • Instruction ID: 9192035e601a25ac23aa1cc337034524e1fc07e7998a11498f1f8eac1d9d294b
                • Opcode Fuzzy Hash: fa41efa3e5090075e719d3a6af103fe34bda6aeefcae446dc8e66cfe7fac27d2
                • Instruction Fuzzy Hash: F7312A38A24254CFCB05DB68D894A99BBF2EF89310F1585E6E849AB362C734AC45CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9b03b27efee85b33f338f84ed72667a9dc6629fcccaefd21f83f0980709b182b
                • Instruction ID: 97f5964fd7f0b7edf925e971db690f9ee69bc05b699834aa70c403d13b7c5014
                • Opcode Fuzzy Hash: 9b03b27efee85b33f338f84ed72667a9dc6629fcccaefd21f83f0980709b182b
                • Instruction Fuzzy Hash: E8317034700604CFC729AF25D499A2ABBB7FF85305B14886DE8468B360DF75ED46CB50
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e04224cb12edecb1939ccdbcb5b44053c6c72e7901efd194cbf24b3ad61ec0d6
                • Instruction ID: bc4b1a65b9c0c56e8859990b3d522c3dd9eb5f204e21e10d594ac85155e9a0ef
                • Opcode Fuzzy Hash: e04224cb12edecb1939ccdbcb5b44053c6c72e7901efd194cbf24b3ad61ec0d6
                • Instruction Fuzzy Hash: A83102B4E04218CBCB04EFAAD8446EEBBF2FB88300F10C4A9D819A7754D7385A45CF90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9e23d740cd110bddd4e580858882be3e47baa03c1fd28986fc6845f2e9df6998
                • Instruction ID: 764ef9e6643c14fc00e668e751e54fb14803299c5cf32981e2e04933d1f6cc31
                • Opcode Fuzzy Hash: 9e23d740cd110bddd4e580858882be3e47baa03c1fd28986fc6845f2e9df6998
                • Instruction Fuzzy Hash: 8421D7323042088FC725DBADE985A6ABBA5EFC5315B15897BE04EC7251DB31EC02C790
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a31bec1db742029a7cf4e9f56be755ca096a268d8a8c04010e9b237e0a47d493
                • Instruction ID: e4e92fb1071354dd1e25d7d52d2e2d9630b12c8622e91d7f8f8524c59a5c221f
                • Opcode Fuzzy Hash: a31bec1db742029a7cf4e9f56be755ca096a268d8a8c04010e9b237e0a47d493
                • Instruction Fuzzy Hash: 673138B49092989FDB01DFA8D44839DBFB5FB06304F5882DAE418A7292D7384A89DB01
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6bd137be7b283bb1abf31dbf96bc05eb8c64ddf3c1ab7f90b6dd4875af914a6a
                • Instruction ID: ed8b1146bee0aafd4ca3274c3cb5d253255ca53a0753a8ced9216791d4a7c69e
                • Opcode Fuzzy Hash: 6bd137be7b283bb1abf31dbf96bc05eb8c64ddf3c1ab7f90b6dd4875af914a6a
                • Instruction Fuzzy Hash: EB3136B1D4921DDFCB40DFA8D856BEEBBB1FB49304F1041AAD459EB251EB304A42DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2ad42ab57dbd19cc9c8530e08598682abc22ee71d83060e33fc9c48a943b853c
                • Instruction ID: 925fa08f04bedd74678c14882218e1e0e9b05c71cb6dfaddd6dbfa5c00bdb9d6
                • Opcode Fuzzy Hash: 2ad42ab57dbd19cc9c8530e08598682abc22ee71d83060e33fc9c48a943b853c
                • Instruction Fuzzy Hash: 0C310574A04228CBDB51DFA8D8447EDBBF5FB49340F0485EAD80AAB341D7799985CB41
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 90a1b172fce72df88e01bd4cca8e226118e043b2be260ceedc68e82ba0b4623c
                • Instruction ID: bd2885f6a354ebfe050bd127ed26a1c1e2dc302a0bdef11ceea0f8f196b5fe97
                • Opcode Fuzzy Hash: 90a1b172fce72df88e01bd4cca8e226118e043b2be260ceedc68e82ba0b4623c
                • Instruction Fuzzy Hash: 6131D2B4D00219CFDB04EFA9C545AAEBBF9FF49300F1485A9D819A7264EB349A48CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 49509230e290f43f478ea096c7dd2d4d8f430a98013f077f2a66a6d2cbcc1ebc
                • Instruction ID: 07c569fe63698a5a7e7e9a7018e4bb01ca3a3d7374b780207127963e0eba97b5
                • Opcode Fuzzy Hash: 49509230e290f43f478ea096c7dd2d4d8f430a98013f077f2a66a6d2cbcc1ebc
                • Instruction Fuzzy Hash: BD31E4B4D00219CFCB04DFA9C54969EBBF5FF49310F1485AAD819E7264EB349A48CF91
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 43a7c292d2d9410e26ec7308b41f317d5a82fc90bb733172485e381c5ea52fa6
                • Instruction ID: c997c8adaab4eb065a3183129f40f7bd44caa0eeeb4eddbd3050e73e9e8b7c2c
                • Opcode Fuzzy Hash: 43a7c292d2d9410e26ec7308b41f317d5a82fc90bb733172485e381c5ea52fa6
                • Instruction Fuzzy Hash: 1B217C31E04299DFDF04DB79C489BAEBBF5AF44244F108866D519D7290E734CA50CB92
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d18d4adc575dec821cce356204bea4dddaf0db8278c8a0ae223183bed4b23d8a
                • Instruction ID: 26e01eb07913caa6198c6676065ae22cf8175fa2792d072ac08095a8adb68365
                • Opcode Fuzzy Hash: d18d4adc575dec821cce356204bea4dddaf0db8278c8a0ae223183bed4b23d8a
                • Instruction Fuzzy Hash: D031B038A20224CFCB44DB58D584AA8B7F2FF88351F2585E5E809AB366C734AC84CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d527cc34aeaf3c013a1f8e78d6c299da15405141509b56ad1e65ff3da206c363
                • Instruction ID: 1de560932655b980e62a70ecce94ba0f958fec839f4c60dc4417517f7334f8e9
                • Opcode Fuzzy Hash: d527cc34aeaf3c013a1f8e78d6c299da15405141509b56ad1e65ff3da206c363
                • Instruction Fuzzy Hash: 4221D232B101598B8F10DF79E8464BEB7BAFF84A617204C76E416D7250DB38DD05C760
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ad87e33cd77d5d9fa9bb05eab8d8feb8dc2ccb80cbe12ba6d69230ead3fb048f
                • Instruction ID: facd2483363425654a2eb7bed1c26416e569cbc19d37ac98b4606c6d784d6723
                • Opcode Fuzzy Hash: ad87e33cd77d5d9fa9bb05eab8d8feb8dc2ccb80cbe12ba6d69230ead3fb048f
                • Instruction Fuzzy Hash: 0D31D2B0D05218DFDB04CFA9D946BBEBBFABB48301F14916AD419B3250E7345A81CF64
                Memory Dump Source
                • Source File: 00000006.00000002.2212316602.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_fbd000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a18fbb9902ceb53f467367a8d7b06d4107497900b27eb7f0f2ffd0167dd36504
                • Instruction ID: 167810e4eed723310d9c70fe17b11d66b2abe7b7ae6d06c252c2497086108b19
                • Opcode Fuzzy Hash: a18fbb9902ceb53f467367a8d7b06d4107497900b27eb7f0f2ffd0167dd36504
                • Instruction Fuzzy Hash: 592125B6904244DFCB14EF14D9C4B66BF65FB84364F24C569E9090B24AD336D806EBA3
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2c1fdc3d2298029493eff833bc4b76e28d6b8c6e225725fe40961ea5f84cce4b
                • Instruction ID: 53ce91e32a14cf22f7c1d785f88bb7a12fc6f508c37ec8c46f58d848dfe496e5
                • Opcode Fuzzy Hash: 2c1fdc3d2298029493eff833bc4b76e28d6b8c6e225725fe40961ea5f84cce4b
                • Instruction Fuzzy Hash: C83127B4D00218DFDB00EFA8D0487ADBBF9FB4A304F54C1AAE419A7251D7784A89DF41
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 045cab73f2e849486fed4503ac2950b5d48efa8a7446802b4cd64a4b96bb7270
                • Instruction ID: 7f46980c547bbe64eeb1c3cf1bf61b8753c64f0c8138bd5ad4f150b92deb2c0c
                • Opcode Fuzzy Hash: 045cab73f2e849486fed4503ac2950b5d48efa8a7446802b4cd64a4b96bb7270
                • Instruction Fuzzy Hash: 7A216D35A00219EFCB15CF68C4499DD7FB6EF8C320F14856AE811A7390CB319941DB90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ced0c0c5f8cb7d14d23d460b1ab9b36914b8ce3f55927a99203b12f4dff5bfde
                • Instruction ID: fa0b225c646483a6a12457169ec2ea7695bc79c92b2ae24b8add5ad87cdf2d2d
                • Opcode Fuzzy Hash: ced0c0c5f8cb7d14d23d460b1ab9b36914b8ce3f55927a99203b12f4dff5bfde
                • Instruction Fuzzy Hash: 63210876610104DFCB05CF99E988E99BBB6FF48310B0644A9F6099F372D731E925DB40
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee89d839952e3f4ebe167da76a4b5c80e72fee995444a4c7e0c81a7337d6e93c
                • Instruction ID: f54e0ad875049ec70f7fa5938148b60fdc37adaf15aa30c2c96dd8d20383812d
                • Opcode Fuzzy Hash: ee89d839952e3f4ebe167da76a4b5c80e72fee995444a4c7e0c81a7337d6e93c
                • Instruction Fuzzy Hash: A1211775A002098FDB04DF98D596ADDB7F2FF88300F2009A5E405BB361DB75AE45CBA0
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 00649d64cc6e82834715d5383fc73cb5ba54a946d3fdd7ec70541ec43714badb
                • Instruction ID: 94195e805c9da49255a0f5b19b58ecb6e0624d9025d0e79b05d954cf63d33daf
                • Opcode Fuzzy Hash: 00649d64cc6e82834715d5383fc73cb5ba54a946d3fdd7ec70541ec43714badb
                • Instruction Fuzzy Hash: 612192B06102059FC724EB79D84A7AE7BA6EF85304F108839F40ADB645DFB4AD4197A4
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 75965686d4dd50d98bf69bd7576b2f0309131731625bb884a50f4ff8e601147b
                • Instruction ID: b3efe6909244d34dbae821e411cfab29ff94ddbc2da6af82e0c6f83b843762a8
                • Opcode Fuzzy Hash: 75965686d4dd50d98bf69bd7576b2f0309131731625bb884a50f4ff8e601147b
                • Instruction Fuzzy Hash: 2E210CB4E0531ADFCB14DFAAC585AAEBBF6FB48300F14C199D815A7284D7389981CF91
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 22cf96a860e1e7942761deffa519117da377ca033c7504bc07790e20b6f8fba0
                • Instruction ID: 2e805d883bf27e3727142428d839f96e99cdef03b0d19773a705a98b42d16880
                • Opcode Fuzzy Hash: 22cf96a860e1e7942761deffa519117da377ca033c7504bc07790e20b6f8fba0
                • Instruction Fuzzy Hash: C8214C74A00219CFCF14DFA9D885AAEBBF6FF88654F004929D916D7310E735E946CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7f2c115f713331afc253091855059776a8094a709c3d8d49d2f6aef886d0c8bf
                • Instruction ID: 0f9f16ad917e7e1c61c4dea7eb9afa4d44b235c2dacfa6dfd7a106d5cf88f3c3
                • Opcode Fuzzy Hash: 7f2c115f713331afc253091855059776a8094a709c3d8d49d2f6aef886d0c8bf
                • Instruction Fuzzy Hash: FD216AB0D062288BDB14CFA5D8547EDBBF5EF8A314F0480AAC809AB351DB754905CF51
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 854423c3dbed11dff30427e22b06c41d6d9708dcecec7ab1f76628faeb13b8a0
                • Instruction ID: 8c18a05693dadc2adfd4e87af04e3c581c3fea37c22608a28f76cb1fa0da23f7
                • Opcode Fuzzy Hash: 854423c3dbed11dff30427e22b06c41d6d9708dcecec7ab1f76628faeb13b8a0
                • Instruction Fuzzy Hash: F721BE7190091ADFCB24CF4CC9C1AAAF7A2FB44344F028969D4059B645C3B1A991CB84
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0e3d3ff2d42082d640f6620ef61a43ebecf7d649d7c43678e95572ad4764428d
                • Instruction ID: 41beb5083c370c99ca88dcb9006c5fe7d0ede0848bfeed6cc0b8e7009528893a
                • Opcode Fuzzy Hash: 0e3d3ff2d42082d640f6620ef61a43ebecf7d649d7c43678e95572ad4764428d
                • Instruction Fuzzy Hash: 32213574E042688FDB10DFA8E8947DDBBF1EB49340F0485AAD80AAB744CB348E95CF40
                Memory Dump Source
                • Source File: 00000006.00000002.2212316602.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_fbd000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 344d767fa28cd6a513fe236e4d3c808bdad87aea2ab02972d2f1912bec2e729b
                • Instruction ID: d16f203930d8032d251da62adb3c2ef0548c34320b0f615cbf24692495d58e5a
                • Opcode Fuzzy Hash: 344d767fa28cd6a513fe236e4d3c808bdad87aea2ab02972d2f1912bec2e729b
                • Instruction Fuzzy Hash: D221B0755093C08FCB02DF20D994756BF71EB86324F2981EAD8458B657C33A981ADB63
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1a8f187ac1de25a72dcab0a556122c803bb65d7500bc5382c43625809dd6d05b
                • Instruction ID: dc88ce14e2450cd71725bd5bc6b0ac2eccf457a0254d3d39ebc6676ad9cb6473
                • Opcode Fuzzy Hash: 1a8f187ac1de25a72dcab0a556122c803bb65d7500bc5382c43625809dd6d05b
                • Instruction Fuzzy Hash: 6A213975A402098FDB04DFA4C596BEDB7F2BF88300F2149A5E441BB3A1CB759D84CBA0
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be99cab53415e7a13dcae5d686fdeb0e43a60e04c14a03c49b0133b4991c1283
                • Instruction ID: 63d9bb1f2f7b465ba8ce49412a3e0d4df9af5296e0e633643db565d12cb0aad9
                • Opcode Fuzzy Hash: be99cab53415e7a13dcae5d686fdeb0e43a60e04c14a03c49b0133b4991c1283
                • Instruction Fuzzy Hash: EC21A0B5940629DFDB25DF19CC80BE9BBF6BB49304F0481E6E908EB250E7719A81CF50
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e9d0039fe5081d103874ac81600c82651d0fd110bec6e97d3b2538dfaeed90c7
                • Instruction ID: 9cd08f83238db40330545a5235ea46d8c012eaf27b68b7b216c1bc7366e8e586
                • Opcode Fuzzy Hash: e9d0039fe5081d103874ac81600c82651d0fd110bec6e97d3b2538dfaeed90c7
                • Instruction Fuzzy Hash: 6D21AF34B106088FC714DF28D989A6DB7B2FF89710F144969E546973A0DB30ED15DB61
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1020b7b1c9fbca04e84b7c809a8ead430f7f41b5f0a1e8f735d1cc1c3a61bdfc
                • Instruction ID: 38f60d21db65f11b485e6e0cff8f157a737cf480b964ff4221621a1ed6f2d9a0
                • Opcode Fuzzy Hash: 1020b7b1c9fbca04e84b7c809a8ead430f7f41b5f0a1e8f735d1cc1c3a61bdfc
                • Instruction Fuzzy Hash: B4213874D04619DFCB00DFA9D8447EEBBB1FF89301F1485AAD818AB291D7786A06CF91
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5e73ce55b07e20ac68eb1966972537c4f828d20a51da8978b239078e63b3695d
                • Instruction ID: e1ce66e5d1ad9c26033a91f1b04c5bd7953d40c3c6ea1aabc9e0efcacbe24223
                • Opcode Fuzzy Hash: 5e73ce55b07e20ac68eb1966972537c4f828d20a51da8978b239078e63b3695d
                • Instruction Fuzzy Hash: 47212474E00619DBCB00DF99D8447EEBBB5FB89301F0084A5D818AB290D7782A05CF90
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 09b0356df291d51cb8da3ba7daf01108da89132344b4df1b864ef468a411cd26
                • Instruction ID: 6ae66cf6a4f33ed85b0159dbef461ba771f0f17201ad86ccb40af2994ac7c771
                • Opcode Fuzzy Hash: 09b0356df291d51cb8da3ba7daf01108da89132344b4df1b864ef468a411cd26
                • Instruction Fuzzy Hash: AA21A0B5905629DFDB24DF19C880BD9BBF6BB48304F1481E6D548EB290D7709A81CF10
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6cee9912b2ed1af460df7f2c720e62adea43a474337b636956e962f000188b8f
                • Instruction ID: 91a045a404583c35c2343795f1d14f4dcafc3591c7d334e55374b133249e182a
                • Opcode Fuzzy Hash: 6cee9912b2ed1af460df7f2c720e62adea43a474337b636956e962f000188b8f
                • Instruction Fuzzy Hash: 0C113474D04229CBCF18CFA9D9446EEBFFAFB88310F15986AD518B3210D7741A49CBA5
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5f395b6bff00aa6a20f2d61602fd6fbb988c33d0b8fa749910e1855ac4a5bea8
                • Instruction ID: bc3009861238f16f2694acf2682d56ccf0219dba177281f28d6048e1ca369046
                • Opcode Fuzzy Hash: 5f395b6bff00aa6a20f2d61602fd6fbb988c33d0b8fa749910e1855ac4a5bea8
                • Instruction Fuzzy Hash: 0501C0313101044B8B00AE29E8C583AB7ABEFD8722318883FE506CB365CE34DC058B90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8ee6a195ad8a6a182d8253f4f4be2def9795bb64095e179c824d499ffb7229b9
                • Instruction ID: 1040000fac6a17d007b0e29aec6c3174ea07f017878386939775d0e1e3b15aee
                • Opcode Fuzzy Hash: 8ee6a195ad8a6a182d8253f4f4be2def9795bb64095e179c824d499ffb7229b9
                • Instruction Fuzzy Hash: 13119E31B143089FDF24DF699846BAA7BF6AF88700F188469F515DB380EA30C901CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d7f869b1011570d25c450b3150f13c2c69999da5bd24fc59832983200eb8cf7e
                • Instruction ID: 4a3a6a514c51117597fc2687b5784ffb5ad5bbed2d20d0c91f86c9f9a4b21aef
                • Opcode Fuzzy Hash: d7f869b1011570d25c450b3150f13c2c69999da5bd24fc59832983200eb8cf7e
                • Instruction Fuzzy Hash: 5911A071B102099FDB60DF6998067BE7BF6AF88600F18846AE515DB380EE30C901CBA0
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 955e5bf0a1c2379f6090c39ceb20ebdc311633145abddc1753d66077e97cb4b8
                • Instruction ID: 14ba62f12a92dbf67c16d6680f4209c5946179809a44152365f8dcc64a1e8582
                • Opcode Fuzzy Hash: 955e5bf0a1c2379f6090c39ceb20ebdc311633145abddc1753d66077e97cb4b8
                • Instruction Fuzzy Hash: 85018436340214AFDB118F59DC85FAE7BA9FF89721F108026FA05CB290CAB1D9009750
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c501ad2a7d8fc6a0ff2833461159c69e332eacf9aa509fd43ae6280243f40c6a
                • Instruction ID: ece4b9e41007b4e8272ad3e2b8f43f21d568d81cc04c148c18bf73d0d17ad5f8
                • Opcode Fuzzy Hash: c501ad2a7d8fc6a0ff2833461159c69e332eacf9aa509fd43ae6280243f40c6a
                • Instruction Fuzzy Hash: 10115EB4E0931A9FCB54DFAAD9427AEBBF6FB45300F1482AAD418E3341D7384641DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d260cad9d6c25c7f62c0d7bb2bf058c858bccb88fc41c7c4c30c3c18a2057d6f
                • Instruction ID: 26e35efdda30d5d82ece3aad509641a326b797dbdced75c871ad6c8e24046500
                • Opcode Fuzzy Hash: d260cad9d6c25c7f62c0d7bb2bf058c858bccb88fc41c7c4c30c3c18a2057d6f
                • Instruction Fuzzy Hash: 9421E278845698CFDB01EF98D1487ADFBF1FB49314F1490AAD919AF259D3786888CF80
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a1fca04af4eb05794e8905f645b6efc17bcd513ae47afe16cdc36f1c1d0e1f95
                • Instruction ID: 1aa16d56ecd6bf8e691abfbd51de20e32e596587f6342090f0b25ebb6d52149d
                • Opcode Fuzzy Hash: a1fca04af4eb05794e8905f645b6efc17bcd513ae47afe16cdc36f1c1d0e1f95
                • Instruction Fuzzy Hash: E6112834A04268CFDB41EF64E84479DBBF1FB46341F5484E6D409AB655CB389E95CF00
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5487cf78e345fb849b6ee7c41853e44a393f06309a105bf3a17a7e6bfe404d9a
                • Instruction ID: d06cf4cff098905f047bbc9d13f0f2051951778ad81514a38ac21584832002a0
                • Opcode Fuzzy Hash: 5487cf78e345fb849b6ee7c41853e44a393f06309a105bf3a17a7e6bfe404d9a
                • Instruction Fuzzy Hash: 7701F1317182508FD705963968487BA7BA3EBC5200F1880BAD24EDB29BCA740C4BCB01
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 789bdd125a5d7e2160a350e2dbde87ef8f7d571dd178f2d184a96f77ef1ee238
                • Instruction ID: 1c207572ccbc262c6b6f6f13c7eeb267699ffeeec5026dba063da8ed1aa1dc93
                • Opcode Fuzzy Hash: 789bdd125a5d7e2160a350e2dbde87ef8f7d571dd178f2d184a96f77ef1ee238
                • Instruction Fuzzy Hash: F621E874A112288FDBA0DF28C856BDAB7F1BF0A301F1081EAE94DA7250DB345E85CF41
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a3716683a7e1105fee2f6dc31f7ef2b328c5fef354bdb54c86aa53599f1d0795
                • Instruction ID: 415ba3d4f4f3036a0031397ea4fe0f867318d7a7a883387fb04c617ea91beb66
                • Opcode Fuzzy Hash: a3716683a7e1105fee2f6dc31f7ef2b328c5fef354bdb54c86aa53599f1d0795
                • Instruction Fuzzy Hash: 1511F3B4E0020A9FCB48EFA9C9457AFBBF5FF88300F10856A9518A7350DB345A419B91
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0cb3bf85ce78c59f355b0c074f32f1ca38b64a93617c53924afd6d49feb35748
                • Instruction ID: a86ce9c8024e765c0c1cca9d34228ce9e1392efa8e01e51ded0e9268bac419de
                • Opcode Fuzzy Hash: 0cb3bf85ce78c59f355b0c074f32f1ca38b64a93617c53924afd6d49feb35748
                • Instruction Fuzzy Hash: 3B115AB2901269DFDB15CF14CC44BD9BBB6BB09310F0882E6D508DB292D3309A81CF50
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cf3921d3d80d27b33aa1c032949ee1c4dab6f694f9ba2db15256a0477dc36c8b
                • Instruction ID: c22c09654d2032b594c30f24efdbc91da4dab379a75cd45674d0aea928dc0c46
                • Opcode Fuzzy Hash: cf3921d3d80d27b33aa1c032949ee1c4dab6f694f9ba2db15256a0477dc36c8b
                • Instruction Fuzzy Hash: B211CC74908228CFEB04DF6EE987FEDBBF6AB8A310F049065E408A7241CB744880CF10
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1cfb03e2e52c164cf84bfaeb3c9218606677d3060006695ec19dd24b1aa72f74
                • Instruction ID: fae00f6c1b6f3235e5e0e6b83e2a2dd01717095a9e8c20940c3fbe456a71f174
                • Opcode Fuzzy Hash: 1cfb03e2e52c164cf84bfaeb3c9218606677d3060006695ec19dd24b1aa72f74
                • Instruction Fuzzy Hash: 09019E357006089FC7299A24C449A2A77B3ABCA320F148E2CE9564B790CB79EC02DB80
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a7d0ebf5b541655481743e5c7e878df605fa1bcd9b44980f3d62180be9c57a00
                • Instruction ID: f869f4247a9522838323c9c495828cbea87975d1a4adbb01d2905b290c331011
                • Opcode Fuzzy Hash: a7d0ebf5b541655481743e5c7e878df605fa1bcd9b44980f3d62180be9c57a00
                • Instruction Fuzzy Hash: D2019E357006489FC729DB64C45AF3A77E2AF89311F048D6DE55A8B6A1CB79EC02DB80
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5f872695dbba3732cb563c13094fd3369542cf4b50ea85b2f861bb1732a3d8e1
                • Instruction ID: 2eeea8d74a7ed4cd5fb3d583944858b16c36c0779850da1709f53a223f6c9710
                • Opcode Fuzzy Hash: 5f872695dbba3732cb563c13094fd3369542cf4b50ea85b2f861bb1732a3d8e1
                • Instruction Fuzzy Hash: 4D018F793005159FC704AB28D855A2ABBA2EFC8B11B10886AE90A87391DF71EC12CB85
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 92f82a0ed52ff3b4a09fccffac9dd61ce3f02e5047d4c98956ce03cffaf76e18
                • Instruction ID: a669db7ab1be26bb9a755002836b2d2cfc0bdd2e22fa781c3fab39f5a3d27bd7
                • Opcode Fuzzy Hash: 92f82a0ed52ff3b4a09fccffac9dd61ce3f02e5047d4c98956ce03cffaf76e18
                • Instruction Fuzzy Hash: 43F0E2723095058FD7268F1CEC92B2577F2AF46705F450476F900CB359C5649C828B98
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a34253f4cdd27ca0fbde13bdc27aa6260eeb80f9d2a3975f25d6554891ec95dd
                • Instruction ID: 8e9603412f77f460c6dabc5aa8c0b59b8d6b6d3fbc099b5cb9db07493010cb1d
                • Opcode Fuzzy Hash: a34253f4cdd27ca0fbde13bdc27aa6260eeb80f9d2a3975f25d6554891ec95dd
                • Instruction Fuzzy Hash: D601A235A0121D9BCF08DB58D95AAEEB7B2BB89300F108469D501B7351DB751D00CBA5
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 374dfa75081ca905a37ed489e8bf93583ce18e3a916d9f79b34838c318c1a322
                • Instruction ID: 8cc3712b433b202d242af2c5892281bc75548ee11b3a04056ae684742d8c1e66
                • Opcode Fuzzy Hash: 374dfa75081ca905a37ed489e8bf93583ce18e3a916d9f79b34838c318c1a322
                • Instruction Fuzzy Hash: 060181753005149FC704AB29D455A2ABBA3FFCCB11B108529E90A87390DF71EC02CBC1
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: af900fe5e84a225800b866836806439e3dc93939ef4f3162a6f92feed582c5aa
                • Instruction ID: afa636511ceb226eabb6cbbaa6c7fb1802b03cfc5171d04dac8f7ec3b2963f81
                • Opcode Fuzzy Hash: af900fe5e84a225800b866836806439e3dc93939ef4f3162a6f92feed582c5aa
                • Instruction Fuzzy Hash: 99F0F672F097115FE305D658984672AB7E5BF89310F184866E546EB381DA71AC41C790
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be9a255d2a442503a3136ea801bf0636f1fef3eaca5baef129442c70566054da
                • Instruction ID: 90ecb920b083871c3fb0d18793d04c23763b963b5e15ce46c23f1f86deef79d5
                • Opcode Fuzzy Hash: be9a255d2a442503a3136ea801bf0636f1fef3eaca5baef129442c70566054da
                • Instruction Fuzzy Hash: A9F02B77B004089FCB159B1CD889E6DB3A6EF84311B058066ED16D73A1DE349D278791
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1ceba93522324ee114e1b331602a3394711d6a6deb05075cea3caf63b1341e28
                • Instruction ID: 4599180523b5658c1b0807f707412dc02748fe02437bf232b8c476facc967d8a
                • Opcode Fuzzy Hash: 1ceba93522324ee114e1b331602a3394711d6a6deb05075cea3caf63b1341e28
                • Instruction Fuzzy Hash: C0F02B63B0E3515FF312563818163257FA1ABD5200F1848DAD4869F2A2E9569C02C380
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1cb7781d889d7170478e3032c2adc8da7ae7feb4b0992064197909536a07c6a1
                • Instruction ID: 7dde300aef0085f1237d38ad553a12c267fa42b4ffe95f6153fb5997e0835ad1
                • Opcode Fuzzy Hash: 1cb7781d889d7170478e3032c2adc8da7ae7feb4b0992064197909536a07c6a1
                • Instruction Fuzzy Hash: 37F0C8713002069BC720DF18DC81F9AF7AAEF80314F10892BF91687651CB74E9588750
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e69f42fe8f0395b6a2f26a2ab535576c61f7eece5a427343c6796448a3f31ac2
                • Instruction ID: 3e698a56307ce7d83ab19fc90e27de09c6de6e09496a38e8adaa1c6a1607cf39
                • Opcode Fuzzy Hash: e69f42fe8f0395b6a2f26a2ab535576c61f7eece5a427343c6796448a3f31ac2
                • Instruction Fuzzy Hash: 01F0E972F053155FE3159619980572FFBA9FBC8710F144869E54AAB341DB71AC41C3C4
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 750d731dc3d0b73e37c7da81f571df3b6ed27d11a1d0f88cb02520d54803576f
                • Instruction ID: 823ac62abc1630379e5e8bad4e2779edc715dda5c2e2691d2ec541cd0c3346fc
                • Opcode Fuzzy Hash: 750d731dc3d0b73e37c7da81f571df3b6ed27d11a1d0f88cb02520d54803576f
                • Instruction Fuzzy Hash: 8C01D135924378CFC711DFACA9497A9BBB1FB08600F0582EAD80D97606D3740A48CBC1
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 442903938de0fafc75a6ae9f74fdbc570f394fce783114371264a5261f2140af
                • Instruction ID: 8c8ee4d32ba9cbe5fed5374765e818d87e8006e8cc9a3a6af6eb5f91f3875c89
                • Opcode Fuzzy Hash: 442903938de0fafc75a6ae9f74fdbc570f394fce783114371264a5261f2140af
                • Instruction Fuzzy Hash: FC018F71C0020ADBCF01DFA4C844AEDBB75FF89314F04C25AE94467251D7319592CF90
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 23bc5f700781ec02ab45383a6c9bf21a26392f2883e6a9495f12716dc903294f
                • Instruction ID: a7a479a06db479621b3490e7032e52db59d9c9f1cf91caa9d0789b3b6d055581
                • Opcode Fuzzy Hash: 23bc5f700781ec02ab45383a6c9bf21a26392f2883e6a9495f12716dc903294f
                • Instruction Fuzzy Hash: 8B117E749442A9CFDB60DF48D984BECBBF1BB08308F4441EAD808AB255D775AE85DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6286ba4479f086acfa1f08d076e36d4fb21193e7d3c8e783e410502f9439cfa
                • Instruction ID: a2194f3af10e04c6dd36a4bd5d3f3e752350186c818f2b212b30e9dcd5dc1457
                • Opcode Fuzzy Hash: c6286ba4479f086acfa1f08d076e36d4fb21193e7d3c8e783e410502f9439cfa
                • Instruction Fuzzy Hash: B9F02E35A09118DBCB00EFA0D8427ADBBB8DF41314F1481D6DC085B3A1CF355911DF41
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eb4936510329af8a2334e7647c6a37276b764dc537afc79a0c5ebde759cff504
                • Instruction ID: aa97db3ffe2477be203055dfb57ec761634ff0b0be7cf28f3ad7cc423ee53870
                • Opcode Fuzzy Hash: eb4936510329af8a2334e7647c6a37276b764dc537afc79a0c5ebde759cff504
                • Instruction Fuzzy Hash: CF012C74D0D298DFCB04CFADD48ABA8BBB1FB06314F1440B5D41A9B16AD7365945DF00
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57fe0425e40f691ea3f5a660b47578670696921645f4ead92f4292bf299c7923
                • Instruction ID: b7aaba8ee476f6ebaeb72921015a1be9bf5b09083db43119ed2c83b960972dfb
                • Opcode Fuzzy Hash: 57fe0425e40f691ea3f5a660b47578670696921645f4ead92f4292bf299c7923
                • Instruction Fuzzy Hash: 64F0673A3042409FC702CF2DE884E5A7BE9BF9962271544BAF906C7361CA30D814CB50
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a4ee92379df6ef75e2c085545b6de7fdaf87c2521cce7f0df6cd596641e911df
                • Instruction ID: e1a4aa2c866e40f371ba66bae7aa9ef01e8a40c8af51b2024ab8735bade3fbe2
                • Opcode Fuzzy Hash: a4ee92379df6ef75e2c085545b6de7fdaf87c2521cce7f0df6cd596641e911df
                • Instruction Fuzzy Hash: ECF049393102009FD305CF1CD855E2A77A6EF88721B1544AAF646CB3A1CE31EC52CB40
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 661de3e0845c7204866d47c5dd63548d8b8af292e5c09fcb6c78bafb9aa1767d
                • Instruction ID: d835a94e9dbfa574b9c96f8bc93746b870b604a3a557ef1d9f2446bc00c2a4a1
                • Opcode Fuzzy Hash: 661de3e0845c7204866d47c5dd63548d8b8af292e5c09fcb6c78bafb9aa1767d
                • Instruction Fuzzy Hash: 3FF0B434509118DBCB00EBA0D8417A8BBB9EF82314F1492D4CC445B361CB315A45DB44
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee344a4bc7bb05f3d63469123d0382eacbe5c61434e28f5484118be155669b96
                • Instruction ID: 58a840758cc5ab72751ca4e499730a415c354d01ae29c5d5c56d2c209f5f43ac
                • Opcode Fuzzy Hash: ee344a4bc7bb05f3d63469123d0382eacbe5c61434e28f5484118be155669b96
                • Instruction Fuzzy Hash: 0AF06DB4D08208EFCB40DFA8D946BADBBF4FB08201F0081D5E808A7750D6349A00DF41
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 049bcba3ecf5c2449dddd006e1bb507cb80dcf6899749ecdadbb8081f2ff0a3e
                • Instruction ID: 79acbaf15a8016eab82e87715d7ccff2468d11d5bd10060b7513066cc61ba0af
                • Opcode Fuzzy Hash: 049bcba3ecf5c2449dddd006e1bb507cb80dcf6899749ecdadbb8081f2ff0a3e
                • Instruction Fuzzy Hash: D3F03A353102009FC3049B19D854D3A77AAEFC9B21B11446AF94ACB360CE31EC42CB90
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a582205fe567e4fcdee6167163f3a7ac3ea5f95b8063edfbc9c0dac0995c0d5a
                • Instruction ID: 5efec5d8d8e3831dc90569804ccb0c8cf94612efbea07c154c5a6cc07fe2adb7
                • Opcode Fuzzy Hash: a582205fe567e4fcdee6167163f3a7ac3ea5f95b8063edfbc9c0dac0995c0d5a
                • Instruction Fuzzy Hash: 4FF03C3180021AEBCF00EF99C8009EEBB79FF89320F00C51AE95877210D731A661DB90
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3321bdcee60f77ba15b3a849f52364bb0b8f0aacd27b51c3c6596b6a9831457d
                • Instruction ID: 456f5eec3dbf5740dac4adaf1bba258bcb6a8824e8d7bc18d0f5b6102a5d8c9d
                • Opcode Fuzzy Hash: 3321bdcee60f77ba15b3a849f52364bb0b8f0aacd27b51c3c6596b6a9831457d
                • Instruction Fuzzy Hash: 73F0B23A6500149FCB468F98E946E507BA2FF1822171688D6F2088B272C332D826EB54
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be7b73299b84ffb1a78e8ba706a5acc0462454b9ae443d2fffbfcaef59de68f7
                • Instruction ID: 3bde118f57a726649e4f8690f154257f7a834261eeb6a74a5c93a76e5763ef0d
                • Opcode Fuzzy Hash: be7b73299b84ffb1a78e8ba706a5acc0462454b9ae443d2fffbfcaef59de68f7
                • Instruction Fuzzy Hash: 32012C3490426ACBCB60DF14D840BE9B771FF45314F1082D5E898A7254DB75AAC5DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a9b9cdb575413ad76635038f3672adca9a5e7daec604faab89f4cfcc47d7023
                • Instruction ID: d782caf6788060d755daef9404e705e97df245da8b6a4b10a43e1bbb3d35b041
                • Opcode Fuzzy Hash: 9a9b9cdb575413ad76635038f3672adca9a5e7daec604faab89f4cfcc47d7023
                • Instruction Fuzzy Hash: B101C4749002A9CFCB64DF18D994BDCBBB1BB48304F4445EAD809AB355DB35AE85CF01
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 48113de6b5eafadbcc0032c894c905033073438ce1d86e9aea9d50a2cc21f29d
                • Instruction ID: 11c0c65dbe4c6f5ef08777e4378bada826c15f8933fcaa89197b439d8e659174
                • Opcode Fuzzy Hash: 48113de6b5eafadbcc0032c894c905033073438ce1d86e9aea9d50a2cc21f29d
                • Instruction Fuzzy Hash: B8F01E2124E3E00FC70327B82CB44A83F708C8B10030E02EBE4CACB1E3C649180ACB63
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 46d2227314ec670a86ebfcb2b74ce09ac63e880f90184eaeb88f87bb8eaaf647
                • Instruction ID: 08b3572bd123c91b910ed9a81e666b45544cc4e6bf853701f514830626e4814b
                • Opcode Fuzzy Hash: 46d2227314ec670a86ebfcb2b74ce09ac63e880f90184eaeb88f87bb8eaaf647
                • Instruction Fuzzy Hash: 5CE0923640C6809FD7069B1DDD8A7497F709F52B54F0540E6D580CF15BD2248D60CB49
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b4e81c4492ec6db5efc6fcdd242d1fca80fde884d3518f39b1b401016b554b62
                • Instruction ID: 06e193f137c5452d9f30ff8e9af67bf4cb33e4ba05fbcf72b210a1353076d25a
                • Opcode Fuzzy Hash: b4e81c4492ec6db5efc6fcdd242d1fca80fde884d3518f39b1b401016b554b62
                • Instruction Fuzzy Hash: 09F09674D04284EFCB40DBB8D4557ACBFB0FF06205F0481D9D89497392D2344911DF01
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 072ae5758d76bbd15c68c141e8b872460cb42997be2e4f54ee4f88ee88d82ffd
                • Instruction ID: 8fbd85b1b5859ed499e8b5694d10c8619fea7acd46942aa09e5ab4597cf1758a
                • Opcode Fuzzy Hash: 072ae5758d76bbd15c68c141e8b872460cb42997be2e4f54ee4f88ee88d82ffd
                • Instruction Fuzzy Hash: 84F0E5713006069BC711DB1DED88E4ABBA7EFC0324B248D76B50AC7A15CE34EC978780
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bc3b69eb2c5c543b99f3e2ee8d76ebfd8720179749dcd664f9e4ddf40e54806f
                • Instruction ID: 576abdcd66394f5ca7f6f231435b5de7f53b89ed41dbe7a0c37a05f0060393fe
                • Opcode Fuzzy Hash: bc3b69eb2c5c543b99f3e2ee8d76ebfd8720179749dcd664f9e4ddf40e54806f
                • Instruction Fuzzy Hash: 40F03475C05208AFCF00DFA4D981AECBFB5EB49314F1082A9EC446B391D7769A22EF41
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7b1f931ab24c9d382dde5b802430d276221317ef41d1b642a4d7e761321c9678
                • Instruction ID: a77847724bd5ebf9d7bd80afa3547cbf09879e9643e461e962e1d975c5d4bcaf
                • Opcode Fuzzy Hash: 7b1f931ab24c9d382dde5b802430d276221317ef41d1b642a4d7e761321c9678
                • Instruction Fuzzy Hash: 670160B4A442688FDB64DF24DC85ADABBB1EB49301F5081E9AC09A3385DB345E85DF11
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 98e86b94947077de810654d4f4f5281bc06078e9b1b300dc888f324cd064dfac
                • Instruction ID: 2b9aac3eaea578bf0ce5eb8911500bbf9e8ffe542bd141d67c09bd7f5e01a31f
                • Opcode Fuzzy Hash: 98e86b94947077de810654d4f4f5281bc06078e9b1b300dc888f324cd064dfac
                • Instruction Fuzzy Hash: 0AF09C715082849FCB41CF68C841AA9BFF4BB06310B1481DAE9A497292C6354601DB11
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a001f0846532121b9c8280aa4dbb17bb15f933c79b3f57295fc0afff6266e869
                • Instruction ID: e1230d45d1689474d5a1f9f8b607975a6a107f2b893bf586c88cb4837f729236
                • Opcode Fuzzy Hash: a001f0846532121b9c8280aa4dbb17bb15f933c79b3f57295fc0afff6266e869
                • Instruction Fuzzy Hash: ECF08231A146049FDB15CF58D499BDCBFB2EB44315F15C49AE006D32A1DB300A81CB84
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 83e108cab18541fb954dc077ddfed21c3372766d4388769d18d38a3675a1d097
                • Instruction ID: 5c77b29177c902c7a17e3ebff0e2fc626756dac1752ffc28750b4cbe2ff7e80b
                • Opcode Fuzzy Hash: 83e108cab18541fb954dc077ddfed21c3372766d4388769d18d38a3675a1d097
                • Instruction Fuzzy Hash: E0F0E2B290A3849FC702DB68DD917D93FB1EF46304F2505DAE048CB293D13A5E069711
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f62f1837bbd28897fcd71c844437d9ab70a1365d7c258ff3fa6bbc67f6d930e9
                • Instruction ID: 2da04eaeae899d3bd56af1d753f39cfa474844bdbde8202d51e606f4d1b3fbad
                • Opcode Fuzzy Hash: f62f1837bbd28897fcd71c844437d9ab70a1365d7c258ff3fa6bbc67f6d930e9
                • Instruction Fuzzy Hash: A7F05875808108EBCF05CFA0D986AECBF36EB19310F148199EC046B251D2368A62EB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9a9eb61d92f21715e06e00434404d7cd1706bd93b0863396fab800c7930a5ae1
                • Instruction ID: bd0d837434dc3ae8227605db28746c748b184d01d35bf78d9d118d354429255e
                • Opcode Fuzzy Hash: 9a9eb61d92f21715e06e00434404d7cd1706bd93b0863396fab800c7930a5ae1
                • Instruction Fuzzy Hash: B701AF759022288FDB20DF14D994BDABBF6FB09304F0041E6E908E7285C779AE84CF10
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 45a70fef6409bc0f9ff6e770646fbc8615fb20af1d3e687e385b5c8d67ea51b8
                • Instruction ID: 36f86f46c920cce6d987365f39b22a8066767869929040bd32ac89586376c385
                • Opcode Fuzzy Hash: 45a70fef6409bc0f9ff6e770646fbc8615fb20af1d3e687e385b5c8d67ea51b8
                • Instruction Fuzzy Hash: DCF01774904148ABCB15CFA4C885BACBFB1EB49210F1481D9EC845A211C6368A52EF81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c0a3b245b7738f0fc06e7120d7b5b96916b681d50111ec1c828b50665005baa2
                • Instruction ID: bc2ae8b1d6c6b4fca520d75619c5af993b194b4705cd0ea39d29b277aa9d76fe
                • Opcode Fuzzy Hash: c0a3b245b7738f0fc06e7120d7b5b96916b681d50111ec1c828b50665005baa2
                • Instruction Fuzzy Hash: D4F0827180911CAFCF11CFA4D981AECBF75EB1A310F1481D9ED456B392D2368D62EB41
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 35a8907cfbafc535e67ccfe8e8285dfe01ea714d11c9e3f76f45363169154631
                • Instruction ID: d53abdc60725214aa90a8f55df917b3e263b3c9662dff2ed8d076f9b8005a940
                • Opcode Fuzzy Hash: 35a8907cfbafc535e67ccfe8e8285dfe01ea714d11c9e3f76f45363169154631
                • Instruction Fuzzy Hash: 68F05870904208AFCB80DFA8C841AADBFF8AB49300F04C0AAA868D7740C6399A11DF50
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e3122fe366fdb5aee34886c0579670cc36c5b7ec6450b1040d61cc823a7abec5
                • Instruction ID: 6be63f5d9cf348795710c38b4ea9b10e3189bc3a94a9b399e2faeee08346ab5e
                • Opcode Fuzzy Hash: e3122fe366fdb5aee34886c0579670cc36c5b7ec6450b1040d61cc823a7abec5
                • Instruction Fuzzy Hash: CDF06D31A14618AFDB19CB99E44D6DDBFB7EB84220F15C4A9E40693290DB701A81CBC4
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2ad1404ada9bcb3df3785117d35181e549eb633224ae4c25e1ebd8638795d41b
                • Instruction ID: 0a4a41445c36357041cbd5bcc78db89587e69468562a79570f6d69e6b8a764a1
                • Opcode Fuzzy Hash: 2ad1404ada9bcb3df3785117d35181e549eb633224ae4c25e1ebd8638795d41b
                • Instruction Fuzzy Hash: B6013C74805268CFD721DF29D8587A9BBF1FF06305F5480E5D489DB251CB364A85EF01
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 937141a26f59c1d7f866b41371b1c52b7773b1897534848b855c41bf15f7957e
                • Instruction ID: 96a8bc2d15fba4aae78c0216eae5a3bf63eb949cf84e99b2c1db6ab34300fb81
                • Opcode Fuzzy Hash: 937141a26f59c1d7f866b41371b1c52b7773b1897534848b855c41bf15f7957e
                • Instruction Fuzzy Hash: 7EE01A722002065BC710DB1EEC8485BFB9BEFD0764724CE3AB50A87625DE74ED568690
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 503bea39df663cd05233f8612b10dc5935492f2374ddd1fa3a7efe77bdc66f21
                • Instruction ID: c5ca5b3639695f77a8d875bff497c96b7bdbd44645f4ceab8d19f791859cab35
                • Opcode Fuzzy Hash: 503bea39df663cd05233f8612b10dc5935492f2374ddd1fa3a7efe77bdc66f21
                • Instruction Fuzzy Hash: A0E09234948218DBC700DF94DD4175CBBB8FB45315F508198CC445B382CB359D02DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fcfc7e9ef4568b9213878536b83b9d61a09f39f71997e48e6d0342838d3397f0
                • Instruction ID: a3545aa60ebf9624e42c7789ed330e0309c64a9cdc4763fa1d9b3fe474b5c038
                • Opcode Fuzzy Hash: fcfc7e9ef4568b9213878536b83b9d61a09f39f71997e48e6d0342838d3397f0
                • Instruction Fuzzy Hash: E5F0E734904229CFCB60DF14D894BE8BBF1BB05308F0440EAD84CAB251D7769E81DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0115550b85efb0e10b4c96c61805734f80d7252ed6b8e35188d19bec7c1adf37
                • Instruction ID: b79ba99a98113b2a139e8e8ca9eaded76a1b5fa6afe6db3c5952246914a06ee0
                • Opcode Fuzzy Hash: 0115550b85efb0e10b4c96c61805734f80d7252ed6b8e35188d19bec7c1adf37
                • Instruction Fuzzy Hash: 66E06D70804218ABCB00DB94D9923ACFBF9EB45205F14C1EA9C8497380C7399A09EB96
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9fe6c34787f1ad0bd21e95c01f56876e234ca498183a1546c1e0b66827d53b77
                • Instruction ID: ebd62317e7b032510439ead4ada90eeff5c847e2a57b7fcb3d604c5afdc2b0a7
                • Opcode Fuzzy Hash: 9fe6c34787f1ad0bd21e95c01f56876e234ca498183a1546c1e0b66827d53b77
                • Instruction Fuzzy Hash: BAF039759002289FCF128F90D819BEEBB72FB4E305F209245E912BB295C7384984DF55
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: de961369d0dd8365bdc47ed45ca0a5cc9f771da90649d4a3b38a26f16718c97d
                • Instruction ID: b239cb4639b364e0c7253cf1656fa0b5ac26df73f2d95fb60a562211e7e91fdc
                • Opcode Fuzzy Hash: de961369d0dd8365bdc47ed45ca0a5cc9f771da90649d4a3b38a26f16718c97d
                • Instruction Fuzzy Hash: 26F085748151A89FCB40EFACD989BE87FB4AB09211F1000AAC88497362C2308942CF10
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 25be0b5850ad09d72586dc632f46e6a569e79ead8c4bd022330f5db1a2d5c33b
                • Instruction ID: d1d53a2907032d729af0020aef6f2231f95187d8207bb8f949e71519fb401b0b
                • Opcode Fuzzy Hash: 25be0b5850ad09d72586dc632f46e6a569e79ead8c4bd022330f5db1a2d5c33b
                • Instruction Fuzzy Hash: 85F0A774809148AFCB02DF68D491AECBF70EF49311F14C1EAD89453352C6354A12EF05
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c49d5bab0f2c436846da5b2b9f7844ad8175d3721018a0c699a85cc273c71ce
                • Instruction ID: 467226afa8d7be66e0aa5f45a2eba251165528a4453d7b9ce281e23eb8b5f201
                • Opcode Fuzzy Hash: 7c49d5bab0f2c436846da5b2b9f7844ad8175d3721018a0c699a85cc273c71ce
                • Instruction Fuzzy Hash: 79F03074D04208AFCB40EFA8D4466ACBBF4FB49701F0081D9D855A7391D6349A10DF41
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ab1eb1e70f8567df8fd0242d554eee74f2967fc29dbf66999b6899b9db971209
                • Instruction ID: bdca96ccdf164994656e23a853d76acbb04918c9eb14e1e2b25dc575ab7d36df
                • Opcode Fuzzy Hash: ab1eb1e70f8567df8fd0242d554eee74f2967fc29dbf66999b6899b9db971209
                • Instruction Fuzzy Hash: DCF08C749082849FCB44DFBCD485AECBFB4FF09205F1000EAC4849B762C2318901CF01
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 59392ac3c93477bb5f480bbbbd4011a2e0cb2f125aa31dfee0fc700c4d92b388
                • Instruction ID: 75dcab23d0e3a70cc5525a50da0439f6e4928519e10f901bd7f52d880f664c09
                • Opcode Fuzzy Hash: 59392ac3c93477bb5f480bbbbd4011a2e0cb2f125aa31dfee0fc700c4d92b388
                • Instruction Fuzzy Hash: B4E0D874909208ABC705EF54DD817ADBFB5EF46304F1482E9DC086B341CB359D86DB41
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 002fcfc6bda0559ce43e6586baf906155d3bd03898b044865c06c46dfb0da5ab
                • Instruction ID: af43854ac55fd82e06e408e4aeb8306f787fcaa61b9d945e2271743bdb913fa7
                • Opcode Fuzzy Hash: 002fcfc6bda0559ce43e6586baf906155d3bd03898b044865c06c46dfb0da5ab
                • Instruction Fuzzy Hash: 07F0307090D294DFCB12DB6495915ACBFB49F47214F1845DDC88457252C6355906DB42
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: deb46e5e7b29118e7c68d2d8c428e18ae65b730272aa604ad0cda1acb9722099
                • Instruction ID: dfae53cd1459db059841ff8cb5b535e49669c6552d959a661a11ff612befb4a7
                • Opcode Fuzzy Hash: deb46e5e7b29118e7c68d2d8c428e18ae65b730272aa604ad0cda1acb9722099
                • Instruction Fuzzy Hash: FAF01574D04218EFCB40EFA8C941A9CBBB4FF48311F10C1AAA808A3350D6359A55DF80
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c919432f01db37e8b5f4466a90e460e22b842c3d6f8c08cb179965d9831df69e
                • Instruction ID: 2cd3a7cd6c05017f01c5f30efd1493e94d3bdf1a45278b33abd70cae3e4b0a45
                • Opcode Fuzzy Hash: c919432f01db37e8b5f4466a90e460e22b842c3d6f8c08cb179965d9831df69e
                • Instruction Fuzzy Hash: EAF08C38620328CFC710EB5CEA4C7B473B2EB44311F5142E5C80D8B20AE3341D88DB40
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6b80976d1e3ec9977f3c354bed0f742c8a65e57bcf24766c1f3cf0ae8202391
                • Instruction ID: b3b23f7c899501a2f16890263266493b3c2a1779f5095c8db923e8774753a090
                • Opcode Fuzzy Hash: a6b80976d1e3ec9977f3c354bed0f742c8a65e57bcf24766c1f3cf0ae8202391
                • Instruction Fuzzy Hash: 74E092B4804208EBCB00DF58D985BADBBB8FB45311F1481A9E84467351D7319A12EB84
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a2f2dbae91867dd2b22b279d55a3aa25534d1f284408342a44449dd1fb9802ae
                • Instruction ID: 1db3d788c708f0185d85870591b948299210f2f969102af8d177a1e56caf55de
                • Opcode Fuzzy Hash: a2f2dbae91867dd2b22b279d55a3aa25534d1f284408342a44449dd1fb9802ae
                • Instruction Fuzzy Hash: 15E086313053095BCF14B6A5684EB6232996B45E10F110CA596059F390D972EC42C751
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 71bffe30379c7462743859bbe59905408d46ae668c1f1fa01b80333e11654dc1
                • Instruction ID: 6e24024f055bd4f83ee4b56e70615ffcb131444c3dad96e3dfe14654edb43914
                • Opcode Fuzzy Hash: 71bffe30379c7462743859bbe59905408d46ae668c1f1fa01b80333e11654dc1
                • Instruction Fuzzy Hash: F4F03974804208EFCF00DF94C944AACBBB9EB48310F14C19AEC9456350C6369A11EF80
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 03914bfb22f1e10ccfe292e6d64598b25c41c7a41f1bbee5bbc89320271f4bf2
                • Instruction ID: 4c6858ba7f065d148513a5b18b610f67fc47ce68d71331147f29144926d8f7db
                • Opcode Fuzzy Hash: 03914bfb22f1e10ccfe292e6d64598b25c41c7a41f1bbee5bbc89320271f4bf2
                • Instruction Fuzzy Hash: 63E0653480420CEBCF01DF94D981AADBB7AFB48304F108199EC042B360C7329A61EB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e5a57565b59a50d89a6b3335114b15495d069b18e3fd8397e729814d3c78382d
                • Instruction ID: 173c581147cf2d0dac42efb250e90dfd28f92ea5f3bfc9daab1c235f831c21c9
                • Opcode Fuzzy Hash: e5a57565b59a50d89a6b3335114b15495d069b18e3fd8397e729814d3c78382d
                • Instruction Fuzzy Hash: CCE09234905148EFC751EBB8DA85BF8BFF8AF49204F1C40E9D84897342E6315A45CBC1
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0cfc09c43a26a0acf8a2dd24fb365e59dd862d1f0820fd6ac45878c966f46b1b
                • Instruction ID: c9a679705ba2963d27e8297102d263788dee64497d59c06691b869dade8b3029
                • Opcode Fuzzy Hash: 0cfc09c43a26a0acf8a2dd24fb365e59dd862d1f0820fd6ac45878c966f46b1b
                • Instruction Fuzzy Hash: 71F01534905208DFC710DBA8D948BA8BBB8FB49305F1841EAD8885B362C7345A45DB80
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 418f0da77ddb2f6d93162383d75aba73bb23a3f8cf6cd8d68827a717442b532c
                • Instruction ID: 9fe58ff0278dd8b61bdb86549843f3b37d6c95d342ac55fbb8557b2f86979971
                • Opcode Fuzzy Hash: 418f0da77ddb2f6d93162383d75aba73bb23a3f8cf6cd8d68827a717442b532c
                • Instruction Fuzzy Hash: F7E09AB09082089BCB10DBA4D9C97ACBF74EB5A312F6481D9C888AB382C6764D02CB00
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 70ae7f956348be5c82a7c4992566e7d761054ac1c8fee8d2a2872c004fb64a7e
                • Instruction ID: d49c4437d51c0ff00c81c4e00cde51c0d7fdf93b1175232103997835f035378d
                • Opcode Fuzzy Hash: 70ae7f956348be5c82a7c4992566e7d761054ac1c8fee8d2a2872c004fb64a7e
                • Instruction Fuzzy Hash: 0DE09A34809218EFCB04EF98E9417ADBB78FB45304F2082E9D8182B390CB316D12DB95
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e095f6d0b50dd87870ae6a45057d11cef8391634129cde46cbc99c13ca659912
                • Instruction ID: 70c10545cf5a67644601e21c329945791d3a12d9108b40a0c6b185a14d72f1bb
                • Opcode Fuzzy Hash: e095f6d0b50dd87870ae6a45057d11cef8391634129cde46cbc99c13ca659912
                • Instruction Fuzzy Hash: E2E0DFB5D4A208EFCB00DB94E9517ACBB78FB45314F1882E8CC4427382C7719D02CB44
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 08c40d9cb3c835b280fa3397928169fd584b85cc586a3aff9f3d6e2a7db37cef
                • Instruction ID: a27cd0d0122f161b6b50ce2bf16fee02a2aa3061acff990db4b9fb05066a1348
                • Opcode Fuzzy Hash: 08c40d9cb3c835b280fa3397928169fd584b85cc586a3aff9f3d6e2a7db37cef
                • Instruction Fuzzy Hash: AAE03974D04208EFCB40EFA8E984A9DBBF4FB48301F10C1AA9848A3340E6759A01DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 08c40d9cb3c835b280fa3397928169fd584b85cc586a3aff9f3d6e2a7db37cef
                • Instruction ID: 864d5025ebfc0d79bb0d5dd0e58720cd3de4e45a4fc887531f94aa0da807958a
                • Opcode Fuzzy Hash: 08c40d9cb3c835b280fa3397928169fd584b85cc586a3aff9f3d6e2a7db37cef
                • Instruction Fuzzy Hash: A7E03974D04208EFCB80EFA8D940AADBBF4FB48301F10C1AA9848A3340D6369A41DF40
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 08c40d9cb3c835b280fa3397928169fd584b85cc586a3aff9f3d6e2a7db37cef
                • Instruction ID: 5355230ee2cdc1eceff6bdc53096c81faabced55a19e70da012226749e228b83
                • Opcode Fuzzy Hash: 08c40d9cb3c835b280fa3397928169fd584b85cc586a3aff9f3d6e2a7db37cef
                • Instruction Fuzzy Hash: E7E03974D04208EFCB40DFA8C94069DBBF4EB48300F10C1AA9858E7341D6359A01DF85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a29edda59c0875b33c6b599d7ff3407eac1e91fc53eb4236eb7f2820f9c895c8
                • Instruction ID: 369c9d4fbd1dfce533a5861daa96f6d6c959672252197e963b5afc8960cb590f
                • Opcode Fuzzy Hash: a29edda59c0875b33c6b599d7ff3407eac1e91fc53eb4236eb7f2820f9c895c8
                • Instruction Fuzzy Hash: 0FE0DF34A05208DBCB08EF90D9C57ACBB78EB89300F2482ECC8085B780CB354E87DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee70a29283aa62b354da21f091ea05793519547d9b98fb72613a6a89acdee58f
                • Instruction ID: 805c6d41e7c4623a04b11531a6ceae44dc26d1dbb22450afae48c65d73b204dd
                • Opcode Fuzzy Hash: ee70a29283aa62b354da21f091ea05793519547d9b98fb72613a6a89acdee58f
                • Instruction Fuzzy Hash: 91E026B194110CDBC711EFB4D4497AE7BECEB06304F0440E2D908A7191EA350A04EBD7
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c469634d63671eb31ec71309afbae2489074eb2637d27ec7c7de21b3bd50b8ce
                • Instruction ID: 3a3736fe23013ed8b1b0d123ca3f43ae2ef529dde65cc10f126ec5897ce5d6be
                • Opcode Fuzzy Hash: c469634d63671eb31ec71309afbae2489074eb2637d27ec7c7de21b3bd50b8ce
                • Instruction Fuzzy Hash: 17E09270D09114DBCB10DFA4D5C26ACBF70EB56315F1481DDCC451B351D6354D46CB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7017d545375abfabd73c1604a1a463d4dd1c546504070b2f2b0916420601aca4
                • Instruction ID: 75ecf5873d183e68c0a716c94c250707498a3a8019fc25f60bd1febff25c5e3c
                • Opcode Fuzzy Hash: 7017d545375abfabd73c1604a1a463d4dd1c546504070b2f2b0916420601aca4
                • Instruction Fuzzy Hash: 9DE09270D09204DBCB10DF64D9866ACBFB4EB55315F1481DDCC4917392D6368E06CF81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d417f087f858da05ccf3f3637ebd066f1715da9a76434f92174c8bb384838ac1
                • Instruction ID: 45f3b0fc9f28432230eaf846a5db2f596f79f6e5321723a39acb6bd179e4904a
                • Opcode Fuzzy Hash: d417f087f858da05ccf3f3637ebd066f1715da9a76434f92174c8bb384838ac1
                • Instruction Fuzzy Hash: ECE092B0C09258DFCB50DB6495963ECBFB0DB16215F1841D9CC445B382E63A9D06DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c50e325070938c7e2ec76cb29315a3f0aefa5829ab51351f65ef3f90134739ef
                • Instruction ID: c3b413703dfe050c4f73d1559a948c01db13f8f88ff7e514acb6d14bd09cfbbe
                • Opcode Fuzzy Hash: c50e325070938c7e2ec76cb29315a3f0aefa5829ab51351f65ef3f90134739ef
                • Instruction Fuzzy Hash: B2E0ED74D05208EFCB44DFA8D94569DBBF4FB48305F14C1A9D85893340E6759A41DF41
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c50e325070938c7e2ec76cb29315a3f0aefa5829ab51351f65ef3f90134739ef
                • Instruction ID: f13c4217966463ed4775789bb0710e63a01c8b350a4d4d271fc98918f91c5353
                • Opcode Fuzzy Hash: c50e325070938c7e2ec76cb29315a3f0aefa5829ab51351f65ef3f90134739ef
                • Instruction Fuzzy Hash: D8E0ED74D09208EFCB44DFA8D5446DDBBF8EB48305F10C5ABD85893350D6755A01DF41
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fde0936e856a9269a18a844f8bc82de4523d69e0c4213d7e289ad03ca02b9596
                • Instruction ID: 733837863b6eb2b12ce0e4efdb746f87a2d3578b13206ff42b99e1a18aa9da11
                • Opcode Fuzzy Hash: fde0936e856a9269a18a844f8bc82de4523d69e0c4213d7e289ad03ca02b9596
                • Instruction Fuzzy Hash: 9DE012B0D4920C9BD740EFA89A4579D7BB8EB09315F1045A5E88DA3340D6745A40DB45
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 09fc60c82f88f740063e2f8f78b5b13bcc09c189b65e4ca97a69f78367dd8db6
                • Instruction ID: 8c867fcd0bf85bf6bfe116f5c977829d9b7e0bb50c641c5f3055af4a3e1a0b52
                • Opcode Fuzzy Hash: 09fc60c82f88f740063e2f8f78b5b13bcc09c189b65e4ca97a69f78367dd8db6
                • Instruction Fuzzy Hash: 0CE0E570D09208EFCB84EFA8D545AADBBF9FB48300F1081AAD858A2350D6355A91DF85
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 658f89a6a4be80fa1a4ddc6a583fca0bc85edc8b2d30299dceeafc34d4be5eb6
                • Instruction ID: e4e1edb5197118a08b2b6423c860a498c72374a74024d57faa16757ec50fde0e
                • Opcode Fuzzy Hash: 658f89a6a4be80fa1a4ddc6a583fca0bc85edc8b2d30299dceeafc34d4be5eb6
                • Instruction Fuzzy Hash: 3CF0B774E012288FDB60DF68D889B9DB7B6BF49210F1099E6C409B7210DB3449C1CF11
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8af623f31953c348a7252658d23b60f601d01461785ad6c0464cb9d4c2dea966
                • Instruction ID: 48d0bcd31d8b6b9ee60f8776f50eb6a3c66afea34b44c589ecf85afbb7514004
                • Opcode Fuzzy Hash: 8af623f31953c348a7252658d23b60f601d01461785ad6c0464cb9d4c2dea966
                • Instruction Fuzzy Hash: 23E06D70C09298AFCB51EF78E8867ECBFB5AB09215F1441E5C88996352D6304655DF11
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b8df84316d6b6f7b9e37dc598e1e4bc42447b0f9bb5bd5cdc80b278978171b4a
                • Instruction ID: 68a0bab4e1aca52f50cbc754cf7d47587fec83025a2d50c64c39680cbfdbd5c5
                • Opcode Fuzzy Hash: b8df84316d6b6f7b9e37dc598e1e4bc42447b0f9bb5bd5cdc80b278978171b4a
                • Instruction Fuzzy Hash: 37E0D870809298DFC741DF64D955378BFB4AB06205F0441DEDC949F781D7394E81DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ed29f91d3af7aebfd6de6f0696a06df9f7d43d74787e59fa5f3f69ea26f5cd35
                • Instruction ID: 18c2f16d69ea267739ea0db520da929e7a759d6859860a273a2422224605d079
                • Opcode Fuzzy Hash: ed29f91d3af7aebfd6de6f0696a06df9f7d43d74787e59fa5f3f69ea26f5cd35
                • Instruction Fuzzy Hash: 25E026B4808218EBC700DF94D940AEDBFBCAB45302F10C199E88457340C6319A02DB94
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 92c3096687158d02b03a6b407bb16f1fd1eaa277e2cbe88949f015eb55889a55
                • Instruction ID: 0eb384a7c4759d56b73ccbefde37481745f9b5946f8448e93fbf0f77160e8b77
                • Opcode Fuzzy Hash: 92c3096687158d02b03a6b407bb16f1fd1eaa277e2cbe88949f015eb55889a55
                • Instruction Fuzzy Hash: AAE09A74C09208EFCB01DFA8C985AECFBB8EB48301F10C1AADC4463340CA359A01EF85
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 64f2598c915010811499c3e3ce94f6462bdabb674c42035384895a8d35e8e30d
                • Instruction ID: f9cc1bbfd20dfefa465c7446bd59c022b84be14e1d6a071cbcd6f22d04bf70bb
                • Opcode Fuzzy Hash: 64f2598c915010811499c3e3ce94f6462bdabb674c42035384895a8d35e8e30d
                • Instruction Fuzzy Hash: C9F0B274A04329DFDB60DF18D989B9ABBB5FB06301F1046D5E449A2250CB345ED98F02
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b3d82eb36baaac804087a3ef50b5c6ba40710c6e359b3f8667f5cc1c164ab57e
                • Instruction ID: 9a1b8b93626b25c6f1a3b23e361953a7682ae2f18e33903f998e324f96c86930
                • Opcode Fuzzy Hash: b3d82eb36baaac804087a3ef50b5c6ba40710c6e359b3f8667f5cc1c164ab57e
                • Instruction Fuzzy Hash: 2DE01A70D05208EFCB54EFA8D5456ACBBF9BB44300F1081A9D858A3340D7345A40DF45
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 998f966eb2b4fda7f753f7f320b3bb43dc384c2b9762a964526ad741b97690bd
                • Instruction ID: a852b13cbf6556be13f69cd747a0e088d22e29bf22f43f545384870e1e97a81b
                • Opcode Fuzzy Hash: 998f966eb2b4fda7f753f7f320b3bb43dc384c2b9762a964526ad741b97690bd
                • Instruction Fuzzy Hash: A2E04F71A10104DFCB40DFA8EA51BAE77B1EF48305F208968E409DB241DA756E11EB40
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ad578a2c6fcaee9edf27a2fca083296b000175c032e859e49c9b988a856931e
                • Instruction ID: 952c6e5f55094f7c268b923f67e8fd8e27a2d52644577b97626b8343749404fc
                • Opcode Fuzzy Hash: 6ad578a2c6fcaee9edf27a2fca083296b000175c032e859e49c9b988a856931e
                • Instruction Fuzzy Hash: CBE0C2767100048B8714EF4AE8414AEF7A2EFCC612710C43AF90AC3340CF318D2A9B90
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: be99e31bffd1c8f0c89fc50d15b902a93abd6b4539ff2ffbeb36dc24a3e5988f
                • Instruction ID: 376f2f33ccb73d932ff6cd250afeb9b5246b1596ab063897a51a734d352f2776
                • Opcode Fuzzy Hash: be99e31bffd1c8f0c89fc50d15b902a93abd6b4539ff2ffbeb36dc24a3e5988f
                • Instruction Fuzzy Hash: BFE04F70905218DFC740EFA8CA847ACBBF8EB08204F1481E98C48D7340E7319E45CB81
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6a9105ced7366bc098cff84eb03b232039d6f8deb51386d8a09d650d231d3575
                • Instruction ID: 583ab2b9921c441a583b922deb7f7bbbb63a3a109e3daaf9999e4e1260417e5f
                • Opcode Fuzzy Hash: 6a9105ced7366bc098cff84eb03b232039d6f8deb51386d8a09d650d231d3575
                • Instruction Fuzzy Hash: DFE08CB040D118EBC715DF94EA49764BFB8EB46314F1444DDDC089B792DA36CE02CB82
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2bcf2e4d2337aa8734d9b219c975f04505cc912150abf5e155a8c04cae630474
                • Instruction ID: e15a8a247e52f3e736bf16fb1bdfefbee75c3c4d08fb9e9713ba67312d7c0c11
                • Opcode Fuzzy Hash: 2bcf2e4d2337aa8734d9b219c975f04505cc912150abf5e155a8c04cae630474
                • Instruction Fuzzy Hash: 98E01A74D09208EBDB04DF98D5806ECBBB8AB49305F1481EAD85857341D6755A02EB55
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8b29cad7aa470af0a1c1a13fb5fbbd79b9f957535a6199764d6dd7b802179b53
                • Instruction ID: b01a50b7766c2883bff081b4034d0968c60936ba375098a69c6237a2aa704249
                • Opcode Fuzzy Hash: 8b29cad7aa470af0a1c1a13fb5fbbd79b9f957535a6199764d6dd7b802179b53
                • Instruction Fuzzy Hash: 1AE048353596848FC746EB7498946043FB5EF4A51032584E6D848CB376C9349C05CB11
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e4bed844512bacb84aab9f34a33966fe81a7ddb41cc301a5c839c3fd293b1784
                • Instruction ID: 3697303d2e7f9da5bbadb45b7c606197dea4c38f288c5f4d8447ed1b31c5dad3
                • Opcode Fuzzy Hash: e4bed844512bacb84aab9f34a33966fe81a7ddb41cc301a5c839c3fd293b1784
                • Instruction Fuzzy Hash: B1E0B674D15218DFCB84EFACD989B9CBBF8BB08615F1041E9D809DB761E630AA40DB51
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 12d015b0829a36f820227ea26e2c2a24bd175b3a7ec0209c232ad1439717dae1
                • Instruction ID: 18b070677a5ab00f217d9b6c317410685ccbfafd238b4cf60b8527e1ebf947b4
                • Opcode Fuzzy Hash: 12d015b0829a36f820227ea26e2c2a24bd175b3a7ec0209c232ad1439717dae1
                • Instruction Fuzzy Hash: ADE04F7090521CDFCB40EFACC986A9CBBF9AB08604F1081A98808D3341D7319E41DB41
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 591b94013da1ee63a08720f6d61fbe83e51542d41e6a53fa7633445054c1526d
                • Instruction ID: 4b76ba2619d5b4459b26ff152cdb4189ede4d413b730847e3d03ababe0cf29db
                • Opcode Fuzzy Hash: 591b94013da1ee63a08720f6d61fbe83e51542d41e6a53fa7633445054c1526d
                • Instruction Fuzzy Hash: 93D02E327186224BCB01A62DEC413AB3BE3DB8CA04F448A3AB802C3304FE24DD0283C0
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: bff7ec72c0a555d3a18d51d6e75bbc38b526adc48c33776934b069ed76d143c2
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: DFE0EC7490921CDBCB04EF94D9856ACBBB8EB85315F14D1E9DC086B351CA315E42DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6cade1fcc6d07b23403a38fe730dc8f81a416616f6b36068fbe38d0c0e143574
                • Instruction ID: d39ba98a82f3afd32555296b1ca376942770e0ee44a6abcc466f23d015db306e
                • Opcode Fuzzy Hash: 6cade1fcc6d07b23403a38fe730dc8f81a416616f6b36068fbe38d0c0e143574
                • Instruction Fuzzy Hash: 5FE012B154121CDBCB00FFB4990579E77EDEB45205F0045E6D504A7150EE755A04EB96
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: e6d5c244691645f9471ff1f980f597763a7c8d791aab6ce98f92e2e6be40a99c
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 35E01278909218DBCB08EF94D9857ACBBB8EB45315F2482DDDC486B351CB315E42DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: 9b27837ae8f62271b8ce3615420c3891a4b67d4e4b7ed7ec1ce95aac925bd89b
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: E8E0C234909208DBCB04EF94DD806ACBBB8EB45306F6081DDCC082B340CB356E02DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: bdafc54ee3928d4a38138fb5046b6491be53bba86d542c86bc6bb966a56a47d8
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 5DE01274909218DBCB04EF94DD857ADBFB8EB45315F1482D9DC086B351C7315E82DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: 8080f61f15b30f63f858edc85848e0b6748cd49631adffd0ea9a34e8ecb8f59a
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 21E0C234A09218DBCB04EF94D9816ACBBB8EB45305F1081D9CC082B350C7315E42DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: 5fdf0b595d5115c2d37df355b126b50d384111de2b3152ad60b9e7af18966926
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 88E0C234909208DBCB04EF94DA846ACBBB8EB45304F1081EDCC082B351CB319E02DF85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: d173d9071883813a4c2420de3927a6ea34e9ac685a37e86d832992f9afe59e7d
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 92E0C234909208DBCB04EF94D9807ACBBBCEB45305F5081D9DC486B350C7715E02DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: 4b4299d95830092d26660a74498704fd0a91e52c812a3005d9f846d10571e85b
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: E8E0C23490A208EBCB04EF94D9857ACBBB8EB45304F1081DADC082B380C7315E02DF85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: 343ed9e29642b1625b9e7d07d35741b96dd4f6f538acc09c538890d57c9ebff6
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 5FE01274909218DBCB04EF94DA856ACFBB8EB45315F1481DDDC086B351CB316E46DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: d27d1963461701e7b76efcd367eaaff974659140fd7995aed29b9dde2432bac9
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: 5FE0C23490920CEBCB04EF98E980BACBBB8EB45304F1081DDDC182B380CB315E02DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction ID: cd2630716d2d71cc7f4fc97fba4e78eaea46bfe87778f530f9dbc29bfd87ef18
                • Opcode Fuzzy Hash: c90bec9be90b7f26b5ae01980849e338e8bc30f42b36352ad75eab82f47f9bd1
                • Instruction Fuzzy Hash: D0E0C274D4A208DBCB04EF94E9907ACBBB8EB45304F1481D9CC082B351C7719E02DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c1aac3256d725496a3c5e24061e8861c2cda548afa3ac3fca9897a3b9e203daa
                • Instruction ID: dac0a9552dce01989d6fff0866937b1682c94adc92cd680c2a3fa1aa6d05de60
                • Opcode Fuzzy Hash: c1aac3256d725496a3c5e24061e8861c2cda548afa3ac3fca9897a3b9e203daa
                • Instruction Fuzzy Hash: 22E0C234909208DBCB04EFE4DE846EDBBB9FB45305F1091DDC84867340CA725E02EB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ddbe64899f2af86bcc82afc244d55b59c7b58ba01911db9fa274ff0c4d94c434
                • Instruction ID: f9690155c2f6ea220a9aa1b670904669305c4cd87f0e9055061ef4dc19b38396
                • Opcode Fuzzy Hash: ddbe64899f2af86bcc82afc244d55b59c7b58ba01911db9fa274ff0c4d94c434
                • Instruction Fuzzy Hash: A6E0C271801218DBC700EFB4C90979E7BB9EB09201F0046E5D10CA7110EF354A00EB96
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3aec00a28fd9e965592ea8c2716680ce6a1bf73755a6ba6b460edcdf02077ac4
                • Instruction ID: 201d3e0b3663ed81388e10c299ad1373132fc8e6a89152746589d2cc29776741
                • Opcode Fuzzy Hash: 3aec00a28fd9e965592ea8c2716680ce6a1bf73755a6ba6b460edcdf02077ac4
                • Instruction Fuzzy Hash: B4F0A5B8E06228CFDB14DF68EA59B99B7B1FF4A304F108498C40AA7355CB745E85CF00
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1ad38c256bea266749d8747c22ccee08bfb44009b25e93b60af007f75e8f72a1
                • Instruction ID: d992081bb159903feaa96938244f9087ee54a48abc0edd5721f8e6c880e5db5f
                • Opcode Fuzzy Hash: 1ad38c256bea266749d8747c22ccee08bfb44009b25e93b60af007f75e8f72a1
                • Instruction Fuzzy Hash: 33E0EC74D4621CDFCB40EFA8D94ABACBBB8FB05201F1041A9D809A3750E7305A94DB46
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 344addc1f3e4355d090b6d89cfed2a670910044f83941d4abd61e6292ee91706
                • Instruction ID: a05741d72fa19f461a075541d4e3f1b3b6246aedbfd5e46b529471611814fa61
                • Opcode Fuzzy Hash: 344addc1f3e4355d090b6d89cfed2a670910044f83941d4abd61e6292ee91706
                • Instruction Fuzzy Hash: 04E01270A10208EFCB10EFB5D94176E77B6EF45304F6085A8F809DB244DA756F01A791
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 70404da589dc658ecca93f16ca4374a9e3561953e3a6263bdc6c42954db8cf1b
                • Instruction ID: aa2a45b158b4ead59fa1aed58acd900dd39ddea565aaa1008cf39a6c3ddd4ad0
                • Opcode Fuzzy Hash: 70404da589dc658ecca93f16ca4374a9e3561953e3a6263bdc6c42954db8cf1b
                • Instruction Fuzzy Hash: 34E0C230805218EFC740EBA8D9413ACBFB8EB09205F1481DDCC889B381D7359E82DB81
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 11c29f78ffe2d504abf7fbe814f7ec99f210cc3a48bdd9b2fdf7d11be403cc5e
                • Instruction ID: 164fdc9bbb322656b412becf34816d08e3cf043d38d3f83eb36f40ecb1e0922e
                • Opcode Fuzzy Hash: 11c29f78ffe2d504abf7fbe814f7ec99f210cc3a48bdd9b2fdf7d11be403cc5e
                • Instruction Fuzzy Hash: DDF05A78D40229CFDB64CF29D985BD9BBB1BF59301F0082EA9889A3600EB701EC58F01
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: edd288cf7b42ed6866a71ec8cb32d4747088597ad9433e9dba53c5f1b45edd2b
                • Instruction ID: bde3e5d6e24466c1a95a34f09f523aa1423652ff6b8c21ac0e5f9e18d0b36905
                • Opcode Fuzzy Hash: edd288cf7b42ed6866a71ec8cb32d4747088597ad9433e9dba53c5f1b45edd2b
                • Instruction Fuzzy Hash: F9E0EC74D05218EFCB50EFA8D94A7ACBBF8BB08201F1441AAD84997350E6349A50DB41
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 92574eb7df24740ace07ef5c2f1adfa1247f4a6dadcf9b5e1b405416d7f26683
                • Instruction ID: b6cae4e2f39eb2065cd1f475f894dd5df21cc084cdca1f9e4f80fd9a271fcf0a
                • Opcode Fuzzy Hash: 92574eb7df24740ace07ef5c2f1adfa1247f4a6dadcf9b5e1b405416d7f26683
                • Instruction Fuzzy Hash: D5E01270A11108EFCB40EFA8D94165EBBF9EB45304F6085A8F808D3301D9756F01AB91
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 956c566b0e38cf49d5aa4be5725178b2bb940d94fde8873ae7c48cb578c42cb9
                • Instruction ID: f26c1f69fd8f061df195d3d592da39f3ed3ac4e2b11252996924df248fd95a7b
                • Opcode Fuzzy Hash: 956c566b0e38cf49d5aa4be5725178b2bb940d94fde8873ae7c48cb578c42cb9
                • Instruction Fuzzy Hash: 59D05E7050A218DBC704EB95D940AA8B7ACEB46218F1481DDD80C67392CA76AD01DB85
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d435bbb789777efd495822f340a40d838c99d711aec181922b7645d31ffa6d59
                • Instruction ID: 0a1be7884fca07309a737c19372eb8e5224e46bb0056bb17c2560d007f52f82b
                • Opcode Fuzzy Hash: d435bbb789777efd495822f340a40d838c99d711aec181922b7645d31ffa6d59
                • Instruction Fuzzy Hash: C7E04678900258CFCB01AF80E848BA8B772FB4A320F208245E806AA604CB3949029F10
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b50906a8720e16be975f9e2bd774d19267751f3819d236577b77cb89728d6017
                • Instruction ID: 8fe94ccb2b1a261fe32fa1efd2b755c9b6ecc6b2f9be7e1ff803b3fee278e916
                • Opcode Fuzzy Hash: b50906a8720e16be975f9e2bd774d19267751f3819d236577b77cb89728d6017
                • Instruction Fuzzy Hash: 06D0A73004E7608BCB02A7246549364FFBCAB47211F0405D1D44D49466C6640054C746
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9dfc234d12cde3e6abcfc890d414bb9ba601e569a7d73549d803c6aa085469ec
                • Instruction ID: 552ac1e50d6b91f2ea60cef7f2330a344bc9e4276102c45c118586c3a42926e3
                • Opcode Fuzzy Hash: 9dfc234d12cde3e6abcfc890d414bb9ba601e569a7d73549d803c6aa085469ec
                • Instruction Fuzzy Hash: 47D09E753505088F8744EB69E984A1577EAAB8CA10320C5A9E909C7329DA34EC018B51
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5f954551ee938acfb608208b95b3c53d52d59c55ad58b7d47eb5ac13a486830b
                • Instruction ID: 5a8ad2d53785bf5c69f30908596f40f056c19d4c85a4c943bc66b7e380351cca
                • Opcode Fuzzy Hash: 5f954551ee938acfb608208b95b3c53d52d59c55ad58b7d47eb5ac13a486830b
                • Instruction Fuzzy Hash: 6CC08C313100385B460433E9BA180BD768DCA8E665300012AF90AC3343CF193D012BDA
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 126a5b9dca98f23cfc8dc9dee04a2cc20d4b7348a0a397b42ccd7ce626b86b9a
                • Instruction ID: 241f1e12a23fdeb7b57b195228ad0403a547f73c92b4a80cd7b08d4d40c5db79
                • Opcode Fuzzy Hash: 126a5b9dca98f23cfc8dc9dee04a2cc20d4b7348a0a397b42ccd7ce626b86b9a
                • Instruction Fuzzy Hash: 0DD0A771D042358BDB11BF54D8443DDB321AF21341F994CB4E94A63101CB289E0D9F51
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 947a6d46e0f01e174d2471819eb7cd99a8d81ea3591e3f680c4e0ec528db62c3
                • Instruction ID: 4ba6541700a726daccb19c9db2be5fbe1f830c2fc2de02e614a10b17c675b93a
                • Opcode Fuzzy Hash: 947a6d46e0f01e174d2471819eb7cd99a8d81ea3591e3f680c4e0ec528db62c3
                • Instruction Fuzzy Hash: 81E0E27080122ACFEB20DF24C948F99BBB0EB04311F0591E59409AB260D3309DC0DF21
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 946dd170cda0730cf95f9d1589b2f459fdf1761ab160483d81b119ed239b9482
                • Instruction ID: 32cd8cd42331b14e226ba0fecbe2dcecf0dd0e7955d03b3e5e3d6a524407cb30
                • Opcode Fuzzy Hash: 946dd170cda0730cf95f9d1589b2f459fdf1761ab160483d81b119ed239b9482
                • Instruction Fuzzy Hash: A2C08C3008F60882F2002244AF4C3F232AC6707217F002A00D84E248625AA42850C65A
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 907d3d8c69b403d0c2f7dfc3f779a60c28155d30eeda816d9b4dc2aa47e98a4e
                • Instruction ID: 9f9e1696e0b3b8bc54d4be9637c1a0469c088389a5672eb20743dbab6fc8c445
                • Opcode Fuzzy Hash: 907d3d8c69b403d0c2f7dfc3f779a60c28155d30eeda816d9b4dc2aa47e98a4e
                • Instruction Fuzzy Hash: 43C08C2404E3C85FCB1393B02DAA48A3F348D0304470801DBD8C9DA4A3C20820068B22
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6fd6356f5e8ddee4a77a72108c824a6e1531f4906bf328c6a2eddf3d3625adf8
                • Instruction ID: 3c659d7fca1189507c6efcf5d8d6afcb19a423b9e6f425a510d4f25a32d51f84
                • Opcode Fuzzy Hash: 6fd6356f5e8ddee4a77a72108c824a6e1531f4906bf328c6a2eddf3d3625adf8
                • Instruction Fuzzy Hash: F5D0127A1045818FC311CB7CD986E507B70EF57355B1550E6F155CB672C321AD15DB04
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a0dcae4f56e02a83545bb62dd58e3aa07be441d078b43bf162a6b4ad757017d1
                • Instruction ID: 4ebad7488f6adfa73a24c9cf1111ae821b4ef4c919916c42c9b6926b7d2a8a7d
                • Opcode Fuzzy Hash: a0dcae4f56e02a83545bb62dd58e3aa07be441d078b43bf162a6b4ad757017d1
                • Instruction Fuzzy Hash: 2FD092B4D15228CBCB14EFA5E4557ADBAB1FB45304F504129E806A7346DB384845DF01
                Memory Dump Source
                • Source File: 00000006.00000002.2239154928.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5ea0000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 325df1a65e9f7db2e1959bd19fc19fb46cfe0bb0f95b2dcdb2dfd3a9398c8c77
                • Instruction ID: b73f6f6ec91a645bb3cd95b07965af7ceaa6225c95eaf519518357333ba13071
                • Opcode Fuzzy Hash: 325df1a65e9f7db2e1959bd19fc19fb46cfe0bb0f95b2dcdb2dfd3a9398c8c77
                • Instruction Fuzzy Hash: 24D0A9B82001008BC320DE50D858BEA76A6EB49300F808059B40D93686CA384E82DB21
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bd6959456660b315e9cfa8f2e181cfde3a1b6dd9f3d2b2f7d867a03b282a4d2f
                • Instruction ID: 26ea0a994d2d3a4def0cc5c9185fa53a921909717098aa108ee8bdaa862bb292
                • Opcode Fuzzy Hash: bd6959456660b315e9cfa8f2e181cfde3a1b6dd9f3d2b2f7d867a03b282a4d2f
                • Instruction Fuzzy Hash: B8C08C704C170887C30477E4BD4E729B76CBB0AA06F040A50E50CA08A0CB7D4068DA2A
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f08e7022b02c9466c77ce8f9d9bf913cb4f88019d64f1941fc68f21438b6da5d
                • Instruction ID: df9fec2ff1ac3829650250ad2776991a067c0dad83a0188fd644e2a866774863
                • Opcode Fuzzy Hash: f08e7022b02c9466c77ce8f9d9bf913cb4f88019d64f1941fc68f21438b6da5d
                • Instruction Fuzzy Hash: B4C08C341884808FC302C738C4A1C483FB0AE4A20130102EDF04AC7636C3126823CB01
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8e7063d8a7aef4568d7a5f5956acb5f9b29b64b14bbe154f3c9019da4db0d58c
                • Instruction ID: d9f473aa762a22138d6610dc7cd6da1e97020c2b35351afd3d4c8091aeb90381
                • Opcode Fuzzy Hash: 8e7063d8a7aef4568d7a5f5956acb5f9b29b64b14bbe154f3c9019da4db0d58c
                • Instruction Fuzzy Hash: 5CD067B8A05218CFCB10DF28EA55B99B7B1FB4A304F004095D409A7315CB745D90CF01
                Memory Dump Source
                • Source File: 00000006.00000002.2214910017.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b50000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4f0e584e24b760a592bb13f477f93a1dae00ff092212cf660ff96b6ba34bd58c
                • Instruction ID: 358efa9969467a298800be7fc136034c4bee697b31be78905d33768dc6c70bb5
                • Opcode Fuzzy Hash: 4f0e584e24b760a592bb13f477f93a1dae00ff092212cf660ff96b6ba34bd58c
                • Instruction Fuzzy Hash: 6AD0C97090922C8BDBA0DF64C884398BAF1BB0A314F1042C9948DA2315CA320EC8CF10
                Memory Dump Source
                • Source File: 00000006.00000002.2238415609.0000000005A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5a20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5a660d2b633dbcbe9034d6d92b21fd4f39008d159bcc4b5a530712754c2b04bc
                • Instruction ID: 9fac1b3ea14084d94f028c2a7bf02bb2871d51829a4259c44c3abdde3a6a0b3e
                • Opcode Fuzzy Hash: 5a660d2b633dbcbe9034d6d92b21fd4f39008d159bcc4b5a530712754c2b04bc
                • Instruction Fuzzy Hash: 66C00276E5001A9A8B00DAD9E4508DCB774EB94321B004026D214A6104D63115268B50
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 06cf923acb555c02ac22599bb64f464d929b29d876b0bd850d4e16958fd7ade2
                • Instruction ID: 23b69f938802ce023b96887bfc8a92ee6713fb33de16eaf5b0e4667f94149a11
                • Opcode Fuzzy Hash: 06cf923acb555c02ac22599bb64f464d929b29d876b0bd850d4e16958fd7ade2
                • Instruction Fuzzy Hash: 64C09271A404008FCA30DF8EDD89B4A77A0FF41306F916010B201E6271C6A0DC53EF1A
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                Memory Dump Source
                • Source File: 00000006.00000002.2238656455.0000000005C30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C30000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_5c30000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0451c66e3b81f16cd0994f50c3f7f02460d0380984ac0052eab2edd220bf27f6
                • Instruction ID: 76205cf4e56923c58924837cc99cb634fddb948de674f8a714936f1aafddefca
                • Opcode Fuzzy Hash: 0451c66e3b81f16cd0994f50c3f7f02460d0380984ac0052eab2edd220bf27f6
                • Instruction Fuzzy Hash: 1FB011E382000003E2C2B208C82A3A202288BA8232FE888A28008C3380F088C20820B2
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 717df99d515fbe10ff6ba5d28b853b21ed7804ab8b59b81a06322fbecb8faed5
                • Instruction ID: 41d803b44b923d58d8bdfe2972d3019f348cb1647920f386ab8394a9a81e6128
                • Opcode Fuzzy Hash: 717df99d515fbe10ff6ba5d28b853b21ed7804ab8b59b81a06322fbecb8faed5
                • Instruction Fuzzy Hash: 4FB09203A4D2824AD3AB05786C755943E21AA0210678E01E75CD484287B00C18486E52
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                • Instruction ID: 308734e347fe5fbfc39d01466d26648a0473cab39bdc6a53ba3d68073832f9aa
                • Opcode Fuzzy Hash: d200006d66dfcaf3ad5dd5c1c75a4ffe651a9ea33eed7fff1a75258716443a08
                • Instruction Fuzzy Hash: 93B01230240208CFC200DB5DD444C0033FCAF49A0434000D0F1098B731C721FC00CA40
                Memory Dump Source
                • Source File: 00000006.00000002.2214753506.0000000002B20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B20000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_6_2_2b20000_Networks!.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: abbbcb649df09f3659a721537507657ab04195d9db24c6abd13631257a830496
                • Instruction ID: 4149b59d5ac6bfe7fe71c49387983e568a51ba1b21ca1073785df3411ab8bcf0
                • Opcode Fuzzy Hash: abbbcb649df09f3659a721537507657ab04195d9db24c6abd13631257a830496
                • Instruction Fuzzy Hash: 54902230000A0CCF000033803A08280330C800080A3800002A00C000000A0830000880