Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
w4oDGAPUMH.exe

Overview

General Information

Sample name:w4oDGAPUMH.exe
renamed because original name is a hash value
Original sample name:08eb85ed06de39fcb6fd922c757a85a1.exe
Analysis ID:1519288
MD5:08eb85ed06de39fcb6fd922c757a85a1
SHA1:c26b7a4e8f413e238c25f6e1af53ba34322f54bc
SHA256:c3fd15f05ea03c2824e605c4492f64e958150bab079681478e1696d20fc2ecb2
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • w4oDGAPUMH.exe (PID: 4216 cmdline: "C:\Users\user\Desktop\w4oDGAPUMH.exe" MD5: 08EB85ED06DE39FCB6FD922C757A85A1)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["217.119.129.17:1912"], "Bot Id": "7400515879", "Authorization Header": "c74790bd166600f1f665c8ce201776eb"}
SourceRuleDescriptionAuthorStrings
w4oDGAPUMH.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1433226533.0000000000A52000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Process Memory Space: w4oDGAPUMH.exe PID: 4216JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Process Memory Space: w4oDGAPUMH.exe PID: 4216JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  SourceRuleDescriptionAuthorStrings
                  0.0.w4oDGAPUMH.exe.a50000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T09:59:39.363130+020020432341A Network Trojan was detected217.119.129.171912192.168.2.849704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T09:59:39.172014+020020432311A Network Trojan was detected192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:44.723363+020020432311A Network Trojan was detected192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:51.389488+020020432311A Network Trojan was detected192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:51.671179+020020432311A Network Trojan was detected192.168.2.849704217.119.129.171912TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T09:59:50.360450+020020460561A Network Trojan was detected217.119.129.171912192.168.2.849704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T09:59:39.172014+020020460451A Network Trojan was detected192.168.2.849704217.119.129.171912TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: w4oDGAPUMH.exeAvira: detected
                    Source: w4oDGAPUMH.exeMalware Configuration Extractor: RedLine {"C2 url": ["217.119.129.17:1912"], "Bot Id": "7400515879", "Authorization Header": "c74790bd166600f1f665c8ce201776eb"}
                    Source: w4oDGAPUMH.exeReversingLabs: Detection: 81%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: w4oDGAPUMH.exeJoe Sandbox ML: detected
                    Source: w4oDGAPUMH.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: w4oDGAPUMH.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then jmp 063BB397h0_2_063BAC38
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then jmp 063BB962h0_2_063BB540
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then jmp 063BBDE2h0_2_063BB540
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then jmp 063BC2C3h0_2_063BC000
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then jmp 063B9523h0_2_063B950B
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then jmp 063BF3BDh0_2_063BF39C
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 4x nop then inc dword ptr [ebp-20h]0_2_063B2190

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2043231 - Severity 1 - ET MALWARE Redline Stealer TCP CnC Activity : 192.168.2.8:49704 -> 217.119.129.17:1912
                    Source: Network trafficSuricata IDS: 2046045 - Severity 1 - ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) : 192.168.2.8:49704 -> 217.119.129.17:1912
                    Source: Network trafficSuricata IDS: 2043234 - Severity 1 - ET MALWARE Redline Stealer TCP CnC - Id1Response : 217.119.129.17:1912 -> 192.168.2.8:49704
                    Source: Network trafficSuricata IDS: 2046056 - Severity 1 - ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) : 217.119.129.17:1912 -> 192.168.2.8:49704
                    Source: Malware configuration extractorURLs: 217.119.129.17:1912
                    Source: global trafficTCP traffic: 192.168.2.8:49704 -> 217.119.129.17:1912
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: unknownTCP traffic detected without corresponding DNS query: 217.119.129.17
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3ResponseD
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                    Source: w4oDGAPUMH.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_0121DC740_2_0121DC74
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BE6E00_2_063BE6E0
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BAC380_2_063BAC38
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BF4500_2_063BF450
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BB5400_2_063BB540
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BA2680_2_063BA268
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BC0000_2_063BC000
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BD0D30_2_063BD0D3
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BD9300_2_063BD930
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BE1A00_2_063BE1A0
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B7E780_2_063B7E78
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B8C200_2_063B8C20
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BF4400_2_063BF440
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B84B80_2_063B84B8
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B84A70_2_063B84A7
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B54C80_2_063B54C8
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063BB52F0_2_063BB52F
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B5D980_2_063B5D98
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B7A100_2_063B7A10
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B03B00_2_063B03B0
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B03A90_2_063B03A9
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B9BE80_2_063B9BE8
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_063B51800_2_063B5180
                    Source: w4oDGAPUMH.exe, 00000000.00000000.1433269843.0000000000A82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSteanings.exe8 vs w4oDGAPUMH.exe
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs w4oDGAPUMH.exe
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1578793320.000000000109E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs w4oDGAPUMH.exe
                    Source: w4oDGAPUMH.exeBinary or memory string: OriginalFilenameSteanings.exe8 vs w4oDGAPUMH.exe
                    Source: w4oDGAPUMH.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile created: C:\Users\user\AppData\Local\SystemCacheJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeMutant created: NULL
                    Source: w4oDGAPUMH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: w4oDGAPUMH.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: w4oDGAPUMH.exeReversingLabs: Detection: 81%
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: dwrite.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeSection loaded: windowscodecs.dllJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: w4oDGAPUMH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: w4oDGAPUMH.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: w4oDGAPUMH.exeStatic PE information: 0xD22848DC [Tue Sep 23 12:17:32 2081 UTC]
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeCode function: 0_2_06A34B11 pushfd ; retf 0_2_06A34B12
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeMemory allocated: 11F0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeMemory allocated: 4D50000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWindow / User API: threadDelayed 911Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWindow / User API: threadDelayed 2115Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exe TID: 4132Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exe TID: 4124Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1578793320.000000000113B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}}
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.000000000322C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696494690LR
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696494690]
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696494690d
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696494690|UE
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696494690n
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696494690t
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696494690u
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696494690~
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696494690t
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696494690o
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696494690}
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696494690p
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690x
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696494690x
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696494690}
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696494690s
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1581799390.00000000040DB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696494690j
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696494690z
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696494690^
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696494690x
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696494690
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696494690f
                    Source: w4oDGAPUMH.exe, 00000000.00000002.1579392448.00000000032DA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696494690h
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Users\user\Desktop\w4oDGAPUMH.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: w4oDGAPUMH.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.w4oDGAPUMH.exe.a50000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1433226533.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: w4oDGAPUMH.exe PID: 4216, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                    Source: C:\Users\user\Desktop\w4oDGAPUMH.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                    Source: Yara matchFile source: 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: w4oDGAPUMH.exe PID: 4216, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: w4oDGAPUMH.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.w4oDGAPUMH.exe.a50000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1433226533.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: w4oDGAPUMH.exe PID: 4216, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    1
                    OS Credential Dumping
                    221
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                    Virtualization/Sandbox Evasion
                    Security Account Manager241
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Timestomp
                    LSA Secrets113
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                    DLL Side-Loading
                    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    w4oDGAPUMH.exe82%ReversingLabsWin32.Trojan.RedlineStealer
                    w4oDGAPUMH.exe100%AviraTR/AD.RedLineSteal.vnqrx
                    w4oDGAPUMH.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://api.ip.sb/ip0%URL Reputationsafe
                    http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                    http://tempuri.org/0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id110%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id16Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id130%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id120%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id100%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id140%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id160%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id180%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id170%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id150%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id190%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Renew0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.00%Avira URL Cloudsafe
                    217.119.129.17:19120%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentity0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT0%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA10%Avira URL Cloudsafe
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id3ResponseD0%Avira URL Cloudsafe
                    http://tempuri.org/D0%Avira URL Cloudsafe
                    http://tempuri.org/Entity/Id23Response0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/06/addressingex0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce0%Avira URL Cloudsafe
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/fault0%Avira URL Cloudsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    217.119.129.17:1912true
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Textw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/sctw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23ResponseDw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id12Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id2Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id21Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrapw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id9w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id8w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id5w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Preparew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id4w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id7w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id6w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id19Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licensew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Abortedw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/faultw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsatw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id15Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Reneww4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/Registerw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id6Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://api.ip.sb/ipw4oDGAPUMH.exefalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/scw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id1ResponseDw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancelw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id9Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id20w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id21w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id22w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id24w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issuew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id24Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id1Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Replayw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegow4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binaryw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressingw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Completionw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trustw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id10w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id11w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id12w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id16Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancelw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id13w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id14w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id15w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id16w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Noncew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id17w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id18w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id5Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id19w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id10Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/Reneww4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id8Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2006/02/addressingidentityw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKeyw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/trustw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollbackw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id3ResponseDw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002E6F000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Entity/Id23Responsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, w4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCTw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://tempuri.org/Dw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/06/addressingexw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/10/wscoorw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/04/security/trust/Noncew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponsew4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2004/08/addressing/faultw4oDGAPUMH.exe, 00000000.00000002.1579392448.0000000002D51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    217.119.129.17
                    unknownunknown
                    16298INTERBOX-ASLubbersBoxTelematicaBVNLtrue
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1519288
                    Start date and time:2024-09-26 09:58:39 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 3m 28s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:5
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:w4oDGAPUMH.exe
                    renamed because original name is a hash value
                    Original Sample Name:08eb85ed06de39fcb6fd922c757a85a1.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 72
                    • Number of non-executed functions: 17
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Stop behavior analysis, all processes terminated
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    • VT rate limit hit for: w4oDGAPUMH.exe
                    TimeTypeDescription
                    03:59:48API Interceptor18x Sleep call for process: w4oDGAPUMH.exe modified
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    INTERBOX-ASLubbersBoxTelematicaBVNLmalw-20210521-bkp.elfGet hashmaliciousXmrigBrowse
                    • 217.119.67.6
                    Win32.Wannacry.dllGet hashmaliciousWannacryBrowse
                    • 217.119.142.207
                    sora.armGet hashmaliciousMiraiBrowse
                    • 217.119.67.5
                    No context
                    No context
                    Process:C:\Users\user\Desktop\w4oDGAPUMH.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):3094
                    Entropy (8bit):5.33145931749415
                    Encrypted:false
                    SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                    MD5:3FD5C0634443FB2EF2796B9636159CB6
                    SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                    SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                    SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):6.1618900403311665
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Win16/32 Executable Delphi generic (2074/23) 0.01%
                    File name:w4oDGAPUMH.exe
                    File size:192'000 bytes
                    MD5:08eb85ed06de39fcb6fd922c757a85a1
                    SHA1:c26b7a4e8f413e238c25f6e1af53ba34322f54bc
                    SHA256:c3fd15f05ea03c2824e605c4492f64e958150bab079681478e1696d20fc2ecb2
                    SHA512:fa0717518781a1c673ba647112930aa2c7116b9b8cdd0ee88c74b44ed4178326eafa4d079fafb51c560a5d3ef2ced55fb86002e10da2e4b5948684aaee09a573
                    SSDEEP:3072:zcZqf7D342p/0+mAaky4o0QogZzB1fA0PuTVAtkxz+3Rx:zcZqf7DIOnov1B1fA0GTV8kk
                    TLSH:AC146B5833E8C614EA7F4B79D471164497B0F163F917EB1B4FC894AA2D23700EA21AB7
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H(...............0.................. ... ....@.. .......................`.......z....@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x4302fe
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0xD22848DC [Tue Sep 23 12:17:32 2081 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x302a80x53.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x320000x5de.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x340000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000x2e3040x2e400f9d486ce9ff11f476b40fbeffb22ca7cFalse0.4751266891891892data6.188253530767491IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0x320000x5de0x6002cde5f2d825dd9344e0825551b3220bcFalse0.44140625data4.21397277350532IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x340000xc0x20055f9eb3ef5d1fad739850bd7f59c3f20False0.041015625data0.06116285224115448IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x320a00x352data0.4447058823529412
                    RT_MANIFEST0x323f40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                    2024-09-26T09:59:39.172014+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:39.172014+02002046045ET MALWARE [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)1192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:39.363130+02002043234ET MALWARE Redline Stealer TCP CnC - Id1Response1217.119.129.171912192.168.2.849704TCP
                    2024-09-26T09:59:44.723363+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:50.360450+02002046056ET MALWARE Redline Stealer/MetaStealer Family Activity (Response)1217.119.129.171912192.168.2.849704TCP
                    2024-09-26T09:59:51.389488+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.849704217.119.129.171912TCP
                    2024-09-26T09:59:51.671179+02002043231ET MALWARE Redline Stealer TCP CnC Activity1192.168.2.849704217.119.129.171912TCP
                    TimestampSource PortDest PortSource IPDest IP
                    Sep 26, 2024 09:59:38.290018082 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:38.295042038 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:38.295130014 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:38.303606033 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:38.308429003 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:38.935015917 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:38.982692957 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:39.172013998 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:39.176891088 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:39.363130093 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:39.420077085 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:44.723362923 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:44.732914925 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922113895 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922136068 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922152996 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922174931 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922192097 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922199011 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:44.922210932 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:44.922241926 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:44.922255993 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.355323076 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.360450029 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360559940 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360570908 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360578060 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.360629082 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.360662937 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360672951 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360716105 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360727072 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360728025 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.360775948 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.360784054 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360797882 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360822916 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.360840082 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.360861063 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.365549088 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.365624905 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.365627050 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.365636110 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.365660906 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.365675926 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.365704060 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.365735054 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.365745068 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.365780115 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.366530895 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.366612911 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.370554924 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.370608091 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.371181011 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.371264935 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.372189999 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.372277021 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.372330904 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.375864029 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.375922918 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.375932932 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.375933886 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.375952959 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.375962973 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.375972986 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.375981092 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376007080 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376023054 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376665115 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376684904 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376715899 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376715899 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376734972 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376735926 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376746893 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376759052 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376774073 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376789093 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376820087 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376828909 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376837969 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376846075 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376872063 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376893997 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376924038 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376935005 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376943111 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.376976013 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376996040 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.376996040 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377023935 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377026081 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377031088 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377036095 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377055883 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.377136946 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377155066 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.377182961 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377192020 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377358913 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377368927 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377377033 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377386093 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377399921 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377408028 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377444029 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377453089 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377484083 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377491951 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377504110 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377530098 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377537966 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377680063 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377695084 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377700090 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377706051 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377711058 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377715111 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377720118 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377721071 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377722025 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377774954 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377784967 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377794027 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377803087 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377810955 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.377898932 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.377974033 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.380801916 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380834103 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380851984 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380861998 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380871058 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380881071 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380888939 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.380994081 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381021976 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381045103 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381061077 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381071091 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381581068 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381591082 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381623030 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381688118 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381784916 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381797075 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381896019 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381906033 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.381998062 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382008076 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382294893 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382304907 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382313967 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382323027 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382330894 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382339954 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382375956 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382388115 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382400990 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382411957 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382482052 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382491112 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382523060 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382530928 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382647038 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382667065 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382853031 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.382920980 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383044004 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383152008 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383162022 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383300066 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383344889 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383353949 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383444071 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383452892 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383486032 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.383487940 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383497000 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383519888 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383570910 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.383611917 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383621931 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383630037 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383666992 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383676052 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383745909 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383754015 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383804083 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383811951 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383846998 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383857012 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383929014 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383938074 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.383996010 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384005070 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384033918 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384042025 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384097099 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384107113 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384202003 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384236097 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384284019 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384293079 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384366035 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384375095 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384418011 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384427071 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384469986 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384480000 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384568930 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384577990 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384619951 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384629011 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384669065 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384677887 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384737015 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384744883 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384793043 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384802103 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384848118 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384856939 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384901047 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384910107 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384947062 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384955883 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.384970903 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388598919 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388622046 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388642073 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388652086 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388669014 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388679028 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388688087 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388715029 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388731956 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388741016 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388750076 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388758898 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388767004 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388786077 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388797045 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388813019 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388823986 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388851881 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388868093 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388878107 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388885975 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388911963 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388926983 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388936996 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388947010 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388978958 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.388997078 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389022112 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389031887 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389041901 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389050961 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389154911 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389163971 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389173985 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389183998 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389210939 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389219999 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389242887 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389251947 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389257908 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.389276981 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389286041 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389309883 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389319897 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389353991 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.389374018 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389390945 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389410019 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389425993 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389435053 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389444113 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389467001 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389477015 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389487028 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.389497042 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394371033 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394383907 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394401073 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394486904 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394496918 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394547939 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394579887 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.394681931 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.394691944 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394704103 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394718885 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394726992 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394754887 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394784927 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394885063 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394910097 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.394965887 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395018101 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395026922 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395036936 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395046949 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395163059 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395181894 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395196915 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395205975 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395215034 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395230055 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395239115 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395247936 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395256042 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395279884 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395292044 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395313025 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395328045 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395339012 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395353079 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395368099 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.395376921 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.443458080 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.443682909 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.443809032 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.443809032 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.443891048 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.449583054 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.449620008 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.449708939 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.449717999 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.449727058 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.449738026 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.449817896 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.449940920 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.486022949 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.486249924 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:50.491158009 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491213083 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491218090 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491302013 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491322041 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491331100 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491336107 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491352081 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491363049 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491372108 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491430044 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491439104 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491447926 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491456985 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491523027 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491544962 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491561890 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491570950 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491588116 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491599083 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491611004 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491625071 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491642952 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491657019 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491672993 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491682053 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491759062 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491767883 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491794109 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491802931 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491861105 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491871119 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491910934 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491920948 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491955042 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.491976976 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492029905 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492039919 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492069960 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492126942 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492136955 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492157936 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492173910 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492182970 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492191076 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492207050 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492223024 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492239952 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492255926 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492264986 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492337942 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:50.492352962 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:51.378463984 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:51.389487982 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:51.394560099 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:51.580523014 CEST191249704217.119.129.17192.168.2.8
                    Sep 26, 2024 09:59:51.638789892 CEST497041912192.168.2.8217.119.129.17
                    Sep 26, 2024 09:59:51.671179056 CEST497041912192.168.2.8217.119.129.17

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:03:59:36
                    Start date:26/09/2024
                    Path:C:\Users\user\Desktop\w4oDGAPUMH.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\w4oDGAPUMH.exe"
                    Imagebase:0xa50000
                    File size:192'000 bytes
                    MD5 hash:08EB85ED06DE39FCB6FD922C757A85A1
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1433226533.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1579392448.0000000002DE4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:12.5%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:52
                      Total number of Limit Nodes:8
                      execution_graph 29919 1214668 29920 1214684 29919->29920 29921 1214696 29920->29921 29923 12147a0 29920->29923 29924 12147c5 29923->29924 29928 12148a1 29924->29928 29932 12148b0 29924->29932 29930 12148b0 29928->29930 29929 12149b4 29929->29929 29930->29929 29936 1214248 29930->29936 29934 12148d7 29932->29934 29933 12149b4 29933->29933 29934->29933 29935 1214248 CreateActCtxA 29934->29935 29935->29933 29937 1215940 CreateActCtxA 29936->29937 29939 1215a03 29937->29939 29939->29939 29940 121ad38 29941 121ad47 29940->29941 29944 121ae20 29940->29944 29954 121ae30 29940->29954 29945 121ae30 29944->29945 29948 121ae64 29945->29948 29964 1219838 29945->29964 29948->29941 29949 121ae5c 29949->29948 29950 121b068 GetModuleHandleW 29949->29950 29951 121b095 29950->29951 29951->29941 29955 121ae41 29954->29955 29958 121ae64 29954->29958 29956 1219838 GetModuleHandleW 29955->29956 29957 121ae4c 29956->29957 29957->29958 29962 121b0b8 GetModuleHandleW 29957->29962 29963 121b0c8 GetModuleHandleW 29957->29963 29958->29941 29959 121ae5c 29959->29958 29960 121b068 GetModuleHandleW 29959->29960 29961 121b095 29960->29961 29961->29941 29962->29959 29963->29959 29965 121b020 GetModuleHandleW 29964->29965 29967 121ae4c 29965->29967 29967->29948 29968 121b0b8 29967->29968 29971 121b0c8 29967->29971 29969 1219838 GetModuleHandleW 29968->29969 29970 121b0dc 29969->29970 29970->29949 29972 1219838 GetModuleHandleW 29971->29972 29973 121b0dc 29971->29973 29972->29973 29973->29949 29974 121d0b8 29975 121d0fe 29974->29975 29979 121d289 29975->29979 29982 121d298 29975->29982 29976 121d1eb 29985 121c9a0 29979->29985 29983 121d2c6 29982->29983 29984 121c9a0 DuplicateHandle 29982->29984 29983->29976 29984->29983 29986 121d300 DuplicateHandle 29985->29986 29987 121d2c6 29986->29987 29987->29976

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 63be6e0-63be6e6 1 63be6e8-63be6ed 0->1 2 63be6ee-63be71c 0->2 1->2 3 63be71e 2->3 4 63be723-63be7d8 2->4 3->4 8 63bf3be-63bf3d1 4->8 10 63be7dd-63be80b 8->10 11 63bf3d7-63bf3f4 8->11 16 63be80d 10->16 17 63be813-63be815 10->17 13 63bf403 11->13 14 63bf3f6-63bf402 11->14 19 63bf404 13->19 14->13 20 63be80f-63be811 16->20 21 63be817 16->21 22 63be81c-63be82b 17->22 19->19 20->17 20->21 21->22 23 63be82d-63be82e 22->23 24 63be833-63be87a 22->24 23->11 27 63be87c 24->27 28 63be881-63be8df 24->28 27->28 32 63be8ec-63be8fc 28->32 33 63be8e1-63be8ea 28->33 34 63be902-63be910 32->34 33->34 35 63bf398-63bf3bd 34->35 36 63be916-63be921 34->36 35->8 37 63be928-63be949 36->37 38 63be923 36->38 41 63be94b 37->41 42 63be950-63be995 37->42 38->37 41->42 45 63be99c-63be9fa 42->45 46 63be997 42->46 50 63be9fc 45->50 51 63bea01-63bea2a 45->51 46->45 50->51 52 63bea2c-63bea37 51->52 53 63bea65-63beade 51->53 54 63bea39 52->54 55 63bea3e-63bea64 52->55 62 63bef70-63bef92 53->62 63 63beae4-63beb00 53->63 54->55 55->53 193 63bef98 call 63bf84a 62->193 194 63bef98 call 63bf8ee 62->194 195 63bef98 call 63bf97e 62->195 196 63bef98 call 63bf8e3 62->196 197 63bef98 call 63bf832 62->197 198 63bef98 call 63bf450 62->198 199 63bef98 call 63bf440 62->199 200 63bef98 call 63bf8e5 62->200 66 63bef5a-63bef63 63->66 67 63bef69-63bef6b 66->67 68 63beb05-63beb0e 66->68 70 63bf397 67->70 71 63beb10 68->71 72 63beb15-63beb70 68->72 69 63bef9e-63befc3 75 63bf348-63bf361 69->75 70->35 71->72 82 63beeec-63bef05 72->82 78 63befc8-63bf03d call 63b2d88 call 63b2e94 75->78 79 63bf367-63bf384 75->79 100 63bf03f 78->100 101 63bf045-63bf06d call 63b2e94 78->101 83 63bf393 79->83 84 63bf386-63bf392 79->84 90 63bef0b-63bef28 82->90 91 63beb75-63bebea call 63b2d88 call 63b2e94 82->91 83->70 84->83 96 63bef2a-63bef36 90->96 97 63bef37 90->97 125 63bebec 91->125 126 63bebf2-63bec1a call 63b2e94 91->126 96->97 97->66 103 63bf0a2-63bf0a4 100->103 104 63bf041-63bf043 100->104 112 63bf06f 101->112 113 63bf076-63bf089 101->113 107 63bf0aa-63bf0b8 103->107 104->101 104->103 110 63bf32b-63bf347 107->110 111 63bf0be-63bf122 call 63b2d98 107->111 110->75 149 63bf129-63bf139 111->149 150 63bf124 111->150 112->103 117 63bf071-63bf074 112->117 118 63bf08b 113->118 119 63bf091-63bf093 113->119 117->103 117->113 123 63bf08d-63bf08f 118->123 124 63bf095 118->124 121 63bf09a-63bf0a0 119->121 121->107 123->119 123->124 124->121 127 63bec4f-63bec51 125->127 128 63bebee-63bebf0 125->128 133 63bec1c 126->133 134 63bec23-63bec36 126->134 132 63bec57-63bec65 127->132 128->126 128->127 135 63bec6b-63beccf call 63b2d98 132->135 136 63beed8-63beeeb 132->136 133->127 137 63bec1e-63bec21 133->137 138 63bec38 134->138 139 63bec3e-63bec40 134->139 157 63becd1 135->157 158 63becd6-63bece6 135->158 136->82 137->127 137->134 144 63bec3a-63bec3c 138->144 145 63bec42 138->145 146 63bec47-63bec4d 139->146 144->139 144->145 145->146 146->132 151 63bf13b 149->151 152 63bf140-63bf1cd 149->152 150->149 151->152 201 63bf1d3 call 63bf9e0 152->201 202 63bf1d3 call 63bf9d0 152->202 157->158 159 63bece8 158->159 160 63beced-63bedb1 158->160 159->160 178 63bede3-63bee13 160->178 179 63bedb3-63bede1 160->179 167 63bf1d9-63bf204 168 63bf236-63bf266 167->168 169 63bf206-63bf234 167->169 172 63bf2a6-63bf32a call 63b2e94 168->172 169->168 171 63bf268-63bf296 169->171 173 63bf298 171->173 174 63bf29d-63bf2a0 171->174 172->110 173->174 174->172 182 63bee53-63beed7 call 63b2e94 178->182 179->178 181 63bee15-63bee43 179->181 183 63bee4a-63bee4d 181->183 184 63bee45 181->184 182->136 183->182 184->183 193->69 194->69 195->69 196->69 197->69 198->69 199->69 200->69 201->167 202->167
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID: @B/
                      • API String ID: 0-3863299084
                      • Opcode ID: 945b30e995067af03959a7a158f3003fba0392d71bb27c9e0ab2765ca3715c7f
                      • Instruction ID: 22c6f463494f9820f7b4debed5c6132f7aae35101af461c5aae8edf97aa3fe82
                      • Opcode Fuzzy Hash: 945b30e995067af03959a7a158f3003fba0392d71bb27c9e0ab2765ca3715c7f
                      • Instruction Fuzzy Hash: CF829E74E012298FDBA8CF69C984BDDBBB1BF49301F1091E9D509A7650DB319E85CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 297 63bf450-63bf47b 298 63bf47d 297->298 299 63bf482-63bf6e9 297->299 298->299 323 63bf6ef-63bf72c 299->323 324 63bf8fe-63bf90e 299->324 334 63bf899-63bf8ac 323->334 325 63bf991-63bf99d 324->325 326 63bf913-63bf91f 325->326 327 63bf9a3-63bf9be 325->327 330 63bf921 326->330 331 63bf926-63bf941 326->331 330->331 333 63bf94c-63bf98e 331->333 333->325 338 63bf8b2-63bf8cf 334->338 339 63bf731-63bf754 334->339 342 63bf8de 338->342 343 63bf8d1-63bf8dd 338->343 344 63bf75e-63bf76b 339->344 345 63bf756-63bf75c 339->345 342->324 343->342 346 63bf76e-63bf779 344->346 345->346 349 63bf77f-63bf79e 346->349 350 63bf84c-63bf898 346->350 353 63bf7f5-63bf809 349->353 350->334 356 63bf80b-63bf82f 353->356 357 63bf7a0-63bf7e1 353->357 356->350 362 63bf7e3-63bf7f2 357->362 363 63bf7f4 357->363 362->356 363->353
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID: l85t
                      • API String ID: 0-2408928284
                      • Opcode ID: 1d11e89c95fac721191f454d1001cdb99f248d92a2a5307be69c15a5575fea40
                      • Instruction ID: 31bd43a1e9993bd0f776076d4669b9f4e6fa4dba320e5c182a50b825f3e29f6d
                      • Opcode Fuzzy Hash: 1d11e89c95fac721191f454d1001cdb99f248d92a2a5307be69c15a5575fea40
                      • Instruction Fuzzy Hash: E3E1E274E01229CFEB68CF65C944BDEBBB2BF89300F50A1AAC549B7254DB305A85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 37b4f208f100b34c9e3b168bf73dd1a1da380a576209c62654bee2d70d0260e7
                      • Instruction ID: 8c83f17ef0d8630fbe22a4c81fd6b5e946197703a84dc0eaab2ae4e052139acb
                      • Opcode Fuzzy Hash: 37b4f208f100b34c9e3b168bf73dd1a1da380a576209c62654bee2d70d0260e7
                      • Instruction Fuzzy Hash: 59329270A01228CFDB68DF64C994BDDB7B2BF89300F5091E9D50AAB250DB359E85CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 92fd9d52b7da2cb86c65b1d974cf781ab7cc9b695316c4c3cb02770906b1ba2a
                      • Instruction ID: f9d548c27dd17de7271e9036be04e48b646229f2f03310452ee42c0af2ea98be
                      • Opcode Fuzzy Hash: 92fd9d52b7da2cb86c65b1d974cf781ab7cc9b695316c4c3cb02770906b1ba2a
                      • Instruction Fuzzy Hash: 94229D74E00229CFDB64DF64C994BD9B7B2BF89300F1091EAD549AB650EB319E85CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 90bdaab8a29796f0a23f216f9b7d6a693165721cbe86992140130881e8998046
                      • Instruction ID: d230afa288d1f67b3ba9f950632214a7881d49739aef122cb6d20fcd84853c27
                      • Opcode Fuzzy Hash: 90bdaab8a29796f0a23f216f9b7d6a693165721cbe86992140130881e8998046
                      • Instruction Fuzzy Hash: E0225974E012288FDB64DF68C994BDDBBB2BB89300F5091EAD549AB350DB315E85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d65a69a9dc19e5f0233b49806e3fcb4a809588cff07929c326beaea4af8e7046
                      • Instruction ID: 9582527ceee0ed29e0a851ed441b1af94b2b6bd98a4bddf76e84939d0999e71f
                      • Opcode Fuzzy Hash: d65a69a9dc19e5f0233b49806e3fcb4a809588cff07929c326beaea4af8e7046
                      • Instruction Fuzzy Hash: B702BE74A01228CFDBA8DF64C894BDEB7B2BF89300F5095E9D509AB254DB319E85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35c31b31484f4108083ccf117ed6556f5181380c7d2865135ffeae9d7fd36893
                      • Instruction ID: 35ac4de53e73c5403d7db491f5f1f532359e7a202208845c3e0b6afff2f846c3
                      • Opcode Fuzzy Hash: 35c31b31484f4108083ccf117ed6556f5181380c7d2865135ffeae9d7fd36893
                      • Instruction Fuzzy Hash: 99B1C374E01228CFDB68DF65C894B9DBBB2BF89300F1095AAD409AB350DB315E85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b2d2ea42d7514495bc5c6cb3ddee66847d6cf3a8c422fb4d16fee2ad5b492424
                      • Instruction ID: 46d1a64f29bbd3b08d47bcc068e4ef44262ce7128701c6a9ec3a9482d2e6471c
                      • Opcode Fuzzy Hash: b2d2ea42d7514495bc5c6cb3ddee66847d6cf3a8c422fb4d16fee2ad5b492424
                      • Instruction Fuzzy Hash: A9A10674E00228CFDB68DFA5C854BDEBBB2BF89300F10A1A9D549AB354DB315985CF91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e92a841a707bb62562d80ef6c2e5bb52b92ccf8af64fa7a53677ec6ab0be5a77
                      • Instruction ID: e9b45fe7163d4ef32ceedc3ab0fd2ed6b26d32897a71288451008c82e1d26317
                      • Opcode Fuzzy Hash: e92a841a707bb62562d80ef6c2e5bb52b92ccf8af64fa7a53677ec6ab0be5a77
                      • Instruction Fuzzy Hash: 9991E174E01218CFDB58DFA9D884ADDBBB2FF89301F209169E409AB354DB359986CF40

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 203 121ae30-121ae3f 204 121ae41-121ae4e call 1219838 203->204 205 121ae6b-121ae6f 203->205 212 121ae50 204->212 213 121ae64 204->213 206 121ae71-121ae7b 205->206 207 121ae83-121aec4 205->207 206->207 214 121aed1-121aedf 207->214 215 121aec6-121aece 207->215 261 121ae56 call 121b0b8 212->261 262 121ae56 call 121b0c8 212->262 213->205 216 121aee1-121aee6 214->216 217 121af03-121af05 214->217 215->214 219 121aef1 216->219 220 121aee8-121aeef call 121a814 216->220 221 121af08-121af0f 217->221 218 121ae5c-121ae5e 218->213 222 121afa0-121afb7 218->222 223 121aef3-121af01 219->223 220->223 225 121af11-121af19 221->225 226 121af1c-121af23 221->226 234 121afb9-121b018 222->234 223->221 225->226 228 121af30-121af39 call 121a824 226->228 229 121af25-121af2d 226->229 235 121af46-121af4b 228->235 236 121af3b-121af43 228->236 229->228 254 121b01a-121b060 234->254 237 121af69-121af76 235->237 238 121af4d-121af54 235->238 236->235 243 121af99-121af9f 237->243 244 121af78-121af96 237->244 238->237 240 121af56-121af66 call 121a834 call 121a844 238->240 240->237 244->243 256 121b062-121b065 254->256 257 121b068-121b093 GetModuleHandleW 254->257 256->257 258 121b095-121b09b 257->258 259 121b09c-121b0b0 257->259 258->259 261->218 262->218
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 60376ed6fb59bbe46c8d0ccd86fe4da792e2898f654faa04d46969670b16fb0a
                      • Instruction ID: 75b18b1fdfd4a841651ba4313a394325ac472d4a9e602a7d154ecb1959a9247e
                      • Opcode Fuzzy Hash: 60376ed6fb59bbe46c8d0ccd86fe4da792e2898f654faa04d46969670b16fb0a
                      • Instruction Fuzzy Hash: 277179B0A11B468FEB24DF29D44479ABBF1FF98300F00892DE58AC7A54D775E845CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 263 1214248-1215a01 CreateActCtxA 266 1215a03-1215a09 263->266 267 1215a0a-1215a64 263->267 266->267 274 1215a73-1215a77 267->274 275 1215a66-1215a69 267->275 276 1215a79-1215a85 274->276 277 1215a88 274->277 275->274 276->277 279 1215a89 277->279 279->279
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 012159F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 45b61f4ed8757c8985562594836084fce15345e5f7e673defeef0c2d974c51ea
                      • Instruction ID: 9f61a9a04e581d9df33275471689b23c6f576d00024b25192c9fca5973c07ba3
                      • Opcode Fuzzy Hash: 45b61f4ed8757c8985562594836084fce15345e5f7e673defeef0c2d974c51ea
                      • Instruction Fuzzy Hash: 6241B071D10719CBEB24CFA9C884BDEBBF5BF89304F20806AD408AB255DBB56945CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 280 1215935-121593c 281 1215944-1215a01 CreateActCtxA 280->281 283 1215a03-1215a09 281->283 284 1215a0a-1215a64 281->284 283->284 291 1215a73-1215a77 284->291 292 1215a66-1215a69 284->292 293 1215a79-1215a85 291->293 294 1215a88 291->294 292->291 293->294 296 1215a89 294->296 296->296
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 012159F1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 84b3e73c339efeef2e3b13820c6b85ef5f0aae4b91c8ad594655e884ed012263
                      • Instruction ID: a2b87247debacb4f6c8234c79f05a31b7edc71203b391518e40ec321654319bc
                      • Opcode Fuzzy Hash: 84b3e73c339efeef2e3b13820c6b85ef5f0aae4b91c8ad594655e884ed012263
                      • Instruction Fuzzy Hash: 3D41CFB1D10719CBEB24CFA9C8847CEBBF5BF89304F24806AD408AB255DBB56945CF91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 364 121c9a0-121d394 DuplicateHandle 366 121d396-121d39c 364->366 367 121d39d-121d3ba 364->367 366->367
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0121D2C6,?,?,?,?,?), ref: 0121D387
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: b7726e0b588f332f7a36474f84509c630c93766234a3caa006be3d68aea25031
                      • Instruction ID: 43fbea7c3e8c400420f8b84e13e5c57c6d5df7c9d9795d83d43da090ee4306bc
                      • Opcode Fuzzy Hash: b7726e0b588f332f7a36474f84509c630c93766234a3caa006be3d68aea25031
                      • Instruction Fuzzy Hash: 8021E3B591020CDFDB10CFAAD984ADEBBF8EB48310F14841AE918A3350D378A954CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 370 121d2f9-121d394 DuplicateHandle 371 121d396-121d39c 370->371 372 121d39d-121d3ba 370->372 371->372
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0121D2C6,?,?,?,?,?), ref: 0121D387
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 7c218542ec1d0aeab95e848d769d01e5b61bb9f00db0b8a53e3545822e448a56
                      • Instruction ID: 8beca3e45ae7913b6dcfac11da344c16561211e89d4e4ac99f76833a7110c4a3
                      • Opcode Fuzzy Hash: 7c218542ec1d0aeab95e848d769d01e5b61bb9f00db0b8a53e3545822e448a56
                      • Instruction Fuzzy Hash: 9B21E2B5900209DFDB10CFAAD984ADEBBF5FB48314F14801AE918A3350D378A954CF65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 375 1219838-121b060 377 121b062-121b065 375->377 378 121b068-121b093 GetModuleHandleW 375->378 377->378 379 121b095-121b09b 378->379 380 121b09c-121b0b0 378->380 379->380
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0121AE4C), ref: 0121B086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 4a68c4e65229aa33e038a06aca37230fcd4249090b1f2b12b0ee884205f0db98
                      • Instruction ID: 50a6bd9d3cf63c3f15065e565898bda31b1d63bf3fdc2fac220f628285eeeb9a
                      • Opcode Fuzzy Hash: 4a68c4e65229aa33e038a06aca37230fcd4249090b1f2b12b0ee884205f0db98
                      • Instruction Fuzzy Hash: 5B1120B1C003098BDB20CF9AC444BDEFBF4EF48210F10842AD529A7210D3B9A509CFA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 382 6a31b08-6a31b2b 383 6a31b39-6a31b95 382->383 384 6a31b2d-6a31b2f 382->384 389 6a31b9b-6a31bd1 383->389 390 6a31fbd-6a32046 383->390 384->383 389->390 401 6a31bd7-6a31c0d 389->401 393 6a32048-6a3204e 390->393 394 6a3205e-6a320c1 390->394 395 6a32052-6a3205c 393->395 396 6a32050 393->396 411 6a320c7-6a320e1 394->411 412 6a32e49-6a32e90 394->412 395->394 396->394 401->390 409 6a31c13-6a31c4a 401->409 409->390 425 6a31c50-6a31c86 409->425 411->412 419 6a320e7-6a32117 411->419 417 6a32e92-6a32e98 412->417 418 6a32ea8-6a32f20 412->418 420 6a32e9a 417->420 421 6a32e9c-6a32ea6 417->421 444 6a32f22-6a32f48 418->444 445 6a32f4a-6a32f51 418->445 433 6a32131-6a3217d 419->433 434 6a32119-6a3212f 419->434 420->418 421->418 425->390 439 6a31c8c-6a31cc2 425->439 446 6a32184-6a321a1 433->446 434->446 439->390 455 6a31cc8-6a31d06 439->455 444->445 446->412 453 6a321a7-6a321dd 446->453 462 6a321f7-6a32243 453->462 463 6a321df-6a321f5 453->463 455->390 464 6a31d0c-6a31d55 455->464 470 6a3224a-6a32267 462->470 463->470 464->390 481 6a31d5b-6a31d91 464->481 470->412 475 6a3226d-6a322a3 470->475 484 6a322a5-6a322bb 475->484 485 6a322bd-6a32309 475->485 481->390 492 6a31d97-6a31dcd 481->492 493 6a32310-6a3232d 484->493 485->493 492->390 502 6a31dd3-6a31e09 492->502 493->412 497 6a32333-6a32369 493->497 507 6a32383-6a323cf 497->507 508 6a3236b-6a32381 497->508 502->390 512 6a31e0f-6a31e45 502->512 515 6a323d6-6a323f3 507->515 508->515 512->390 524 6a31e4b-6a31e62 512->524 515->412 520 6a323f9-6a3242f 515->520 530 6a32431-6a32447 520->530 531 6a32449-6a324a1 520->531 524->390 527 6a31e68-6a31e99 524->527 539 6a31ec3-6a31f05 527->539 540 6a31e9b-6a31ec1 527->540 538 6a324a8-6a324c5 530->538 531->538 538->412 545 6a324cb-6a32501 538->545 555 6a31f23-6a31f2f 539->555 556 6a31f07-6a31f1d 539->556 553 6a31f35-6a31f68 540->553 559 6a32503-6a32519 545->559 560 6a3251b-6a32579 545->560 553->390 565 6a31f6a-6a31fa0 553->565 555->553 556->555 568 6a32580-6a3259d 559->568 560->568 565->390 577 6a31fa2-6a31fba 565->577 568->412 572 6a325a3-6a325d9 568->572 581 6a325f3-6a32651 572->581 582 6a325db-6a325f1 572->582 587 6a32658-6a32675 581->587 582->587 587->412 590 6a3267b-6a326b1 587->590 595 6a326b3-6a326c9 590->595 596 6a326cb-6a32729 590->596 601 6a32730-6a3274d 595->601 596->601 601->412 604 6a32753-6a3276d 601->604 604->412 607 6a32773-6a327a3 604->607 611 6a327a5-6a327bb 607->611 612 6a327bd-6a3281b 607->612 617 6a32822-6a3283f 611->617 612->617 617->412 620 6a32845-6a3285f 617->620 620->412 623 6a32865-6a32895 620->623 627 6a32897-6a328ad 623->627 628 6a328af-6a3290d 623->628 633 6a32914-6a32931 627->633 628->633 633->412 636 6a32937-6a32951 633->636 636->412 639 6a32957-6a32987 636->639 643 6a329a1-6a329ff 639->643 644 6a32989-6a3299f 639->644 649 6a32a06-6a32a23 643->649 644->649 649->412 653 6a32a29-6a32a5f 649->653 657 6a32a61-6a32a77 653->657 658 6a32a79-6a32ad7 653->658 663 6a32ade-6a32afb 657->663 658->663 663->412 666 6a32b01-6a32b37 663->666 671 6a32b51-6a32baf 666->671 672 6a32b39-6a32b4f 666->672 677 6a32bb6-6a32bd3 671->677 672->677 677->412 681 6a32bd9-6a32c0f 677->681 685 6a32c11-6a32c27 681->685 686 6a32c29-6a32c87 681->686 691 6a32c8e-6a32cab 685->691 686->691 691->412 694 6a32cb1-6a32ce7 691->694 699 6a32d01-6a32d5f 694->699 700 6a32ce9-6a32cff 694->700 705 6a32d66-6a32d83 699->705 700->705 705->412 709 6a32d89-6a32dbb 705->709 713 6a32dd5-6a32e2a 709->713 714 6a32dbd-6a32dd3 709->714 719 6a32e31-6a32e46 713->719 714->719
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 826f251ceed1ebdc305c9e297fd58995dd0bb1b557f680c52df50b4d06cb82d6
                      • Instruction ID: ea5fe1cb4af732a21c4dba577d054e0de05b2a0b24915c8f8ad72a4f4b022982
                      • Opcode Fuzzy Hash: 826f251ceed1ebdc305c9e297fd58995dd0bb1b557f680c52df50b4d06cb82d6
                      • Instruction Fuzzy Hash: 6FC22D70A002189FDB58DF64C891FEDBBB6EF89700F50809AE605AB3A1DB719D85CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 723 63bc8e0-63bc8e2 724 63bc8ea 723->724 725 63bc8e4-63bc8e6 723->725 728 63bc8eb-63bc8ec 724->728 729 63bc8f2-63bc90a 724->729 726 63bc8e8-63bc8e9 725->726 727 63bc8ee-63bc8ef 725->727 726->724 727->729 728->727 730 63bc90c 729->730 731 63bc911-63bc969 729->731 730->731 736 63bc96b-63bc9a3 731->736 737 63bc9a6-63bc9ae 731->737 736->737 739 63bc9b6-63bc9ef 737->739
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID: [e
                      • API String ID: 0-2158396884
                      • Opcode ID: 2a03d3c65c0be69ebdc5f49db169bb5116e79c8e4d8f5498eec2b31a259e84f8
                      • Instruction ID: c3e8cd00322e84d3a333d15b053338b63f0ae572d69121c786b569ab27629b70
                      • Opcode Fuzzy Hash: 2a03d3c65c0be69ebdc5f49db169bb5116e79c8e4d8f5498eec2b31a259e84f8
                      • Instruction Fuzzy Hash: BB31E4B8E01219EFDF94DFA8E585ADDB7F1AB88300F206529E405F7704DB346945CB91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 744 63bc8f0-63bc90a 745 63bc90c 744->745 746 63bc911-63bc969 744->746 745->746 751 63bc96b-63bc9a3 746->751 752 63bc9a6-63bc9ae 746->752 751->752 754 63bc9b6-63bc9ef 752->754
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID: [e
                      • API String ID: 0-2158396884
                      • Opcode ID: 0248e7ca0468ca2d4892b9591ad1bdbbc064d358e693d2ea1cebf6a4af285fe4
                      • Instruction ID: 7dd2a0e059da25432825e8819348793e8e29e482383f0992d6e4aeed7d49d5bd
                      • Opcode Fuzzy Hash: 0248e7ca0468ca2d4892b9591ad1bdbbc064d358e693d2ea1cebf6a4af285fe4
                      • Instruction Fuzzy Hash: 9131C074E01209AFDF94DFA9E985ADDBBF1FB88300F106129E405B7304EB356A45CBA1

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1063 6a30048-6a3006c 1065 6a30084-6a300a5 1063->1065 1066 6a3006e-6a30074 1063->1066 1071 6a300a8-6a300b5 1065->1071 1067 6a30076 1066->1067 1068 6a30078-6a3007a 1066->1068 1067->1065 1068->1065 1073 6a300bb-6a300d0 1071->1073 1074 6a306da-6a306e4 1071->1074 1073->1071 1076 6a300d2 1073->1076 1077 6a30392-6a303b5 1076->1077 1078 6a30482-6a304a5 1076->1078 1079 6a301c1-6a301ef 1076->1079 1080 6a302a7-6a302cd 1076->1080 1081 6a30234-6a30262 1076->1081 1082 6a3031a-6a3033d 1076->1082 1083 6a3040a-6a3042d 1076->1083 1084 6a300d9-6a300fc 1076->1084 1085 6a3014e-6a30174 1076->1085 1126 6a3082b-6a3085a 1077->1126 1127 6a303bb-6a303bf 1077->1127 1128 6a304ab-6a304af 1078->1128 1129 6a3096f-6a3099e 1078->1129 1106 6a301f1-6a301f7 1079->1106 1107 6a30207-6a3022f 1079->1107 1103 6a302d3-6a302d5 1080->1103 1104 6a30264-6a3026a 1081->1104 1105 6a3027a-6a302a2 1081->1105 1133 6a30343-6a30347 1082->1133 1134 6a30789-6a307b8 1082->1134 1135 6a30433-6a30437 1083->1135 1136 6a308cd-6a308fc 1083->1136 1137 6a30102-6a30106 1084->1137 1138 6a306e7-6a30716 1084->1138 1102 6a3017a-6a3017c 1085->1102 1108 6a30194-6a301bc 1102->1108 1109 6a3017e-6a30184 1102->1109 1110 6a302d7-6a302dd 1103->1110 1111 6a302ed-6a30315 1103->1111 1112 6a3026e-6a30270 1104->1112 1113 6a3026c 1104->1113 1105->1071 1120 6a301fb-6a301fd 1106->1120 1121 6a301f9 1106->1121 1107->1071 1108->1071 1116 6a30186 1109->1116 1117 6a30188-6a3018a 1109->1117 1118 6a302e1-6a302e3 1110->1118 1119 6a302df 1110->1119 1111->1071 1112->1105 1113->1105 1116->1108 1117->1108 1118->1111 1119->1111 1120->1107 1121->1107 1152 6a30861-6a30890 1126->1152 1139 6a30897-6a308c6 1127->1139 1140 6a303c5-6a303cf 1127->1140 1141 6a304b5-6a304bf 1128->1141 1142 6a309db-6a30c9e 1128->1142 1154 6a309a5-6a309d4 1129->1154 1143 6a307f5-6a30824 1133->1143 1144 6a3034d-6a30357 1133->1144 1162 6a307bf-6a307ee 1134->1162 1145 6a30939-6a30968 1135->1145 1146 6a3043d-6a30447 1135->1146 1164 6a30903-6a30932 1136->1164 1147 6a30753-6a30782 1137->1147 1148 6a3010c-6a30116 1137->1148 1166 6a3071d-6a3074c 1138->1166 1139->1136 1140->1152 1153 6a303d5-6a30405 1140->1153 1141->1154 1155 6a304c5-6a304f5 1141->1155 1143->1126 1144->1162 1163 6a3035d-6a3038d 1144->1163 1145->1129 1146->1164 1165 6a3044d-6a3047d 1146->1165 1147->1134 1148->1166 1167 6a3011c-6a30149 1148->1167 1152->1139 1153->1071 1154->1142 1155->1071 1162->1143 1163->1071 1164->1145 1165->1071 1166->1147 1167->1071
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 12eafd2440abcae94224450d64ada31a963b4c1f1156538b49417942d17a461e
                      • Instruction ID: cc6fa62d877e5b7ac6fa1b3437398e67c1b13d547bacea1f8f0c3cb66b266fe4
                      • Opcode Fuzzy Hash: 12eafd2440abcae94224450d64ada31a963b4c1f1156538b49417942d17a461e
                      • Instruction Fuzzy Hash: 31428A307107219FEB68AF64D89066EB7F2BFC5B10B500A5CE5039B390DB76EC458B91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1272 6a33980-6a339a6 1273 6a339a8-6a339ae 1272->1273 1274 6a339be-6a33a17 1272->1274 1275 6a339b2-6a339bc 1273->1275 1276 6a339b0 1273->1276 1282 6a33fbf-6a34088 1274->1282 1283 6a33a1d-6a33a5c 1274->1283 1275->1274 1276->1274 1300 6a34159-6a34160 1282->1300 1301 6a3408e-6a340aa 1282->1301 1283->1282 1290 6a33a62-6a33a7e 1283->1290 1290->1282 1294 6a33a84-6a33abb 1290->1294 1303 6a33ae6-6a33b4d 1294->1303 1304 6a33abd-6a33ae1 1294->1304 1310 6a340d2-6a34110 1301->1310 1311 6a340ac-6a340d0 1301->1311 1322 6a33b6f-6a33b7d 1303->1322 1323 6a33b4f-6a33b69 1303->1323 1317 6a33b83-6a33b9d 1304->1317 1331 6a34112-6a34125 1310->1331 1332 6a3412b-6a34134 1310->1332 1327 6a3413a-6a34153 1311->1327 1317->1282 1324 6a33ba3-6a33bda 1317->1324 1322->1317 1323->1322 1336 6a33c05-6a33c68 1324->1336 1337 6a33bdc-6a33c00 1324->1337 1327->1300 1327->1301 1331->1332 1332->1327 1347 6a33c8a-6a33c98 1336->1347 1348 6a33c6a-6a33c84 1336->1348 1344 6a33c9e-6a33cb8 1337->1344 1344->1282 1349 6a33cbe-6a33cf5 1344->1349 1347->1344 1348->1347 1353 6a33d20-6a33d83 1349->1353 1354 6a33cf7-6a33d1b 1349->1354 1364 6a33da5-6a33db3 1353->1364 1365 6a33d85-6a33d9f 1353->1365 1361 6a33db9-6a33dd3 1354->1361 1361->1282 1366 6a33dd9-6a33e10 1361->1366 1364->1361 1365->1364 1370 6a33e12-6a33e36 1366->1370 1371 6a33e3b-6a33e9e 1366->1371 1378 6a33ed4-6a33eee 1370->1378 1380 6a33ec0-6a33ece 1371->1380 1381 6a33ea0-6a33eba 1371->1381 1378->1282 1383 6a33ef4-6a33f28 1378->1383 1380->1378 1381->1380 1387 6a33f50-6a33fa0 1383->1387 1388 6a33f2a-6a33f4e 1383->1388 1395 6a33fa7-6a33fbc 1387->1395 1388->1395
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1817c17b52bba9cc9aa91a0f07a2975d9617aad646de15dd5b110889c6434364
                      • Instruction ID: 3dc377dd0030e6dbc314919658aaa0ac34cc67f041ec96bce3fec06bc75ee677
                      • Opcode Fuzzy Hash: 1817c17b52bba9cc9aa91a0f07a2975d9617aad646de15dd5b110889c6434364
                      • Instruction Fuzzy Hash: 4D420475B002188FDB54DF68C994EADBBF6EF89700F148099E506EB3A1DA71ED44CB50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1398 6a30cf0-6a30d35 1403 6a30e67-6a30e7a 1398->1403 1404 6a30d3b-6a30d3d 1398->1404 1408 6a30f70-6a30f7b 1403->1408 1409 6a30e80-6a30e8f 1403->1409 1405 6a30d40-6a30d4f 1404->1405 1410 6a30e07-6a30e0b 1405->1410 1411 6a30d55-6a30d87 1405->1411 1412 6a30f83-6a30f8c 1408->1412 1418 6a30e95-6a30ebb 1409->1418 1419 6a30f3b-6a30f3f 1409->1419 1413 6a30e1a 1410->1413 1414 6a30e0d-6a30e18 1410->1414 1445 6a30d90-6a30d97 1411->1445 1446 6a30d89-6a30d8e 1411->1446 1416 6a30e1f-6a30e22 1413->1416 1414->1416 1416->1412 1423 6a30e28-6a30e2c 1416->1423 1447 6a30ec4-6a30ecb 1418->1447 1448 6a30ebd-6a30ec2 1418->1448 1421 6a30f41-6a30f4c 1419->1421 1422 6a30f4e 1419->1422 1425 6a30f50-6a30f52 1421->1425 1422->1425 1426 6a30e3b 1423->1426 1427 6a30e2e-6a30e39 1423->1427 1431 6a30fa3-6a3101d 1425->1431 1432 6a30f54-6a30f5e 1425->1432 1429 6a30e3d-6a30e3f 1426->1429 1427->1429 1436 6a30e45-6a30e4f 1429->1436 1437 6a30f8f-6a30f9c 1429->1437 1481 6a31023-6a31025 1431->1481 1482 6a310f1-6a31104 1431->1482 1440 6a30f61-6a30f6a 1432->1440 1449 6a30e52-6a30e5c 1436->1449 1437->1431 1440->1408 1440->1409 1452 6a30d99-6a30dba 1445->1452 1453 6a30dbc-6a30de0 1445->1453 1451 6a30dfb-6a30e05 1446->1451 1455 6a30ef0-6a30f14 1447->1455 1456 6a30ecd-6a30eee 1447->1456 1454 6a30f2f-6a30f39 1448->1454 1449->1405 1457 6a30e62 1449->1457 1451->1449 1452->1451 1473 6a30de2-6a30de8 1453->1473 1474 6a30df8 1453->1474 1454->1440 1471 6a30f16-6a30f1c 1455->1471 1472 6a30f2c 1455->1472 1456->1454 1457->1412 1477 6a30f20-6a30f22 1471->1477 1478 6a30f1e 1471->1478 1472->1454 1475 6a30dea 1473->1475 1476 6a30dec-6a30dee 1473->1476 1474->1451 1475->1474 1476->1474 1477->1472 1478->1472 1483 6a31028-6a31037 1481->1483 1486 6a3110a-6a31119 1482->1486 1487 6a3119c-6a311a7 1482->1487 1489 6a31091-6a31095 1483->1489 1490 6a31039-6a31045 1483->1490 1496 6a31167-6a3116b 1486->1496 1497 6a3111b-6a31144 1486->1497 1488 6a311af-6a311b8 1487->1488 1491 6a31097-6a310a2 1489->1491 1492 6a310a4 1489->1492 1505 6a3104f-6a31066 1490->1505 1494 6a310a9-6a310ac 1491->1494 1492->1494 1494->1488 1501 6a310b2-6a310b6 1494->1501 1499 6a3117a 1496->1499 1500 6a3116d-6a31178 1496->1500 1519 6a31146-6a3114c 1497->1519 1520 6a3115c-6a31165 1497->1520 1502 6a3117c-6a3117e 1499->1502 1500->1502 1503 6a310c5 1501->1503 1504 6a310b8-6a310c3 1501->1504 1507 6a31180-6a3118a 1502->1507 1508 6a311cf-6a31217 1502->1508 1509 6a310c7-6a310c9 1503->1509 1504->1509 1512 6a3106c-6a3106e 1505->1512 1522 6a3118d-6a31196 1507->1522 1536 6a31219-6a3121f 1508->1536 1537 6a3122f-6a31251 1508->1537 1514 6a311bb-6a311c8 1509->1514 1515 6a310cf-6a310d9 1509->1515 1517 6a31070-6a31076 1512->1517 1518 6a31086-6a3108f 1512->1518 1514->1508 1531 6a310dc-6a310e6 1515->1531 1523 6a3107a-6a3107c 1517->1523 1524 6a31078 1517->1524 1518->1531 1525 6a31150-6a31152 1519->1525 1526 6a3114e 1519->1526 1520->1522 1522->1486 1522->1487 1523->1518 1524->1518 1525->1520 1526->1520 1531->1483 1533 6a310ec 1531->1533 1533->1488 1538 6a31223-6a31225 1536->1538 1539 6a31221 1536->1539 1542 6a31254-6a31258 1537->1542 1538->1537 1539->1537 1543 6a31261-6a31266 1542->1543 1544 6a3125a-6a3125f 1542->1544 1545 6a3126c-6a3126f 1543->1545 1544->1545 1546 6a31460-6a31468 1545->1546 1547 6a31275-6a3128a 1545->1547 1547->1542 1549 6a3128c 1547->1549 1550 6a31293-6a312b8 1549->1550 1551 6a31400 1549->1551 1552 6a31348-6a3136d 1549->1552 1564 6a312ba-6a312bc 1550->1564 1565 6a312be-6a312c2 1550->1565 1553 6a3140a-6a31421 1551->1553 1562 6a31373-6a31377 1552->1562 1563 6a3136f-6a31371 1552->1563 1556 6a31427-6a3145b 1553->1556 1556->1542 1570 6a31379-6a31396 1562->1570 1571 6a31398-6a313bb 1562->1571 1569 6a313d5-6a313fb 1563->1569 1572 6a31320-6a31343 1564->1572 1566 6a312e3-6a31306 1565->1566 1567 6a312c4-6a312e1 1565->1567 1588 6a31308-6a3130e 1566->1588 1589 6a3131e 1566->1589 1567->1572 1569->1542 1570->1569 1586 6a313d3 1571->1586 1587 6a313bd-6a313c3 1571->1587 1572->1542 1586->1569 1590 6a313c7-6a313c9 1587->1590 1591 6a313c5 1587->1591 1592 6a31312-6a31314 1588->1592 1593 6a31310 1588->1593 1589->1572 1590->1586 1591->1586 1592->1589 1593->1589
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d56797248aeabd6e288d9c6febde00433df84c7fdf993b9871e886816c36deab
                      • Instruction ID: c8d48d87a3dd62e6f5a86e3cbb4d64ef4e1a849f3176be4509dce71370e7608e
                      • Opcode Fuzzy Hash: d56797248aeabd6e288d9c6febde00433df84c7fdf993b9871e886816c36deab
                      • Instruction Fuzzy Hash: C522BF30B002159FDB59AB69C954A7EBBF6FF89200F14846AE916CB3A2DF30DC41DB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2e6bab64b05ede9386c82f0dad6daea888466297009f1291b6d73594e6bb9815
                      • Instruction ID: 5843180a747816fdf59586df2d2daafcda1fd91e1fd9b0bdf1eafbe5eb2b7724
                      • Opcode Fuzzy Hash: 2e6bab64b05ede9386c82f0dad6daea888466297009f1291b6d73594e6bb9815
                      • Instruction Fuzzy Hash: 5E329774B042248FDB19AB64D996FADB7B2EF89704F10808AFA065B391CB71DD81CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e4dbb086b134bbf78c0643b0302f8423acd2b36d23d893ab81f038db88a922c7
                      • Instruction ID: d26d187af825d8a62c37bf7100187eb920b3070efa082336b4010159385d9bdb
                      • Opcode Fuzzy Hash: e4dbb086b134bbf78c0643b0302f8423acd2b36d23d893ab81f038db88a922c7
                      • Instruction Fuzzy Hash: DAD13770B20114AFC744EF98C894E9AB7B6FF49704BA08059FA06DB761CBB1ED45CB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 960431ecf1b391e4f05b02f3bb9e8bf5af62986bdd3a31c49a17a0fb929a8b19
                      • Instruction ID: 148bf00ec5a1f62e2b433f0486161b481b0c7daad9faa456388d566b89dae31f
                      • Opcode Fuzzy Hash: 960431ecf1b391e4f05b02f3bb9e8bf5af62986bdd3a31c49a17a0fb929a8b19
                      • Instruction Fuzzy Hash: C5D1A330B10314DFDB45AF64C954B79BBB6AF8A700F54405AE602DB3A2DBB5DC44CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 453b37f8aab67baf23cc60c35aa14402b935b4b5564d29719b9e4c19d630c7a8
                      • Instruction ID: cdad920041860c36ff3657e5f886422a9461dee7861d08fa198fd0bf5cef5115
                      • Opcode Fuzzy Hash: 453b37f8aab67baf23cc60c35aa14402b935b4b5564d29719b9e4c19d630c7a8
                      • Instruction Fuzzy Hash: 47C1E230B003109FEB54AB68C994B6EB7F6EF85704F14946AE9038B392DF75DC428B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8a49eeada433533a4d2162649a6fe90ae93d7b330cf1b4b8102b0813043a8d02
                      • Instruction ID: 4ffda4257ad6e708e15994a9027e6b05c6837f8e0c0798ee16baff419c7e2806
                      • Opcode Fuzzy Hash: 8a49eeada433533a4d2162649a6fe90ae93d7b330cf1b4b8102b0813043a8d02
                      • Instruction Fuzzy Hash: 02B1A030B10214DFEB44AF64C998B7AB7B6AF89704F545059F6029B3A1DBB2DC44CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2a6855fdbef10d79e99931844864ae352d35de6d32c5396d16222bd7c87a62b6
                      • Instruction ID: cac8045b63e8dd798e25fd2ea31d5cc4731eba77fec334f5ef4b73ff25719137
                      • Opcode Fuzzy Hash: 2a6855fdbef10d79e99931844864ae352d35de6d32c5396d16222bd7c87a62b6
                      • Instruction Fuzzy Hash: A9B1A130B10214DFEB44AF64C998B79B7B6EF89704F545059F6029B3A1DBB2DC44CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fefd941acf79c7295805c2aaad6443fe3018342dc875e76c8c06e7e40ab75ebe
                      • Instruction ID: c33ce8118c0f5d63973662b171d44d03f06dd2c454c27cab189a5cf9e517e1a6
                      • Opcode Fuzzy Hash: fefd941acf79c7295805c2aaad6443fe3018342dc875e76c8c06e7e40ab75ebe
                      • Instruction Fuzzy Hash: EFB1A130B50214DFEB44AF64C998B79B7B6EF89704F544059FA029B3A1DBB2DC44CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1a816f0317c6e33761236e46e6352ec193a7679dd0c737d43688ec363f3fb903
                      • Instruction ID: 6a3592c7130bc2dc6a4821f354ae50849b543aa5542abcb3273d4d9cf99f78c9
                      • Opcode Fuzzy Hash: 1a816f0317c6e33761236e46e6352ec193a7679dd0c737d43688ec363f3fb903
                      • Instruction Fuzzy Hash: 40B1A030B10214DFEB44AF64C998B7AB7B6AF89704F544059F6029F3A1DBB2DC44CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d5418393461cf75cc2a68526f1b8bd9134b5fffa88e12d4952b446c1bdc34284
                      • Instruction ID: 7529ae16374abc3712cacad7aced5f81a101b3b4ef8394dec4da0a540692ea09
                      • Opcode Fuzzy Hash: d5418393461cf75cc2a68526f1b8bd9134b5fffa88e12d4952b446c1bdc34284
                      • Instruction Fuzzy Hash: 047182757001049FCB44DF58C998E9EB7F6FF8A700B218199F606AB361CA71EC42CB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3effbf8e1325d73132c45321ab5db7b44cecd0aa89007f7cc70b2051b2788da4
                      • Instruction ID: 0a648ebe16d570d5dc0cfc91431fbf05a128b9207506030fa3dd4598ddb9739b
                      • Opcode Fuzzy Hash: 3effbf8e1325d73132c45321ab5db7b44cecd0aa89007f7cc70b2051b2788da4
                      • Instruction Fuzzy Hash: 83916D74A01228CFDBA4DF64C994BDEB7B2AB4A301F6095E9C509AB351DB319E85CF40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e09d253e16e04e423c6f6f0a1dee581716b974e7354077b43b11197bba1d411
                      • Instruction ID: d1e214e1477e526ae97949306e876838cbac8a450894e26b4784c2f49355a3b6
                      • Opcode Fuzzy Hash: 3e09d253e16e04e423c6f6f0a1dee581716b974e7354077b43b11197bba1d411
                      • Instruction Fuzzy Hash: A3713275B001149FCB44DF58C998E9DB7F6EF8A700B218199F606AB365CB71EC42CB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aa21fa02b4f87ed4a3d47599a8a7e4576a44d0aad5f80e895626de3a3de0f53e
                      • Instruction ID: 8558a58be5e0600726ceeff20e14d882d0b2649cc9fd49c7f4b29b01bad33c2b
                      • Opcode Fuzzy Hash: aa21fa02b4f87ed4a3d47599a8a7e4576a44d0aad5f80e895626de3a3de0f53e
                      • Instruction Fuzzy Hash: 0D514635B102189FDB14DF69C884AAEBBB2FF88710B158069F905EB361DB31EC45CB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 235360f28e47c58978b2591f308f4716b987e7ecd61f5a93f0f79c5f314a93f2
                      • Instruction ID: 91b6e7e91a5cca078f526415d9512c6b7cd634bd95c9d386f998f43bb22225bf
                      • Opcode Fuzzy Hash: 235360f28e47c58978b2591f308f4716b987e7ecd61f5a93f0f79c5f314a93f2
                      • Instruction Fuzzy Hash: EB518835900328CBEB25DF64DC10BDEBBB2FB89300F5085A9D80A67794EB315A85CF95
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2bfe4c64441dd203c9c2c1313331901de6567a66991ac24683e69bcd023ce025
                      • Instruction ID: 625c9d56d54e7f8e4c4b34464a6a5c15756a5c499fe574857e857d89d0dcf4d9
                      • Opcode Fuzzy Hash: 2bfe4c64441dd203c9c2c1313331901de6567a66991ac24683e69bcd023ce025
                      • Instruction Fuzzy Hash: 184116307003109FEB54A7A9D994B7AB6B7EBC9704F204069F6128B3A1DFB1DC029B51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 507f7116f8758b5c67a854bfe5b1dd58a1b77ea4823aecab7c4e13432caf41f9
                      • Instruction ID: dfd8ec6e9b7a7fb6e35815e507b0b9cc8d1467ccf2e916dd9c9f87724377eb39
                      • Opcode Fuzzy Hash: 507f7116f8758b5c67a854bfe5b1dd58a1b77ea4823aecab7c4e13432caf41f9
                      • Instruction Fuzzy Hash: 44410674E052189FDB48DFA9D894AEEBBF2FF89300F10A029E901B7350DB305945CB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7d2321ef3b9559bafcb79b9e863e2cf494446149144cc66ed9ca59f4dd387024
                      • Instruction ID: 0fc2d893f10143220f9b5b0ddebeec09333a599c79329938d663f8d1d7103bc4
                      • Opcode Fuzzy Hash: 7d2321ef3b9559bafcb79b9e863e2cf494446149144cc66ed9ca59f4dd387024
                      • Instruction Fuzzy Hash: 5951C074E01228CFEB68DF25C950B9ABBB2BF89300F5091EAC549AB250DB315E85CF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b6d810e83b7889c95b45aa61b85774bc853f4b93daeb82a72ff3096c5cf23af1
                      • Instruction ID: e5e7d7c8036ca429999659696cecd280d4edc5038de3fc23c8f3e44e39dd177c
                      • Opcode Fuzzy Hash: b6d810e83b7889c95b45aa61b85774bc853f4b93daeb82a72ff3096c5cf23af1
                      • Instruction Fuzzy Hash: 32411435B402148FCB44DF69D998AAEBBF6FF88714B158069E506DB361DB31EC00CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f07a072cd0e6da2ab11078cd151b37c501fb9174affcb35e1048d312a528285b
                      • Instruction ID: e4b38dc75ae642c5ca59452b0a82b4847d56cb90d88f26297df1421e2e7387bb
                      • Opcode Fuzzy Hash: f07a072cd0e6da2ab11078cd151b37c501fb9174affcb35e1048d312a528285b
                      • Instruction Fuzzy Hash: 24413970E4022ACFDB68DF25C951BEDB7B2AF89300F1090E9C159A7650EB714E85CF81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ce94b9b525694b5e89a3e525b2984e9164b692c226fdbe1e9e1be5c29fdd2a33
                      • Instruction ID: 59b2455dc8965f6c7af88129383b814215f31b9b53d579c50ba44305b3f6c087
                      • Opcode Fuzzy Hash: ce94b9b525694b5e89a3e525b2984e9164b692c226fdbe1e9e1be5c29fdd2a33
                      • Instruction Fuzzy Hash: 74411675E01218CFDB58DFAAD980AEDBBF2BF88340F14912AD504AB354D7345946CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 68e7c7be80aba579f19079c62747bc5c5d482f24750fa743fc5ba31595a26e91
                      • Instruction ID: 42ea13f7281b72e6f36071f4068a3b705634af1c78199114a99c7412dfde3cf9
                      • Opcode Fuzzy Hash: 68e7c7be80aba579f19079c62747bc5c5d482f24750fa743fc5ba31595a26e91
                      • Instruction Fuzzy Hash: D331F370D01219DFCB58DFB4E854AEEBBB1EF89301F10952AD911A3790DB359945CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ca9f9798f5c0d719739522e0f127fa5856ab684c06cac56431e3d67547e210c5
                      • Instruction ID: fdb06c13d4c336e2b318a50517500e06dcc23ecf0c5bdf7c784ba5916521c972
                      • Opcode Fuzzy Hash: ca9f9798f5c0d719739522e0f127fa5856ab684c06cac56431e3d67547e210c5
                      • Instruction Fuzzy Hash: 7631C0B0D01219DFCB58DFA4E454AEEBBB2FF89301F10952AE915A3390DB359941CFA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f1209b6a91e10ea073247b6b30f2bc65ee748dd4a5597c15e0dfffcdf804dfb1
                      • Instruction ID: d1812ce00b7f4d10309c980ca95879ae589bf9ba01545d6929610f010204f717
                      • Opcode Fuzzy Hash: f1209b6a91e10ea073247b6b30f2bc65ee748dd4a5597c15e0dfffcdf804dfb1
                      • Instruction Fuzzy Hash: 191193716102058BCB14EB78C5599AEB7F6EFC4211B008969D606DB790EF74EC058B91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586331508.0000000006A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A30000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6a30000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 082270e93977a7d7a8b094f845effb1756155df106cfefa74a1ba8151f620ea1
                      • Instruction ID: 4bee64e2abf20bd077886085190eb9fdb30af6f5732cc0f4e5a75527ae907dee
                      • Opcode Fuzzy Hash: 082270e93977a7d7a8b094f845effb1756155df106cfefa74a1ba8151f620ea1
                      • Instruction Fuzzy Hash: E921F530B04294DFDB54EB69D95486EBBF6EFC5210B1645BAE415CB7A2EB30CC10C791
                      Memory Dump Source
                      • Source File: 00000000.00000002.1578512875.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_104d000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b1f7b55289bd7952bddd9d6a50033cbbfd49b5ee25a37bac45324696bcc0148f
                      • Instruction ID: 8944c0bdd4ede9da4d2ce6050920aded4ad23efb37df0f55b0b54f8468df37e5
                      • Opcode Fuzzy Hash: b1f7b55289bd7952bddd9d6a50033cbbfd49b5ee25a37bac45324696bcc0148f
                      • Instruction Fuzzy Hash: 2C2106B1504204DFDB05DF54D9C0B5ABBA5FBD4324F20C1B9E9490B256C736E456CBA2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1578558473.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_105d000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cfafcd6005c2c5ad4afabac6505ec1e77ba8af6c43e0e3a10c4edfb0307df8ed
                      • Instruction ID: 3611b2cc1c91fd7e283030f18660682c16957ecbe7badaf43a69da6a106c46fc
                      • Opcode Fuzzy Hash: cfafcd6005c2c5ad4afabac6505ec1e77ba8af6c43e0e3a10c4edfb0307df8ed
                      • Instruction Fuzzy Hash: 53210371504300DFDB95DF54D4C0B17BBA5FB84214F20C5AAEC894B242C336D447CB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 35c492980886f952e1aabf4b45846fdfa7db4b3e910a67e97e897c73464f0ddb
                      • Instruction ID: 1f0d403ed98f77c588247ebb97a7339ce917e249e68742d304fd4e8e2cd640bd
                      • Opcode Fuzzy Hash: 35c492980886f952e1aabf4b45846fdfa7db4b3e910a67e97e897c73464f0ddb
                      • Instruction Fuzzy Hash: 94218771D002199FCB88DFA8C8546EEBBB2EF89300F10946AC115B7790CB394A09CFA0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 11a7365d95fdedf6ab7cc7a02292435a11995708192d2e4e77e0244763c94a84
                      • Instruction ID: e811ad287e9aea2e1c5b2cab1960a5fefd1fcc7857aa2482a6bc64ee36303e95
                      • Opcode Fuzzy Hash: 11a7365d95fdedf6ab7cc7a02292435a11995708192d2e4e77e0244763c94a84
                      • Instruction Fuzzy Hash: 1421F3706102018FC710EB78C4649EABBF5EFC5210B0489A9D506DB790EB70EC09CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9727f36f46bb559736fa1aca2353a7db6b881e79f29f75078816d705869e8765
                      • Instruction ID: 5f89d9026251cab925daa614d1c2da4c2b38a0dba11fc146f733522aab1ada70
                      • Opcode Fuzzy Hash: 9727f36f46bb559736fa1aca2353a7db6b881e79f29f75078816d705869e8765
                      • Instruction Fuzzy Hash: 41213674D012189FCB45DFA4D818AEEBBF1FF49311F00956AE511B7240DB384A44CFA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7284f169edda5ac859245e56cb4a57ed7d347034d7a9b517fa69b7ff4dab2afb
                      • Instruction ID: ad30ba83775fc1519b82c5ca6c7e019678e83b197a32eb34c31f570f167edc0b
                      • Opcode Fuzzy Hash: 7284f169edda5ac859245e56cb4a57ed7d347034d7a9b517fa69b7ff4dab2afb
                      • Instruction Fuzzy Hash: AB211570E002199FCB48DFA9C8546EEBBB2EF89310F00942AC515B7390DB395A45CFA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9253b5645bf7130f489f63786ee3ce01c6721c589bd4492ad3ee31741c1fdd38
                      • Instruction ID: e1a5ab0d06353455e50921f00a5af1d8196d5c6e3c4de9b7658b1b936919a700
                      • Opcode Fuzzy Hash: 9253b5645bf7130f489f63786ee3ce01c6721c589bd4492ad3ee31741c1fdd38
                      • Instruction Fuzzy Hash: AF21CF74D112299FCB54DFA9D848AEEBBF1BF89301F10942AE912B3740DB345A44CFA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1578558473.000000000105D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0105D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_105d000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c2912e38f4deac7eacea8017974d56c039d5aa8cc37585f40f67efd65472b75c
                      • Instruction ID: 20898105b869045504d06cfe9eac2167d7a69803a5b4e0788eb2821041b1d87a
                      • Opcode Fuzzy Hash: c2912e38f4deac7eacea8017974d56c039d5aa8cc37585f40f67efd65472b75c
                      • Instruction Fuzzy Hash: 5121D4755083808FCB43CF24C990705BFB1EB45214F28C5DBD8898B6A3C33AD40ACB62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3d676adfd08343aaa67216725625bfdb11d34d30c7e27b7730131570765c0825
                      • Instruction ID: 3ee200449ab5201ce39b38af7b65c3fd71f49fb89e9a0d213155731ab326617a
                      • Opcode Fuzzy Hash: 3d676adfd08343aaa67216725625bfdb11d34d30c7e27b7730131570765c0825
                      • Instruction Fuzzy Hash: C4111275E002499FCB48DFA8D951AEEBBB1FF89300F2051AAC520B7390CB305E05CBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1578512875.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_104d000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                      • Instruction ID: 8f1e9d4f491bc3172df5e8cfa1f3da3b74e179db2d50174860b54e0d4478c38f
                      • Opcode Fuzzy Hash: 01a772179decf110bb882872cb952e1b13b119dd61991aef1ad72797cf3e64a4
                      • Instruction Fuzzy Hash: F711E1B6404240CFCB02CF54D5C4B56BFB1FB94324F24C2A9D8490B657C33AE45ACBA1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c6b81e792e7204e7a289fa7647f63fcda95bc68a976a35c8884fa97a43cf3142
                      • Instruction ID: 01fcfef488dd120a81aa422b8cdbc53def3ee6423b670623767e583e383d6f02
                      • Opcode Fuzzy Hash: c6b81e792e7204e7a289fa7647f63fcda95bc68a976a35c8884fa97a43cf3142
                      • Instruction Fuzzy Hash: FA119D75E002199FCB48EFA8D854AEEB7B1BF89300F2091A9D915B7350DB316E05CBA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8c724037a6e11b46d6ea5e4da0b34c975c4165e91bd350fb9bb42733d8af98d6
                      • Instruction ID: b4d4a8419f4d90312943013d67ea5ce2177678825d1d4df06e38925e6bff9ce4
                      • Opcode Fuzzy Hash: 8c724037a6e11b46d6ea5e4da0b34c975c4165e91bd350fb9bb42733d8af98d6
                      • Instruction Fuzzy Hash: 2C117971E00209CFCB44CFA5D4446EEBBB1EF89310F10A06AD512B3740DB304989CBE1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d458f2cd404299515ccbd07a5133b8527e9072a7c0a9f221e531d5e799965235
                      • Instruction ID: cb2b890aca26bab64da7947fd50fa3f83856449cc2d32c8f09de644616b7854c
                      • Opcode Fuzzy Hash: d458f2cd404299515ccbd07a5133b8527e9072a7c0a9f221e531d5e799965235
                      • Instruction Fuzzy Hash: 0311F575E002199FCB44DFA5D444AEEFBF1EB88310F10502AD515B3340EB359A84CBA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0afaee2b69f29d00fd2a14c5e077d7a2420aa6e567af0ddf8e50f64b20ed2e17
                      • Instruction ID: edf62313c215d3bf87ad318b32d8c64e77248060fbac12faf3adb32eb37aad15
                      • Opcode Fuzzy Hash: 0afaee2b69f29d00fd2a14c5e077d7a2420aa6e567af0ddf8e50f64b20ed2e17
                      • Instruction Fuzzy Hash: 7D113670C0624A8FCB55CFB4C444AEEBFB1FF06345F1085AAD511A3290C7394A46CF94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6cd8e1aae476f7ca9ff4ec55c2eb408f835c349d0d7ad864231b4751656a19e6
                      • Instruction ID: 2dc48f54141a57560db60a338d6efd34a5fc0a4784f146faf0d38707b5e17ad1
                      • Opcode Fuzzy Hash: 6cd8e1aae476f7ca9ff4ec55c2eb408f835c349d0d7ad864231b4751656a19e6
                      • Instruction Fuzzy Hash: 0A1166B0D0524A8FCB94DFB4C4546AEBFB1FB06300F1091AAD515A7290DB358A8ACF94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4c0bc4dcb6d7288e88de8912b1a04c0d9cd3096f0e8fb94e005af97373452ebf
                      • Instruction ID: d95a6cdac31d94d53716d321a1d118505f25af1548372aea45092cafd64c25cf
                      • Opcode Fuzzy Hash: 4c0bc4dcb6d7288e88de8912b1a04c0d9cd3096f0e8fb94e005af97373452ebf
                      • Instruction Fuzzy Hash: 6711F3B0D01209DFCB98EFB8D4596AEBBB1FF09301F10946ED515A3280DB358A46CFA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1578512875.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_104d000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ff3dcb357b0e6027522c92cd36fb9c90ecbbc2425d4d9767d837267a00903abf
                      • Instruction ID: 3b02c7c0c874fd8249eec36ff31d935434132e0b1bc0e10b5e4fb83242bb2605
                      • Opcode Fuzzy Hash: ff3dcb357b0e6027522c92cd36fb9c90ecbbc2425d4d9767d837267a00903abf
                      • Instruction Fuzzy Hash: 1101A7B110C340EBE7208AA6C8C476ABFD8DF51634F18C56AED894A696C3799850C772
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7ab69345772753bbba0e935a10d9c56f518ac41e9a4b0c5e789003e84c762695
                      • Instruction ID: 75a66b1855aa699ab6f16da7c465cec8632b73cbaf69a32fae3e6310bb09b91a
                      • Opcode Fuzzy Hash: 7ab69345772753bbba0e935a10d9c56f518ac41e9a4b0c5e789003e84c762695
                      • Instruction Fuzzy Hash: B611A270D01209DFCB94DFB8D4496AEBBF1FF09301F1094AAD515A3290D7399A45CF94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f73aa512dcf479f87b22a93a5842dce00c0a514665f969f2975bc891c0c89cdd
                      • Instruction ID: 90b5434556ef89e0d71d29e22fb281bc8d0f291c873438e7911372c3ed822876
                      • Opcode Fuzzy Hash: f73aa512dcf479f87b22a93a5842dce00c0a514665f969f2975bc891c0c89cdd
                      • Instruction Fuzzy Hash: 780113B5E002198FCB44DFA4D4446EEBBF1AF48310F10A42AD611B3740EB348A84CBE4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 60351c12356eb00b4666afc0a7a9b69daf97953b035316a22095fee2fff5bd4a
                      • Instruction ID: 441f1e953f7d2e4b0ec899cd7f37f89fbfda342617d7b3ad8a62b0f9488fd271
                      • Opcode Fuzzy Hash: 60351c12356eb00b4666afc0a7a9b69daf97953b035316a22095fee2fff5bd4a
                      • Instruction Fuzzy Hash: B301DC70D09355AFCBA1DFB8C8416DEBFB0EF02310B2096AAD820E7282D7394502CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d10a482ccec854ce373e8944d69134ae645bcfd7b5bd2f4fe3ebe133726a242f
                      • Instruction ID: 615a37bbbe8c78837379c2699ed13709713d2beb0415fc1ac2354d61698d1489
                      • Opcode Fuzzy Hash: d10a482ccec854ce373e8944d69134ae645bcfd7b5bd2f4fe3ebe133726a242f
                      • Instruction Fuzzy Hash: 0001A970C08389AFCBA1DFB8D80469DBFB0FF06305B545AAEC920EB691D7394505CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1578512875.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_104d000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bae6138962040bd38beaf985c310df365a6e6e249c08964099773ecbc924e5fb
                      • Instruction ID: 95320447b18d4ee660caf46e11f57befbe41462d7fa49d7a303fb9b795a76d1e
                      • Opcode Fuzzy Hash: bae6138962040bd38beaf985c310df365a6e6e249c08964099773ecbc924e5fb
                      • Instruction Fuzzy Hash: C2F0C2B2008340DFE7208A4AC8C4B66FFE8EB51634F18C05AED484B293C2799840CBB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aecff17aaae0006f3fa7a43dfe2e48484264d322a6559d1f62dc4078b146f76a
                      • Instruction ID: 7b15b6aabafb0ae997bb090c972df1259416db906884665406739742ff271a7c
                      • Opcode Fuzzy Hash: aecff17aaae0006f3fa7a43dfe2e48484264d322a6559d1f62dc4078b146f76a
                      • Instruction Fuzzy Hash: F1F09070C093959FCB56CFB8D80469EBFB0EF02310B1442EED460A76A1D7394601CB85
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: aa0bf7447ea1ad5f2dddb3e2cf41ce70b2bdbed129f397632b15c5ddd43c7b79
                      • Instruction ID: 4f0ba9b5eeb55d1421221f8111c77881b28537910a513533e9e05bf0098c812c
                      • Opcode Fuzzy Hash: aa0bf7447ea1ad5f2dddb3e2cf41ce70b2bdbed129f397632b15c5ddd43c7b79
                      • Instruction Fuzzy Hash: 04F01C70D01208EFCB94EFB8D8056EEBBF4FB05300F0095AAD825A3240EB744541CF84
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 446d213b78201ae6205dc834c589a81b06152108f489f8f4613979afff198b2a
                      • Instruction ID: 9b85dad98471af7eec2e710bd6170767173c49b8ed80fe20f30fddcdc47fcad3
                      • Opcode Fuzzy Hash: 446d213b78201ae6205dc834c589a81b06152108f489f8f4613979afff198b2a
                      • Instruction Fuzzy Hash: A9F01C70D013189FCB84EFB4D805AAEBBB4FF05300F4099AAD924E3240D7744640CF85
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7fc77905388eecd9c559b9372d92948331333b48f6f0cd90f75e22d054e7bed5
                      • Instruction ID: 4f1f6a968c614999b9b7581f184e9b94c5b9dd097a5716ced68a070342b311c3
                      • Opcode Fuzzy Hash: 7fc77905388eecd9c559b9372d92948331333b48f6f0cd90f75e22d054e7bed5
                      • Instruction Fuzzy Hash: 7DF01C70D012089FCB84EFB8D805AAEBBB4FB05300F1095AAD424A3640E7754640CF84
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 96c78d51745c3e54a4d025ca2bcffdd55d140813a122beb3e4c80a70974e31d5
                      • Instruction ID: 904c03d7b8eaa497b25b5e2fb5acfb16fb91a6db5a8fcedc7250fd439fcaab4d
                      • Opcode Fuzzy Hash: 96c78d51745c3e54a4d025ca2bcffdd55d140813a122beb3e4c80a70974e31d5
                      • Instruction Fuzzy Hash: E1F0A57098535ECFEB749F60D959BFDBB70AF02305F2024A9C10A66984DF748984CE95
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89ba5cb33769200ac5fd333ac9ef000cac690fa65eeec40cdd183709ad55af09
                      • Instruction ID: cdfb55043756346ffafa5a9300e13b8f26ca5af3130ebf2185db101de98b43e2
                      • Opcode Fuzzy Hash: 89ba5cb33769200ac5fd333ac9ef000cac690fa65eeec40cdd183709ad55af09
                      • Instruction Fuzzy Hash: 79F06D30D45319CFEB208F24C8587EEBB71BF46344F1038A9C2057A580CBB44984CF96
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 367f26197e3cea17ee75ba1c6decfa97dc1d0d5e4a4f06750f714dcec8fb2f9b
                      • Instruction ID: 7b545f3ab96452e0ba54ca02c2155f67cb2e69a55ef3b1cae7c1ddb67563c297
                      • Opcode Fuzzy Hash: 367f26197e3cea17ee75ba1c6decfa97dc1d0d5e4a4f06750f714dcec8fb2f9b
                      • Instruction Fuzzy Hash: 6942BE74E01229CFDB68DF64C854BDEB7B2BB89300F5091EAD54AAB250DB315E85CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d77ea80b128ce6f19d390ea042fa6e349e66acc8767bc7dcc633541ebe634b8b
                      • Instruction ID: c2a2201234883130942cf4798cd4f41d36eef55f9f151a8b456ef759107ba669
                      • Opcode Fuzzy Hash: d77ea80b128ce6f19d390ea042fa6e349e66acc8767bc7dcc633541ebe634b8b
                      • Instruction Fuzzy Hash: 75E12C74E403099BEB18DBB4D896BAEBB72FFC8700F806129E445AB395CE315D41DB64
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1eea0f7fe150935eb80ac955dbf3da9a18d67de160d5873aa740aeece34fd57e
                      • Instruction ID: 1c3228b58197b617ce2f95a873e50a909ca767ed79b696da04caf4824c9152af
                      • Opcode Fuzzy Hash: 1eea0f7fe150935eb80ac955dbf3da9a18d67de160d5873aa740aeece34fd57e
                      • Instruction Fuzzy Hash: E7E12C74E403099BEB18DBB4D896BAEBB72FFC8700F806129E445AB395CE315D41DB64
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 559c3c26637f86f6361cfb4a8f78d954271e28a67427e8f4e3eff74e590acd26
                      • Instruction ID: 7690253820708b9df9916ee3f6e2b1afa7c641d347e74ac4cde17bab2bae7496
                      • Opcode Fuzzy Hash: 559c3c26637f86f6361cfb4a8f78d954271e28a67427e8f4e3eff74e590acd26
                      • Instruction Fuzzy Hash: 82F1D370A01229CFDB68DF64C850BDEBBB2BF89300F5095A9D549AB354DB315E85CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3cb7c92545ee04a929a701d8292ab3b99c042ddb6014e9ee841844e8e682a2ad
                      • Instruction ID: 3197295006a19f42f2fb2cb05677250045b4c2d9a0387e45352ee28538b83c76
                      • Opcode Fuzzy Hash: 3cb7c92545ee04a929a701d8292ab3b99c042ddb6014e9ee841844e8e682a2ad
                      • Instruction Fuzzy Hash: 1AD1C174E01218CFDB68DFA5C884B9DBBB2FF8A301F1095AAD509A7354DB319985CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e257802abbf2d85f2322c4ae6fcd07f8b288a410e96efd96c906ed77e452e3f1
                      • Instruction ID: dbb818922aee4074e076d42ad8b61f781f68424f216f2526e82c6442f3e7038b
                      • Opcode Fuzzy Hash: e257802abbf2d85f2322c4ae6fcd07f8b288a410e96efd96c906ed77e452e3f1
                      • Instruction Fuzzy Hash: FFD19E74E01218CFDB64CFA9D984B9DBBB2FF89300F1091AAD509AB355DB309A85CF50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ae11d0cb3251dc73dbba2552200b4dee8b94eaf4df0fc6d00d2bda8a38247bf
                      • Instruction ID: d3921c8cb3d8c7828dacab1ae6c0f966a191334433d8bd877e4fdfbc5a5d6527
                      • Opcode Fuzzy Hash: 5ae11d0cb3251dc73dbba2552200b4dee8b94eaf4df0fc6d00d2bda8a38247bf
                      • Instruction Fuzzy Hash: 77B16A70E00209CFDB64CFA8C8857EDBBF2AF88324F149529E915E7694EB749845CF85
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 032d58feba5dd63e7d451844f173709ecb531ef97148880707e9ab8b0348a07a
                      • Instruction ID: d2b605ba6d73cfe39f2ecdf93c542b4a26c632cf869f2988a55f0ebcd2a74040
                      • Opcode Fuzzy Hash: 032d58feba5dd63e7d451844f173709ecb531ef97148880707e9ab8b0348a07a
                      • Instruction Fuzzy Hash: 20C1E570D01229CFEB68DF65C954BDEBBB6BF89300F5091EAC509AB250DB315A85CF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8b1fad72cd14bbcd204febbbf7ae7cf1ff84658a1c5e2eeafdb90ffbeb774d7f
                      • Instruction ID: 55828806db8fd897cd8f4c8f93232d62ca1222dbc145dc6a60319cbbe3f05f18
                      • Opcode Fuzzy Hash: 8b1fad72cd14bbcd204febbbf7ae7cf1ff84658a1c5e2eeafdb90ffbeb774d7f
                      • Instruction Fuzzy Hash: 21B19D70E04209CFDF64CFA9C8817EDBBF2AF88314F14A529E914E7694EB759845CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1579109894.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1210000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ae1d1052519e535a70da0ea7d45e5031418203badd09a7737724d2fb0e628f12
                      • Instruction ID: 44daa4c50e66c192210f3e6430b9fc0ce584a9cacdb5264cf325505bba97f5e6
                      • Opcode Fuzzy Hash: ae1d1052519e535a70da0ea7d45e5031418203badd09a7737724d2fb0e628f12
                      • Instruction Fuzzy Hash: 84A16F32A1021ACFCF05DFB4D9445EEBBF2FF94300B15856AE915AB269DB71D905CB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8008d193cb9917de3716bfdad35c590fd323c48d3229af2cc216742a1e042a1e
                      • Instruction ID: 3fbf013e6aeb0b46c2dbacf45ed53cb9e0e239aa18436bd5b0cc9d06952713b7
                      • Opcode Fuzzy Hash: 8008d193cb9917de3716bfdad35c590fd323c48d3229af2cc216742a1e042a1e
                      • Instruction Fuzzy Hash: 03917C70E00209DFDF64CFA9C8857DEBBF2AF88324F149529E505AB694EB749845CB81
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 49cb508389ca1f6bab07e39f54165f297a68f0705316d4d3065adc7b30e7e352
                      • Instruction ID: c91e4145dcfac361a6f825d8f38f58a1b9ce01c85d9b37c3f3d6862a68f66051
                      • Opcode Fuzzy Hash: 49cb508389ca1f6bab07e39f54165f297a68f0705316d4d3065adc7b30e7e352
                      • Instruction Fuzzy Hash: DF61E370E01218DFDB44DFA5C484ADDBBB2FF89300F649169D505BB260DB30A946CF94
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4d9a35dcb8227b78a0c512f8c8dbd3b81dfc5018e59030d599b48eff36e34be7
                      • Instruction ID: ba3d987d89caf8dc3b6e18c0db3edded8d4ec28083bd74787547cefe78109f37
                      • Opcode Fuzzy Hash: 4d9a35dcb8227b78a0c512f8c8dbd3b81dfc5018e59030d599b48eff36e34be7
                      • Instruction Fuzzy Hash: 5191E570E01228CFEB68DF65C954B9EBBB2BF89300F1091EAC149AB254DB354E85DF51
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ab779e16c2a0cedc41ff07f01a3b625123eeef24dd2ab93567d93ecf821d8535
                      • Instruction ID: 3c0da1364d7a1f5f4084d3fa8ce39f5676b72b4ad8c77e3fa59e741d0aeedabc
                      • Opcode Fuzzy Hash: ab779e16c2a0cedc41ff07f01a3b625123eeef24dd2ab93567d93ecf821d8535
                      • Instruction Fuzzy Hash: 2591D570D012298FEB68DF65C954BDEBBB2BF88300F10C1EAD549AB250DB354A85DF90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3defea95b0a18d1a13f5a933b1a81fa0de7311319b7e92b64f6fe5b50eba20c1
                      • Instruction ID: 2ce2528ce41d3c7ed96de956bff3a1c571d2388b4c024b89d5d96d74c951d086
                      • Opcode Fuzzy Hash: 3defea95b0a18d1a13f5a933b1a81fa0de7311319b7e92b64f6fe5b50eba20c1
                      • Instruction Fuzzy Hash: E961E771E00218CFEB68DF65C941BDEBBB2BF88300F1091A9D509AB254DB315E86CF91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 81ee76fb327525fb27203f7abad7a40db22f6e531d71dcd33784cb2bcb172873
                      • Instruction ID: df70114d75a9e2f9681cc7ce1689211657d8f21955afc447ccb98f071420b234
                      • Opcode Fuzzy Hash: 81ee76fb327525fb27203f7abad7a40db22f6e531d71dcd33784cb2bcb172873
                      • Instruction Fuzzy Hash: 42E09230C8910ECEEB14CF61D0007FEFA786B86304F607406CA05B7A80CB7086448EE9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1586254406.00000000063B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063B0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_63b0000_w4oDGAPUMH.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 334d209ccdcda51c6a1f3a6579d39c4aa1d01cb66c9b96cef7ac6afd01aeb381
                      • Instruction ID: eb14750a136cab42a4328c7da0b5f320d886749ad8a5b266788e254839d521b6
                      • Opcode Fuzzy Hash: 334d209ccdcda51c6a1f3a6579d39c4aa1d01cb66c9b96cef7ac6afd01aeb381
                      • Instruction Fuzzy Hash: 72F0C970C44219CFEB608F50DC597FDBA74AB06309F107459D20A73995C7B44685CFD5