Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z1quote93039-pdf.exe

Overview

General Information

Sample name:z1quote93039-pdf.exe
Analysis ID:1522584
MD5:1b772b5b66b9adc3b67eae3627e75059
SHA1:87cc3b9ceef68d8640aca684e42e15e0b3b4ed13
SHA256:17ea3ecae5fa2fbe640e5bfdf146dae281256aad17813aa6a30f6c5045845670
Tags:exeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z1quote93039-pdf.exe (PID: 6512 cmdline: "C:\Users\user\Desktop\z1quote93039-pdf.exe" MD5: 1B772B5B66B9ADC3B67EAE3627E75059)
    • RegSvcs.exe (PID: 3276 cmdline: "C:\Users\user\Desktop\z1quote93039-pdf.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.zqamcx.com", "Username": "kingship@zqamcx.com", "Password": "Methodman991"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3265593518.0000000002D28000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x333b5:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x33427:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x334b1:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x33543:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x335ad:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x3361f:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x336b5:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x33745:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548

                System Summary

                barindex
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 78.110.166.82, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 3276, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49704
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.zqamcx.com", "Username": "kingship@zqamcx.com", "Password": "Methodman991"}
                Source: zqamcx.comVirustotal: Detection: 9%Perma Link
                Source: mail.zqamcx.comVirustotal: Detection: 9%Perma Link
                Source: http://mail.zqamcx.comVirustotal: Detection: 9%Perma Link
                Source: http://zqamcx.comVirustotal: Detection: 9%Perma Link
                Source: z1quote93039-pdf.exeVirustotal: Detection: 29%Perma Link
                Source: z1quote93039-pdf.exeReversingLabs: Detection: 47%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: z1quote93039-pdf.exeJoe Sandbox ML: detected
                Source: z1quote93039-pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: z1quote93039-pdf.exe, 00000000.00000003.2076116971.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2075742491.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2074218107.00000000045D0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: z1quote93039-pdf.exe, 00000000.00000003.2076116971.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2075742491.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2074218107.00000000045D0000.00000004.00001000.00020000.00000000.sdmp
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 78.110.166.82:587
                Source: Joe Sandbox ViewIP Address: 78.110.166.82 78.110.166.82
                Source: Joe Sandbox ViewASN Name: UKSERVERS-ASUKDedicatedServersHostingandCo-Location UKSERVERS-ASUKDedicatedServersHostingandCo-Location
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 78.110.166.82:587
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: mail.zqamcx.com
                Source: RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.zqamcx.com
                Source: RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265177834.0000000000F99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.i.lencr.org/0#
                Source: RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265177834.0000000000F99000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://r11.o.lencr.org0#
                Source: RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3267579333.0000000006261000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3267579333.0000000006261000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://zqamcx.com
                Source: RegSvcs.exe, 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                System Summary

                barindex
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B54A882_2_02B54A88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B59B182_2_02B59B18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B53E702_2_02B53E70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B5CE682_2_02B5CE68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02B541B82_2_02B541B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F3F302_2_060F3F30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F57502_2_060F5750
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F8C082_2_060F8C08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060FDD732_2_060FDD73
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F2B082_2_060F2B08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F9B682_2_060F9B68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F00402_2_060F0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060FBD882_2_060FBD88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F321F2_2_060F321F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F50582_2_060F5058
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_060F49D82_2_060F49D8
                Source: z1quote93039-pdf.exe, 00000000.00000003.2075865717.00000000046FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1quote93039-pdf.exe
                Source: z1quote93039-pdf.exe, 00000000.00000003.2073494595.0000000004553000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1quote93039-pdf.exe
                Source: z1quote93039-pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeFile created: C:\Users\user\AppData\Local\Temp\LymnaeidaeJump to behavior
                Source: z1quote93039-pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: z1quote93039-pdf.exeVirustotal: Detection: 29%
                Source: z1quote93039-pdf.exeReversingLabs: Detection: 47%
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeFile read: C:\Users\user\Desktop\z1quote93039-pdf.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\z1quote93039-pdf.exe "C:\Users\user\Desktop\z1quote93039-pdf.exe"
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1quote93039-pdf.exe"
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1quote93039-pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: z1quote93039-pdf.exeStatic file information: File size 1200301 > 1048576
                Source: Binary string: wntdll.pdbUGP source: z1quote93039-pdf.exe, 00000000.00000003.2076116971.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2075742491.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2074218107.00000000045D0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: z1quote93039-pdf.exe, 00000000.00000003.2076116971.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2075742491.0000000004430000.00000004.00001000.00020000.00000000.sdmp, z1quote93039-pdf.exe, 00000000.00000003.2074218107.00000000045D0000.00000004.00001000.00020000.00000000.sdmp
                Source: z1quote93039-pdf.exeStatic PE information: real checksum: 0xa2135 should be: 0x131c8b
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeAPI/Special instruction interceptor: Address: 4142244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 444Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4734Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99887Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99343Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98794Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98468Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97921Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97812Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97593Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97374Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A4B008Jump to behavior
                Source: C:\Users\user\Desktop\z1quote93039-pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1quote93039-pdf.exe"Jump to behavior
                Source: z1quote93039-pdf.exeBinary or memory string: @3PDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002D28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3276, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3276, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002D28000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3276, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                212
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                211
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                121
                Virtualization/Sandbox Evasion
                1
                Credentials in Registry
                1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Non-Standard Port
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)212
                Process Injection
                Security Account Manager121
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares2
                Data from Local System
                1
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                DLL Side-Loading
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture11
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials124
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                z1quote93039-pdf.exe29%VirustotalBrowse
                z1quote93039-pdf.exe47%ReversingLabsWin32.Trojan.Autoitinject
                z1quote93039-pdf.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                zqamcx.com9%VirustotalBrowse
                mail.zqamcx.com9%VirustotalBrowse
                SourceDetectionScannerLabelLink
                https://account.dyn.com/0%URL Reputationsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.c.lencr.org/00%URL Reputationsafe
                http://x1.i.lencr.org/00%URL Reputationsafe
                http://mail.zqamcx.com9%VirustotalBrowse
                http://zqamcx.com9%VirustotalBrowse
                http://r11.i.lencr.org/0#0%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                zqamcx.com
                78.110.166.82
                truetrueunknown
                mail.zqamcx.com
                unknown
                unknowntrueunknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://mail.zqamcx.comRegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmptrueunknown
                http://zqamcx.comRegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmptrueunknown
                https://account.dyn.com/RegSvcs.exe, 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://r11.o.lencr.org0#RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265177834.0000000000F99000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  http://r11.i.lencr.org/0#RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265177834.0000000000F99000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://x1.c.lencr.org/0RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3267579333.0000000006261000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://x1.i.lencr.org/0RegSvcs.exe, 00000002.00000002.3267579333.0000000006220000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3267579333.0000000006261000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  78.110.166.82
                  zqamcx.comUnited Kingdom
                  42831UKSERVERS-ASUKDedicatedServersHostingandCo-Locationtrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1522584
                  Start date and time:2024-09-30 11:59:08 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 35s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:z1quote93039-pdf.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 54
                  • Number of non-executed functions: 5
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  06:00:02API Interceptor25x Sleep call for process: RegSvcs.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  78.110.166.82COB756883.vbsGet hashmaliciousCobaltStrikeBrowse
                  • windowsupdatesolutions.com/ServerCOB.txt
                  Ingreso_SII_Abril_2021.cmdGet hashmaliciousUnknownBrowse
                  • www.emolcl.com/namaste/puma.php
                  Ingreso_SII_Abril_2021.cmdGet hashmaliciousUnknownBrowse
                  • www.emolcl.com/namaste/puma.php
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  zqamcx.comeFatura_ETN2024000000575_Ekleri.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  SecuriteInfo.com.Win32.MalwareX-gen.16545.12050.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  DOC25082024.bat.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  Halkbank_Ekstre_20240826_081429_424889.bat.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  UKSERVERS-ASUKDedicatedServersHostingandCo-Locationz25RFQ945894-PDF.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  https://client31.webvalue.party/wp-content/uploads/weTranser_edited/weTranser_edited/index.php/Get hashmaliciousUnknownBrowse
                  • 5.101.173.45
                  https://client31.webvalue.party/wp-content/uploads/weTranser_edited/weTranser_edited/index.php?email%5C=3mail@b.cGet hashmaliciousUnknownBrowse
                  • 5.101.173.45
                  450230549.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  CCE_000110.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  https://qrplanet.com/smdv5p/Get hashmaliciousUnknownBrowse
                  • 5.101.173.45
                  22.09.2024-22.09.2024.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  FaturaHat#U0131rlatma.exeGet hashmaliciousAgentTeslaBrowse
                  • 78.110.166.82
                  Payment_Release-Now cnesst.gouv.qc.ca.htmlGet hashmaliciousUnknownBrowse
                  • 5.101.173.45
                  Payment Advice.pdf.jsGet hashmaliciousRemcosBrowse
                  • 178.159.12.230
                  No context
                  No context
                  Process:C:\Users\user\Desktop\z1quote93039-pdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):240128
                  Entropy (8bit):6.540118408936613
                  Encrypted:false
                  SSDEEP:6144:dqnGi1vMoTut2AiEvj4yMV0N4yCFbfI86NhkzED:GGmutkEr4yC0etWSED
                  MD5:62E06E1942E981147CA2DFFF8453F6B1
                  SHA1:E3E8477053643D1A84432E260077AD409D02F8F6
                  SHA-256:A99FF7071866ECAE165C8BE926E92F75CC6B40EFE3C97AD184750CB426809F3F
                  SHA-512:1435F0FDFAC293C30DFC194F1A4C9FE243482CEAA47D563C04D44E1230DEA48E4313527DA6D957A6E124D5EBF6B52C082BFFE3B6D23E0B50016432BD790014DC
                  Malicious:false
                  Reputation:low
                  Preview:y..3UOG9NK3J..90.4L93VOGyJK3JP09024L93VOG9JK3JP09024L93VOG9J.3JP>&.<4.0.w.Fu.jg"9C.@@[+KR;o$X$%\>pR\.@A".Z8o.v.k^%4U.=?>h93VOG9J.vJP|832[./VVOG9JK3J.0;195G93.LG9BK3JP09>.7L9.VOG.IK3J.09.24L;3VKG9JK3JP49024L93VOC9JI3JP09004..3V_G9ZK3JP 90"4L93VOW9JK3JP09024..0V.G9JK.IPv<024L93VOG9JK3JP0902.O9?VOG9JK3JP09024L93VOG9JK3JP09024L93VOG9JK3JP09024L93VoG9BK3JP09024L9;vOGqJK3JP09024L.G3739JK'.S09.24L.0VOE9JK3JP09024L93vOGYd9@83090t1L93.LG9LK3J.39024L93VOG9JKsJPp.BWX#Z3VCG9JK.IP0;024.:3VOG9JK3JP090r4L{3VOG9JK3JP09024L.UOG9JK{JP0;074..1V_v8JH3JP19044L93VOG9JK3JP09024L93VOG9JK3JP09024L93VOG9JK3JP0$....{h.:.@)4.v.^.1..*..6.vE.&.+$..yrA......?M..P.6....0....L.C63Q..tY8'A/j=d<+.-..n.q.G...?$.I..G..ZJ.....lh..|6Dll..G..$V'eR: \\.aU*XA?.E.KK3JP........?7.cgH<Td"Af.....D7....4P09T24LK3VO&9JKtJP0V024"93V1G9J53JPv902tL93aOG9oK3J=090.4L9MVOG.7D<...PC..L93VOr..{.'...o.....`>.G.)....].y..<`.@/.=.....7.._..$.$A...4KV4<250O5.X....j1NT5;767@.=....k......E...5.EJK3JP0.02.L93..G.JK3.P.9..4L9..O.9.K...0
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):7.428196616763776
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 95.11%
                  • AutoIt3 compiled script executable (510682/80) 4.86%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:z1quote93039-pdf.exe
                  File size:1'200'301 bytes
                  MD5:1b772b5b66b9adc3b67eae3627e75059
                  SHA1:87cc3b9ceef68d8640aca684e42e15e0b3b4ed13
                  SHA256:17ea3ecae5fa2fbe640e5bfdf146dae281256aad17813aa6a30f6c5045845670
                  SHA512:cd652cb7f23a7b15478d1a051f76ed2a056f52367f31debdf61b5c66ff979807fd8049363e25d55a2c7fb4c5f10691885111356093261be11e44da622a462208
                  SSDEEP:24576:ffmMv6Ckr7Mny5QLRnYm9fuv1gDri+F4ZWXD:f3v+7/5QLSPyriR8D
                  TLSH:CB45E112F3D680B6D9A33971297BE36AEB3575194327C48BA7E02F778F211009B36761
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-...i...i...i.....9.k...`.:.w...`.,.....`.+.P...N%..c...N%..H...i...d...`. ./...w.:.k...w.;.h...i.8.h...`.>.h...Richi..........
                  Icon Hash:1733312925935517
                  Entrypoint:0x416310
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:TERMINAL_SERVER_AWARE
                  Time Stamp:0x4B93CF87 [Sun Mar 7 16:08:39 2010 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:0
                  File Version Major:5
                  File Version Minor:0
                  Subsystem Version Major:5
                  Subsystem Version Minor:0
                  Import Hash:aaaa8913c89c8aa4a5d93f06853894da
                  Instruction
                  call 00007FEEF8E00FDCh
                  jmp 00007FEEF8DF4DAEh
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push ebp
                  mov ebp, esp
                  push edi
                  push esi
                  mov esi, dword ptr [ebp+0Ch]
                  mov ecx, dword ptr [ebp+10h]
                  mov edi, dword ptr [ebp+08h]
                  mov eax, ecx
                  mov edx, ecx
                  add eax, esi
                  cmp edi, esi
                  jbe 00007FEEF8DF4F3Ah
                  cmp edi, eax
                  jc 00007FEEF8DF50DAh
                  cmp ecx, 00000100h
                  jc 00007FEEF8DF4F51h
                  cmp dword ptr [004A94E0h], 00000000h
                  je 00007FEEF8DF4F48h
                  push edi
                  push esi
                  and edi, 0Fh
                  and esi, 0Fh
                  cmp edi, esi
                  pop esi
                  pop edi
                  jne 00007FEEF8DF4F3Ah
                  pop esi
                  pop edi
                  pop ebp
                  jmp 00007FEEF8DF539Ah
                  test edi, 00000003h
                  jne 00007FEEF8DF4F47h
                  shr ecx, 02h
                  and edx, 03h
                  cmp ecx, 08h
                  jc 00007FEEF8DF4F5Ch
                  rep movsd
                  jmp dword ptr [00416494h+edx*4]
                  nop
                  mov eax, edi
                  mov edx, 00000003h
                  sub ecx, 04h
                  jc 00007FEEF8DF4F3Eh
                  and eax, 03h
                  add ecx, eax
                  jmp dword ptr [004163A8h+eax*4]
                  jmp dword ptr [004164A4h+ecx*4]
                  nop
                  jmp dword ptr [00416428h+ecx*4]
                  nop
                  mov eax, E4004163h
                  arpl word ptr [ecx+00h], ax
                  or byte ptr [ecx+eax*2+00h], ah
                  and edx, ecx
                  mov al, byte ptr [esi]
                  mov byte ptr [edi], al
                  mov al, byte ptr [esi+01h]
                  mov byte ptr [edi+01h], al
                  mov al, byte ptr [esi+02h]
                  shr ecx, 02h
                  mov byte ptr [edi+02h], al
                  add esi, 03h
                  add edi, 03h
                  cmp ecx, 08h
                  jc 00007FEEF8DF4EFEh
                  Programming Language:
                  • [ASM] VS2008 SP1 build 30729
                  • [ C ] VS2008 SP1 build 30729
                  • [C++] VS2008 SP1 build 30729
                  • [ C ] VS2005 build 50727
                  • [IMP] VS2005 build 50727
                  • [ASM] VS2008 build 21022
                  • [RES] VS2008 build 21022
                  • [LNK] VS2008 SP1 build 30729
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x8cd3c0x154.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9298.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x820000x840.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x800170x802006c20c6bf686768b6f134f5bd508171bcFalse0.5602991615853659data6.634688230255595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x820000xd95c0xda00f979966509a93083729d23cdfd2a6f2dFalse0.36256450688073394data4.880040824124099IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x900000x1a5180x6800e5d77411f751d28c6eee48a743606795False0.1600060096153846data2.2017649896261107IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xab0000x92980x9400f6be76de0ef2c68f397158bf01bdef3eFalse0.4896801097972973data5.530303089784181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                  RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                  RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                  RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                  RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                  RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                  RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                  RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                  RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                  RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                  RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                  RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                  RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                  RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                  RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                  RT_STRING0xb28380x43adataEnglishGreat Britain0.3733826247689464
                  RT_STRING0xb2c780x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xb32780x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xb38d80x388dataEnglishGreat Britain0.377212389380531
                  RT_STRING0xb3c600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                  RT_GROUP_ICON0xb3db80x84dataEnglishGreat Britain0.6439393939393939
                  RT_GROUP_ICON0xb3e400x14dataEnglishGreat Britain1.15
                  RT_GROUP_ICON0xb3e580x14dataEnglishGreat Britain1.25
                  RT_GROUP_ICON0xb3e700x14dataEnglishGreat Britain1.25
                  RT_VERSION0xb3e880x19cdataEnglishGreat Britain0.5339805825242718
                  RT_MANIFEST0xb40280x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                  DLLImport
                  WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                  VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                  MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                  WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                  PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                  USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                  KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, GetProcessHeap, OutputDebugStringW, GetLocalTime, CompareStringW, CompareStringA, InterlockedIncrement, InterlockedDecrement, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ResumeThread, GetStartupInfoW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, SetLastError, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetModuleFileNameA, HeapReAlloc, HeapCreate, SetHandleCount, GetFileType, GetStartupInfoA, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, LCMapStringA, RtlUnwind, SetFilePointer, GetTimeZoneInformation, GetTimeFormatA, GetDateFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, GetModuleHandleA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, EnumResourceNamesW, SetEnvironmentVariableA
                  USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, CopyImage, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, PeekMessageW, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, GetMenuItemID, TranslateMessage, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, keybd_event, LoadImageW, GetWindowLongW
                  GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                  ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, SetSecurityDescriptorDacl, CopySid, LogonUserW, GetTokenInformation, GetAclInformation, GetAce, AddAce, GetSecurityDescriptorDacl
                  SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                  ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
                  OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, SafeArrayAccessData, VarR8FromDec, VariantTimeToSystemTime, VariantClear, VariantCopy, VariantInit, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  EnglishUnited States
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 30, 2024 12:00:04.334403992 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:04.339457035 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:04.339524984 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:04.896373987 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:04.896959066 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:04.901901960 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.062889099 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.063066959 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.067979097 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.229546070 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.235908985 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.241631031 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.413662910 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.413676023 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.413695097 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.413768053 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.454911947 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.456653118 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.461582899 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.622407913 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.635878086 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.640666962 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.801407099 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.802545071 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.807418108 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.968107939 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:05.969196081 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:05.974001884 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.142059088 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.144371986 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.149298906 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.310466051 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.310795069 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.315843105 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.481287956 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.481585026 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.486500978 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.647078991 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.647787094 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.647855997 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.647855997 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.647891998 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:00:06.652635098 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.652645111 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.652808905 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.652812958 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.911539078 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:00:06.954910994 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:01:44.267761946 CEST49704587192.168.2.578.110.166.82
                  Sep 30, 2024 12:01:44.275836945 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:01:44.437308073 CEST5874970478.110.166.82192.168.2.5
                  Sep 30, 2024 12:01:44.441055059 CEST49704587192.168.2.578.110.166.82
                  TimestampSource PortDest PortSource IPDest IP
                  Sep 30, 2024 12:00:04.242849112 CEST5506153192.168.2.51.1.1.1
                  Sep 30, 2024 12:00:04.318491936 CEST53550611.1.1.1192.168.2.5
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Sep 30, 2024 12:00:04.242849112 CEST192.168.2.51.1.1.10x20f8Standard query (0)mail.zqamcx.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Sep 30, 2024 12:00:04.318491936 CEST1.1.1.1192.168.2.50x20f8No error (0)mail.zqamcx.comzqamcx.comCNAME (Canonical name)IN (0x0001)false
                  Sep 30, 2024 12:00:04.318491936 CEST1.1.1.1192.168.2.50x20f8No error (0)zqamcx.com78.110.166.82A (IP address)IN (0x0001)false
                  TimestampSource PortDest PortSource IPDest IPCommands
                  Sep 30, 2024 12:00:04.896373987 CEST5874970478.110.166.82192.168.2.5220-cphost14.qhoster.net ESMTP Exim 4.96.2 #2 Mon, 30 Sep 2024 11:00:04 +0100
                  220-We do not authorize the use of this system to transport unsolicited,
                  220 and/or bulk e-mail.
                  Sep 30, 2024 12:00:04.896959066 CEST49704587192.168.2.578.110.166.82EHLO 210395
                  Sep 30, 2024 12:00:05.062889099 CEST5874970478.110.166.82192.168.2.5250-cphost14.qhoster.net Hello 210395 [8.46.123.33]
                  250-SIZE 52428800
                  250-8BITMIME
                  250-PIPELINING
                  250-PIPECONNECT
                  250-STARTTLS
                  250 HELP
                  Sep 30, 2024 12:00:05.063066959 CEST49704587192.168.2.578.110.166.82STARTTLS
                  Sep 30, 2024 12:00:05.229546070 CEST5874970478.110.166.82192.168.2.5220 TLS go ahead

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:05:59:56
                  Start date:30/09/2024
                  Path:C:\Users\user\Desktop\z1quote93039-pdf.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\z1quote93039-pdf.exe"
                  Imagebase:0x400000
                  File size:1'200'301 bytes
                  MD5 hash:1B772B5B66B9ADC3B67EAE3627E75059
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:06:00:01
                  Start date:30/09/2024
                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\z1quote93039-pdf.exe"
                  Imagebase:0x9f0000
                  File size:45'984 bytes
                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3265593518.0000000002D28000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3265593518.0000000002CFE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3265593518.0000000002CB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3264800180.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                  Reputation:high
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:12.1%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:21
                    Total number of Limit Nodes:4
                    execution_graph 25260 2b50848 25261 2b5084e 25260->25261 25262 2b5091b 25261->25262 25264 2b51373 25261->25264 25265 2b51386 25264->25265 25266 2b51470 25265->25266 25268 2b57078 25265->25268 25266->25261 25270 2b57082 25268->25270 25269 2b5709c 25269->25265 25270->25269 25273 60fd001 25270->25273 25279 60fd010 25270->25279 25274 60fd025 25273->25274 25275 60fd23a 25274->25275 25276 60fd5f8 GlobalMemoryStatusEx 25274->25276 25277 60fd616 GlobalMemoryStatusEx 25274->25277 25278 60fd645 GlobalMemoryStatusEx 25274->25278 25275->25269 25276->25274 25277->25274 25278->25274 25281 60fd025 25279->25281 25280 60fd23a 25280->25269 25281->25280 25282 60fd5f8 GlobalMemoryStatusEx 25281->25282 25283 60fd616 GlobalMemoryStatusEx 25281->25283 25284 60fd645 GlobalMemoryStatusEx 25281->25284 25282->25281 25283->25281 25284->25281
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                    • API String ID: 0-3723351465
                    • Opcode ID: a123d057584986f3079511d683631859e1a3fd02c24d2afb3cc55a405bb19674
                    • Instruction ID: 90193ac86525a6776d944fe0a79bb2307d392221d3d9606ccc636d90e711dab6
                    • Opcode Fuzzy Hash: a123d057584986f3079511d683631859e1a3fd02c24d2afb3cc55a405bb19674
                    • Instruction Fuzzy Hash: F4826D30E106198FCB54DF64C994A9DBBF2FF85300F54C6A9D50AAB265EB70ED85CB80

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 933 60f5750-60f576e 934 60f5770-60f5773 933->934 935 60f5775-60f577f 934->935 936 60f5780-60f5783 934->936 937 60f57a6-60f57a9 936->937 938 60f5785-60f57a1 936->938 939 60f57ab-60f57b9 937->939 940 60f57c0-60f57c3 937->940 938->937 947 60f57bb 939->947 948 60f57f6-60f580c 939->948 941 60f57c5-60f57df 940->941 942 60f57e4-60f57e6 940->942 941->942 945 60f57ed-60f57f0 942->945 946 60f57e8 942->946 945->934 945->948 946->945 947->940 953 60f5a27-60f5a31 948->953 954 60f5812-60f581b 948->954 955 60f5a32-60f5a67 954->955 956 60f5821-60f583e 954->956 959 60f5a69-60f5a6c 955->959 963 60f5a14-60f5a21 956->963 964 60f5844-60f586c 956->964 961 60f5a72-60f5a81 959->961 962 60f5ca1-60f5ca4 959->962 973 60f5a83-60f5a9e 961->973 974 60f5aa0-60f5ae4 961->974 965 60f5cc7-60f5cca 962->965 966 60f5ca6-60f5cc2 962->966 963->953 963->954 964->963 990 60f5872-60f587b 964->990 967 60f5d75-60f5d77 965->967 968 60f5cd0-60f5cdc 965->968 966->965 970 60f5d7e-60f5d81 967->970 971 60f5d79 967->971 976 60f5ce7-60f5ce9 968->976 970->959 977 60f5d87-60f5d90 970->977 971->970 973->974 986 60f5aea-60f5afb 974->986 987 60f5c75-60f5c8a 974->987 978 60f5ceb-60f5cf1 976->978 979 60f5d01-60f5d05 976->979 984 60f5cf5-60f5cf7 978->984 985 60f5cf3 978->985 988 60f5d07-60f5d11 979->988 989 60f5d13 979->989 984->979 985->979 998 60f5b01-60f5b1e 986->998 999 60f5c60-60f5c6f 986->999 987->962 993 60f5d18-60f5d1a 988->993 989->993 990->955 994 60f5881-60f589d 990->994 996 60f5d1c-60f5d1f 993->996 997 60f5d2b-60f5d64 993->997 1002 60f58a3-60f58cd call 60f1af0 994->1002 1003 60f5a02-60f5a0e 994->1003 996->977 997->961 1016 60f5d6a-60f5d74 997->1016 998->999 1012 60f5b24-60f5c1a call 60f3ee0 998->1012 999->986 999->987 1017 60f59f8-60f59fd 1002->1017 1018 60f58d3-60f58fb 1002->1018 1003->963 1003->990 1066 60f5c1c-60f5c26 1012->1066 1067 60f5c28 1012->1067 1017->1003 1018->1017 1025 60f5901-60f592f 1018->1025 1025->1017 1030 60f5935-60f593e 1025->1030 1030->1017 1031 60f5944-60f5976 1030->1031 1039 60f5978-60f597c 1031->1039 1040 60f5981-60f599d 1031->1040 1039->1017 1042 60f597e 1039->1042 1040->1003 1043 60f599f-60f59f6 call 60f3ee0 1040->1043 1042->1040 1043->1003 1068 60f5c2d-60f5c2f 1066->1068 1067->1068 1068->999 1069 60f5c31-60f5c36 1068->1069 1070 60f5c38-60f5c42 1069->1070 1071 60f5c44 1069->1071 1072 60f5c49-60f5c4b 1070->1072 1071->1072 1072->999 1073 60f5c4d-60f5c59 1072->1073 1073->999
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: $]q$$]q
                    • API String ID: 0-127220927
                    • Opcode ID: 8236c77144f6f6e04fd9bdb5ce4950fe86445b2dab1082e025e04067018ba62d
                    • Instruction ID: 5798726f4e100c96e5f1556793d6ce35a54f0114638cc76e75fbf376cb343bac
                    • Opcode Fuzzy Hash: 8236c77144f6f6e04fd9bdb5ce4950fe86445b2dab1082e025e04067018ba62d
                    • Instruction Fuzzy Hash: 3902D030B602059FCB95DF68D984AAEBBE2FF84310F148528D50ADB794DB35EC42CB91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1075 60fdd73-60fdda2 1076 60fde06-60fde0d 1075->1076 1077 60fdda4-60fddda call 60fd5f8 call 60fd42c 1075->1077 1085 60fdde1-60fdde3 1077->1085 1086 60fde0e-60fde75 1085->1086 1087 60fdde5-60fddfe 1085->1087 1097 60fde7e-60fde8e 1086->1097 1098 60fde77-60fde79 1086->1098 1087->1076 1100 60fde95-60fdea5 1097->1100 1101 60fde90 1097->1101 1099 60fe11d-60fe124 1098->1099 1103 60fdeab-60fdeb9 1100->1103 1104 60fe104-60fe112 1100->1104 1101->1099 1107 60fdebf 1103->1107 1108 60fe125-60fe19e 1103->1108 1104->1108 1109 60fe114-60fe118 call 60f1af0 1104->1109 1107->1108 1110 60fdfef-60fe017 1107->1110 1111 60fdf2a-60fdf4b 1107->1111 1112 60fe089-60fe0b5 1107->1112 1113 60fdec6-60fded8 1107->1113 1114 60fdf03-60fdf25 1107->1114 1115 60fdfc2-60fdfea 1107->1115 1116 60fe05e-60fe084 1107->1116 1117 60fdedd-60fdefe 1107->1117 1118 60fdf9c-60fdfbd 1107->1118 1119 60fe01c-60fe059 1107->1119 1120 60fe0f8-60fe102 1107->1120 1121 60fe0b7-60fe0d2 1107->1121 1122 60fdf76-60fdf97 1107->1122 1123 60fe0d4-60fe0f6 1107->1123 1124 60fdf50-60fdf71 1107->1124 1109->1099 1110->1099 1111->1099 1112->1099 1113->1099 1114->1099 1115->1099 1116->1099 1117->1099 1118->1099 1119->1099 1120->1099 1121->1099 1122->1099 1123->1099 1124->1099
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: Xaq$$]q
                    • API String ID: 0-1280934391
                    • Opcode ID: 4652ee121cabdc82e9ac5032a750bc15e86b5f66cf15101372256d71eeaf0600
                    • Instruction ID: 4f7b4e77c6455e9d324c575378d549725aba4487d557a207481d3b0763b25f54
                    • Opcode Fuzzy Hash: 4652ee121cabdc82e9ac5032a750bc15e86b5f66cf15101372256d71eeaf0600
                    • Instruction Fuzzy Hash: 39B1D034F442189FDB48AB79985567E7BB7BFC8740B05886ED106E7394CE38CC068B92
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2031adaa781afd773a308e2ef8371da8f3e570ad5ac5a830becd70cc66a71ff
                    • Instruction ID: acb606f9299af1a8ccb39fb0567234ebf82d5edc35757dba3bc43bcf9f05c2b1
                    • Opcode Fuzzy Hash: b2031adaa781afd773a308e2ef8371da8f3e570ad5ac5a830becd70cc66a71ff
                    • Instruction Fuzzy Hash: 5963F931D10B1A8ADB11EF68C8546A9F7B1FF99300F11D79AE4587B121EB70AAD4CF81
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d670893d083fbeea129b77ab5bc98ba7703f14371a69962fe35f27f52e2205ce
                    • Instruction ID: 5ac1247c6fdd8319daa8f95d3c02b444c525f2a5936ac30eacc3932aaf2b20c0
                    • Opcode Fuzzy Hash: d670893d083fbeea129b77ab5bc98ba7703f14371a69962fe35f27f52e2205ce
                    • Instruction Fuzzy Hash: AE331131D107198EDB11EF68C8846ADF7B1FF99300F15D79AE458AB211EB70AAC5CB81
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1a18661472f67ab93d592a2e76c49439bfac390aeddeac73765ba1e3c36038f5
                    • Instruction ID: c3583aca93956e1bfcc389f079753c8eaf377452069e486ab5bbfc6ac4c6a83d
                    • Opcode Fuzzy Hash: 1a18661472f67ab93d592a2e76c49439bfac390aeddeac73765ba1e3c36038f5
                    • Instruction Fuzzy Hash: 7262BE34F502049FDB94DB68D584AAEBBF2EF84310F148469E906DB796DB35EC42CB90
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a00fbac485f9ce5271a0a43d413675abfa70c2ec0cba3a5bc0864fba469f5515
                    • Instruction ID: 839f3e357b748a34351a30884cba1d5556ebe9f71ce65123b9b0bfd639b66135
                    • Opcode Fuzzy Hash: a00fbac485f9ce5271a0a43d413675abfa70c2ec0cba3a5bc0864fba469f5515
                    • Instruction Fuzzy Hash: 75328D31B502099FDB94EB68E980BADBBF6FB88310F108825E509D7754DB35EC46CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 74eb0500ac54b65c0fc30ddc54235d1bb481b61fc7855145e33b15581d26e981
                    • Instruction ID: e4cbb52251ef1eb8577555a8b047169a9640dc909a25cd5e04111f7e0fe0c4e2
                    • Opcode Fuzzy Hash: 74eb0500ac54b65c0fc30ddc54235d1bb481b61fc7855145e33b15581d26e981
                    • Instruction Fuzzy Hash: 3312D431F502059BDBA4DFA4C88076EBBF2FF85310F248869DA199B784DA34DD46CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: def3ba810e2ea225afad184f9b011562e3850235fec011c7e8c50052a8e2246e
                    • Instruction ID: 78d38060c76cac7dfb93d1cd55ffd708ded9f1c4733ab9521d546ed923804a0e
                    • Opcode Fuzzy Hash: def3ba810e2ea225afad184f9b011562e3850235fec011c7e8c50052a8e2246e
                    • Instruction Fuzzy Hash: 6822A130E602098FEFA4CB68D4807ADBBF6EB45310F248926E509DB795DB34DC85CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ed863ec483dc6b158681b3c4c19d493379a2b5be91a3863ac35906c3faf29d3f
                    • Instruction ID: 628c4ee43832a769ddf3a977273a50c09461a09d29d79ce2d1cc06501e9f5a9b
                    • Opcode Fuzzy Hash: ed863ec483dc6b158681b3c4c19d493379a2b5be91a3863ac35906c3faf29d3f
                    • Instruction Fuzzy Hash: 5DB16F70E006298FDF14CFA9C98179DBBF2EF88318F148169D815EB294EB749885CF91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f15aeec49e0ad3c9fd21f5628e216f3278cf717c1f87797176e22ca38112ad55
                    • Instruction ID: 002b7caf4d20b1923e61fdb2cd6de49994c59fb87792df65a4339dced27770c3
                    • Opcode Fuzzy Hash: f15aeec49e0ad3c9fd21f5628e216f3278cf717c1f87797176e22ca38112ad55
                    • Instruction Fuzzy Hash: C9915C70E00319DFDF14DFA9C98579EBBF2EF88314F148169E819AB254EB349885CB91

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1807 2b56ec0-2b56f2a call 2b56c28 1816 2b56f46-2b56f5d 1807->1816 1817 2b56f2c-2b56f45 call 2b5635c 1807->1817 1821 2b56f5f-2b56f74 1816->1821 1822 2b56f7e-2b56f87 1816->1822 1823 2b56f76-2b56f79 1821->1823 1824 2b56f89-2b56f8c 1822->1824 1823->1824 1826 2b56f7b 1823->1826 1827 2b56fbf-2b56fc2 1824->1827 1828 2b56f8e-2b56fa2 1824->1828 1826->1822 1829 2b56fc4-2b56ff9 1827->1829 1830 2b56ffe-2b57001 1827->1830 1838 2b56fa4-2b56fa6 1828->1838 1839 2b56fa8 1828->1839 1829->1830 1831 2b57015-2b57017 1830->1831 1832 2b57003-2b5700a 1830->1832 1836 2b5701e-2b57021 1831->1836 1837 2b57019 1831->1837 1834 2b57010 1832->1834 1835 2b570d3-2b570d9 1832->1835 1834->1831 1836->1823 1840 2b57027-2b57036 1836->1840 1837->1836 1841 2b56fab-2b56fba 1838->1841 1839->1841 1844 2b57060-2b57076 1840->1844 1845 2b57038-2b5703b 1840->1845 1841->1827 1844->1835 1847 2b57043-2b5705e 1845->1847 1847->1844 1847->1845
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR]q$LR]q
                    • API String ID: 0-3917262905
                    • Opcode ID: 99b6c820c267a2c5acab89635beae9857cf557824c235085fa10275ecbd969bb
                    • Instruction ID: dce371c2fcccecfb01f72a2fd442c505fb5c36f741817b5da8222e924be807b3
                    • Opcode Fuzzy Hash: 99b6c820c267a2c5acab89635beae9857cf557824c235085fa10275ecbd969bb
                    • Instruction Fuzzy Hash: AD51F531F043559FDB05DBB8C45039EB7B6EF85300F5488AAE805EF290EB749842CB51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2288 60fe218-60fe233 2289 60fe25d-60fe27c call 60fd614 2288->2289 2290 60fe235-60fe25c call 60fd608 2288->2290 2296 60fe27e-60fe281 2289->2296 2297 60fe282-60fe2e1 2289->2297 2304 60fe2e7-60fe374 GlobalMemoryStatusEx 2297->2304 2305 60fe2e3-60fe2e6 2297->2305 2308 60fe37d-60fe3a5 2304->2308 2309 60fe376-60fe37c 2304->2309 2309->2308
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7a9a83015b47c1ad23186dedb0fbd984e682cb62b69c4232ff321d0f5a62efc9
                    • Instruction ID: 4e2bf1bf2bb88c2fe0405d1f678832b856141fc22ab2c88e5b8d4ec8399b0836
                    • Opcode Fuzzy Hash: 7a9a83015b47c1ad23186dedb0fbd984e682cb62b69c4232ff321d0f5a62efc9
                    • Instruction Fuzzy Hash: 48415871D143969FCB04CF79D8046DEBFF1AF89310F1485ABD508A7651DB789844CBA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2312 60fe300-60fe33e 2313 60fe346-60fe374 GlobalMemoryStatusEx 2312->2313 2314 60fe37d-60fe3a5 2313->2314 2315 60fe376-60fe37c 2313->2315 2315->2314
                    APIs
                    • GlobalMemoryStatusEx.KERNELBASE ref: 060FE367
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID: GlobalMemoryStatus
                    • String ID:
                    • API String ID: 1890195054-0
                    • Opcode ID: 494274b4e08d456543b1f2c2836c3a674c43463feb3946ca4cd0d68935212841
                    • Instruction ID: a848d8a389c50341ae1bb60a97d4e60b6113672faac508a272d16f9b097658a1
                    • Opcode Fuzzy Hash: 494274b4e08d456543b1f2c2836c3a674c43463feb3946ca4cd0d68935212841
                    • Instruction Fuzzy Hash: B3111FB1C006599BCB10DFAAC548A9EFBF4FF48320F10812AD918B7250D378A940CFA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2405 2b5f3dd-2b5f40b 2406 2b5f40d-2b5f410 2405->2406 2407 2b5f433-2b5f435 2406->2407 2408 2b5f412-2b5f42e 2406->2408 2409 2b5f437 2407->2409 2410 2b5f43c-2b5f43f 2407->2410 2408->2407 2409->2410 2410->2406 2411 2b5f441-2b5f467 2410->2411 2417 2b5f46e-2b5f49c 2411->2417 2422 2b5f513-2b5f537 2417->2422 2423 2b5f49e-2b5f4a8 2417->2423 2431 2b5f541 2422->2431 2432 2b5f539 2422->2432 2426 2b5f4c0-2b5f511 2423->2426 2427 2b5f4aa-2b5f4b0 2423->2427 2426->2422 2426->2423 2429 2b5f4b4-2b5f4b6 2427->2429 2430 2b5f4b2 2427->2430 2429->2426 2430->2426 2432->2431
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: PH]q
                    • API String ID: 0-3168235125
                    • Opcode ID: 6c700add26be83e24f6cbe356b9497ce48981dcb1e5b320438b6a60d0e159385
                    • Instruction ID: 338162daa49c9994651d46e07f2c8ce69c525523616e2544dceba059a0a36bd4
                    • Opcode Fuzzy Hash: 6c700add26be83e24f6cbe356b9497ce48981dcb1e5b320438b6a60d0e159385
                    • Instruction Fuzzy Hash: 70311F31B002118FCB19AB74955076EBBE6EF8A340B1444A8D806DB396DF34DD46CBA5

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2439 2b56f60-2b56f74 2440 2b56f76-2b56f79 2439->2440 2441 2b56f89-2b56f8c 2440->2441 2442 2b56f7b-2b56f87 2440->2442 2443 2b56fbf-2b56fc2 2441->2443 2444 2b56f8e-2b56fa2 2441->2444 2442->2441 2445 2b56fc4-2b56ff9 2443->2445 2446 2b56ffe-2b57001 2443->2446 2455 2b56fa4-2b56fa6 2444->2455 2456 2b56fa8 2444->2456 2445->2446 2448 2b57015-2b57017 2446->2448 2449 2b57003-2b5700a 2446->2449 2453 2b5701e-2b57021 2448->2453 2454 2b57019 2448->2454 2451 2b57010 2449->2451 2452 2b570d3-2b570d9 2449->2452 2451->2448 2453->2440 2457 2b57027-2b57036 2453->2457 2454->2453 2458 2b56fab-2b56fba 2455->2458 2456->2458 2461 2b57060-2b57076 2457->2461 2462 2b57038-2b5703b 2457->2462 2458->2443 2461->2452 2464 2b57043-2b5705e 2462->2464 2464->2461 2464->2462
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR]q
                    • API String ID: 0-3081347316
                    • Opcode ID: 916aed621bbe1860ae1700d131030d94aabb8793f42352a3fcb0bcd563964774
                    • Instruction ID: e27037754b7961e4a36666285d9a3aa7c13bc85d17e1893cba0e95a904ad6dcf
                    • Opcode Fuzzy Hash: 916aed621bbe1860ae1700d131030d94aabb8793f42352a3fcb0bcd563964774
                    • Instruction Fuzzy Hash: 77318131F102199BEF14CFA5D44079EF7B6EF85300F548565E806FB250EBB1A942CB51
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR]q
                    • API String ID: 0-3081347316
                    • Opcode ID: 5a8e9cc28b28ca1cb920ab213e70ae067d078f566a298b03a6007870498b46a4
                    • Instruction ID: f0a87f9fb85013796c7125a94a31ae16cb0c80743f54bedefcd2eaa60f34571d
                    • Opcode Fuzzy Hash: 5a8e9cc28b28ca1cb920ab213e70ae067d078f566a298b03a6007870498b46a4
                    • Instruction Fuzzy Hash: FA218B73B041909FC306AB3CD86539A7BB6EF85304F0444EAD004CB752EE398846C792
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2e819b6f6bdf212a6ced0a1c58097a6714036aaf82423b21217379842c7b7aac
                    • Instruction ID: 57f4c9ca51b33c0e3272b3de8cab26c9bc440cc0e199ccd6896d3bc87b711097
                    • Opcode Fuzzy Hash: 2e819b6f6bdf212a6ced0a1c58097a6714036aaf82423b21217379842c7b7aac
                    • Instruction Fuzzy Hash: 29126F307102028BDB19AB28E994769B7A7FB85304F504E79E405CB394DFB5EC4BDBA1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c64dc4f956bbde6423b041166f816e469c78700c11e495dd67c7ea018b11614a
                    • Instruction ID: 295bdc0c49a9b60e7fddf0e323a547f3168d3a327fa05640f57bbdbf42e1bdbb
                    • Opcode Fuzzy Hash: c64dc4f956bbde6423b041166f816e469c78700c11e495dd67c7ea018b11614a
                    • Instruction Fuzzy Hash: 8DE18D35A00615CFDB14DFA4D984BADBBB2EF88310F1484A9E806DB3A5DB34DC46CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80d1b7e720ea8d48a60508745adbaed3dd39b8d169ad418b63e20b7ac73bffde
                    • Instruction ID: 8107ca0d05ebb65abe48de5cc3b9729cf665e4de15ab791b8c9c812de3a38963
                    • Opcode Fuzzy Hash: 80d1b7e720ea8d48a60508745adbaed3dd39b8d169ad418b63e20b7ac73bffde
                    • Instruction Fuzzy Hash: 98C1BD31A00615CFDB14CFA8D88479EBBB2EF88314F2085AAE909DF395DB70D845CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7da071bcc12164f59501e3e861b801eed6bd5df6dd1558e0f3380922df01ff08
                    • Instruction ID: a13be2218686702451a0acb8ba0a3a40ee39f16e211cc56d2e8f3c3e31a67149
                    • Opcode Fuzzy Hash: 7da071bcc12164f59501e3e861b801eed6bd5df6dd1558e0f3380922df01ff08
                    • Instruction Fuzzy Hash: 0CA14D70E00629CFDF10CFA9C98579DBBF1EF88318F148169D819AB294EB749885CF91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5896872d35f71f44778ad8b4a946553ed29064e6fc4cc4e8687f4d675137a16b
                    • Instruction ID: f810cd32735a10402f81993e0b9a092168d91bf2649d4188b1fb3db86d447ae9
                    • Opcode Fuzzy Hash: 5896872d35f71f44778ad8b4a946553ed29064e6fc4cc4e8687f4d675137a16b
                    • Instruction Fuzzy Hash: 5D915C70E00219DFDF10DFA8D98579DBBF2EF88318F148169E819AB254EB749885CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 2f2a5c6d150b1a0780c74a57affb24de1e3c4cb8392e23c171c2bcad636d6f5b
                    • Instruction ID: 1eceee0ac8fb9ce7d0048b9b081366fbb9167887493e49ce85b1ff427c801d30
                    • Opcode Fuzzy Hash: 2f2a5c6d150b1a0780c74a57affb24de1e3c4cb8392e23c171c2bcad636d6f5b
                    • Instruction Fuzzy Hash: 38717EB0E002599FDB14DFA9C84579EBBF2FF88304F148169E815AB254EB749881CF95
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7ec894b1ac69baadeccfc833e28c3993cc36d45d8dcf381b85bc51bea4ef23e8
                    • Instruction ID: 317383a08e94f6821d7234a1a3e5f414c8c96600f46c0a090ecbdbe4062acfd0
                    • Opcode Fuzzy Hash: 7ec894b1ac69baadeccfc833e28c3993cc36d45d8dcf381b85bc51bea4ef23e8
                    • Instruction Fuzzy Hash: 57717AB0E002599FDB11DFA8C9857DEBBF1FF88304F148169E815AB254EB749882CF95
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cf9e1cb29cd5465b3d0a0ea12a4a9d3d16776d320722e016c2c7012c00019c2f
                    • Instruction ID: 649b41256cc8f8b016221144c9ef0d2fafacea015ba06eddacadc0b09b5b3b39
                    • Opcode Fuzzy Hash: cf9e1cb29cd5465b3d0a0ea12a4a9d3d16776d320722e016c2c7012c00019c2f
                    • Instruction Fuzzy Hash: 175112B4D002288FDB18CFA9C885B9DBBB5FF48304F54855AE819BB394D778A844CF95
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1dc4f253e73e678912f3473f20a6ee222bdf7b9ecade4bc9161f059618a7c48d
                    • Instruction ID: 1e41d630fa0452ebcdb18ffedfccd54f1f438740b64963ba0a9103b0c955fac1
                    • Opcode Fuzzy Hash: 1dc4f253e73e678912f3473f20a6ee222bdf7b9ecade4bc9161f059618a7c48d
                    • Instruction Fuzzy Hash: 3F5122B4D002288FDB18CFA9C884B9DBBB5FF48304F54855AE819BB390DB74A844CF95
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a5b85438458ba895758f6e0fbfd540f0d313237b4e34f34fe9065d99e9a60d6
                    • Instruction ID: acc7f04a2223218109e0036a8d5896e0792c8d6a7cdaea2371796c8712dcbebe
                    • Opcode Fuzzy Hash: 3a5b85438458ba895758f6e0fbfd540f0d313237b4e34f34fe9065d99e9a60d6
                    • Instruction Fuzzy Hash: 0F51CC306421828FCB0AFF28F990B553F69FB95304B045A69D055DB23DFB74AD0ADBA0
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c5b8c504834fe49c867a3fc45c242596867f1121371d523094eeefc10a275aa5
                    • Instruction ID: cbc0c82f8bec8a75446fbd926541ca28348fa34a0a733e8641cd936419b1dd2f
                    • Opcode Fuzzy Hash: c5b8c504834fe49c867a3fc45c242596867f1121371d523094eeefc10a275aa5
                    • Instruction Fuzzy Hash: 2451BB306521828FCB0AFF28F990B553F69FB95304B045A69D055DB23DFB74AD0ADBA0
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c760396e8c69bb149ec37b25e6f842bb7b216b6023416fe25a555b57c52a5a60
                    • Instruction ID: 5b001411fc4f7edb54666e441fcd7fd74ff3d838a4fcb38aa54f799d05d7057f
                    • Opcode Fuzzy Hash: c760396e8c69bb149ec37b25e6f842bb7b216b6023416fe25a555b57c52a5a60
                    • Instruction Fuzzy Hash: 8131F531E00629DBDB15CFA5D98479EB7B6EF89300F10856AEC05EB340DB71D882CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a5b080907dd34976ad82bb621fe85a0de61c647d4cdd815b0e506e1bd665ef83
                    • Instruction ID: 990b94430d975ca740577372bd73f8d7ae0252573439efef22f68d6a2751faeb
                    • Opcode Fuzzy Hash: a5b080907dd34976ad82bb621fe85a0de61c647d4cdd815b0e506e1bd665ef83
                    • Instruction Fuzzy Hash: B6318135E102169BDB15DF65D8947AEF7B2EF89300F10C519E806EB750DB74AC42CB50
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a56160d8aff1f4e882cf30a885186658974c1558687e64c711cd4347f7a8c847
                    • Instruction ID: 13c328e032edf0167805b6b59b204a9be4e04a224b8ed2ba2c42bcf8a3112838
                    • Opcode Fuzzy Hash: a56160d8aff1f4e882cf30a885186658974c1558687e64c711cd4347f7a8c847
                    • Instruction Fuzzy Hash: 55410FB5D01348DFDB10CFA9C984ADEBFB5FF48310F24846AE809AB254DB75A945CB90
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d211f269270137cf27a7c78e15d47a4fa41d3de714dfa026b6816e44f705345e
                    • Instruction ID: 96c77049df13c823610334448c9222b2904e1427ec9645d3e2b38fa88b6c6944
                    • Opcode Fuzzy Hash: d211f269270137cf27a7c78e15d47a4fa41d3de714dfa026b6816e44f705345e
                    • Instruction Fuzzy Hash: 10316D35E1021A9BDB19DF65D8947AEF7B2EF89310F10C529E806EB750DB74AC42CB50
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cd272d0cbf5f9cc55088d219d284a8e7da35ee87ae83b5723c3857276312b46a
                    • Instruction ID: 7de7e884e29e82f81012483f4519c24b3ba64fce217931d4ee0720989a33f2c3
                    • Opcode Fuzzy Hash: cd272d0cbf5f9cc55088d219d284a8e7da35ee87ae83b5723c3857276312b46a
                    • Instruction Fuzzy Hash: 1F410EB0D013489FDB10DFA9C584ADEBFF5FF48310F20802AE809AB254DB75A945CB90
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5aa455012d8b5565c7d591abe158c1c3a2cfa0a030d5367a26495a2f834bad7f
                    • Instruction ID: 6b50f59e5aeed45436632872547fd2ecae93e7fa905800ba9a93ea3dc84a926f
                    • Opcode Fuzzy Hash: 5aa455012d8b5565c7d591abe158c1c3a2cfa0a030d5367a26495a2f834bad7f
                    • Instruction Fuzzy Hash: 9931C131E00619DBDB15CFA4D88479EFBB6EF89300F14C559E805EB340EB719882CB90
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f89e4abaa4e7b4041baccbfbd074cf5d313434025f3e80c028920fa0b7e1e390
                    • Instruction ID: 037520903415f8ca4cabebd1ba49db4d5b27034cd1f7494b2065bb8d73dafa25
                    • Opcode Fuzzy Hash: f89e4abaa4e7b4041baccbfbd074cf5d313434025f3e80c028920fa0b7e1e390
                    • Instruction Fuzzy Hash: 962180756201515BDF22FB6CE984B5A3759EB84304F104AA1E80ECF269FF38DD49CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 7992b648cd88bc56b748226ed45a472876c59047583b5c031b1e175cd86a4a75
                    • Instruction ID: c5fe1555a4af0ad7b6ba9848ad7513dc8be098ddc74a1aaa21b6b98954ca9d86
                    • Opcode Fuzzy Hash: 7992b648cd88bc56b748226ed45a472876c59047583b5c031b1e175cd86a4a75
                    • Instruction Fuzzy Hash: 3D217E30E0061ADBDB15CFA4D98479EFBB6EF85300F10C559E845EB254DB719846CB90
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265311471.0000000002A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A8D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2a8d000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a3723a5b0df193fbffac5fe9b21504085531df0ea2d7c47e4253a046a4d8787
                    • Instruction ID: b4c7e30a5feabcd88cbc8e93d215246883871deb6b27c50f8e4427d7ace68cb6
                    • Opcode Fuzzy Hash: 3a3723a5b0df193fbffac5fe9b21504085531df0ea2d7c47e4253a046a4d8787
                    • Instruction Fuzzy Hash: 3E21F271504604DFDB14EF24D9C0F26BFB5FB88318F24C669D90A4B296CB3AD846CA62
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e353c16a3c10da6bac68a438a188f3a5c36ef023c4c77de7f0bf156b9960463
                    • Instruction ID: 4e90faec52444454e9b62744617cb8c0640607b48bb98ec32044921887900e07
                    • Opcode Fuzzy Hash: 3e353c16a3c10da6bac68a438a188f3a5c36ef023c4c77de7f0bf156b9960463
                    • Instruction Fuzzy Hash: 5D211530A00214CFDB54EF69D599B9D77F2EF48305B1404A8E90AEB3A0EB35DD01CBA0
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b13e449aca7d2ecdcea0935d2eeded935abc109f4bc70b96b74985a5b9e2b923
                    • Instruction ID: 6b6d326bc35ff38ec7f2abac4014e04a4267787144f2ebbcdfb8557a45c6e98f
                    • Opcode Fuzzy Hash: b13e449aca7d2ecdcea0935d2eeded935abc109f4bc70b96b74985a5b9e2b923
                    • Instruction Fuzzy Hash: 68218E30E00629DBDB19CFA5C85469EF7B2EF89300F10855AEC15BB340DBB1A842CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 551a912e7619da9704b0a5beae39b9eae9124d72ee63a1da591ed1a5e5cafde0
                    • Instruction ID: 3b458819fa6f50cc41efbe0beca26fe533bdcbf6c12a330d949d57035b6976dd
                    • Opcode Fuzzy Hash: 551a912e7619da9704b0a5beae39b9eae9124d72ee63a1da591ed1a5e5cafde0
                    • Instruction Fuzzy Hash: 63212A30B10229CFDB64EB68C5557AE77F6EF49205F1004A8C90AEF290EB35EC01CBA1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bb309560a00e0c6c3fec8f5bdcc638f169936a42b1b1abbce29025a29017f28e
                    • Instruction ID: 4a0f68d56dea7a232b21696275d683a3b42f7dac7aa8327f4a2b1b49efb2afc5
                    • Opcode Fuzzy Hash: bb309560a00e0c6c3fec8f5bdcc638f169936a42b1b1abbce29025a29017f28e
                    • Instruction Fuzzy Hash: 7321D0346601219BEF35662CE99532D3A65EB06315F4448A9E90ECF3C0DF29CCC6CB92
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5c998fe6e69fe93b5105f9833b8d476e6fc9163935fc5e8648b93d354e5c91ef
                    • Instruction ID: 145d8028fd3612a6e03f814b9c37208a153be3a06c8d6a0ff462519efca3eba4
                    • Opcode Fuzzy Hash: 5c998fe6e69fe93b5105f9833b8d476e6fc9163935fc5e8648b93d354e5c91ef
                    • Instruction Fuzzy Hash: 992193746201515FDF22FB6CF884B593759EB44304F104A61D40ACB268FB34DC89CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 35830c30227ccb598dc9e4dc56a0fbffae37ad2076290eb1ceaf0b7324a5c6b2
                    • Instruction ID: 7cd0867997091c7c93530ce751900b1a85f7a4d96ff0d1c0813ea1553da01015
                    • Opcode Fuzzy Hash: 35830c30227ccb598dc9e4dc56a0fbffae37ad2076290eb1ceaf0b7324a5c6b2
                    • Instruction Fuzzy Hash: AE213D30B20265CFDB54EB78C5557AE77B6EF49245F1004A8D90AFF290EB359D01CB61
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 70fc43b3fab390790725051dbca8c51fa6b19cb17f174b74498d91e788808bdc
                    • Instruction ID: daee5eb742dc8b3dfc767374c4f3ee4b8a34d9e1a8fbfb2886565ece250690f1
                    • Opcode Fuzzy Hash: 70fc43b3fab390790725051dbca8c51fa6b19cb17f174b74498d91e788808bdc
                    • Instruction Fuzzy Hash: E021F330A40214CFDB54EB69D598B9D77F2EF88305B1044A8E90AEB3A0EB35DD01CB60
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 84dadfbf19388d6c79fde762f28baf32ac7e7bf4d385a23ea56d8e1f913499be
                    • Instruction ID: 5aeb1f08eaeac92acf1931975461105227ade1b4e71c9961624fd075012ec5e8
                    • Opcode Fuzzy Hash: 84dadfbf19388d6c79fde762f28baf32ac7e7bf4d385a23ea56d8e1f913499be
                    • Instruction Fuzzy Hash: 2811A030B002248BEF64BA79D544B2E7695EF49314F104DB9E806CF295DB69EC868BD1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a726a3cc315584ebd92638c8cdad8f940db0c48331c4514573ae4884c6c3e59
                    • Instruction ID: 5c2c748d69a25342da7f7f22a85ec2404ff32ded249814d0362e708e9a866c72
                    • Opcode Fuzzy Hash: 3a726a3cc315584ebd92638c8cdad8f940db0c48331c4514573ae4884c6c3e59
                    • Instruction Fuzzy Hash: B6112530B0032487EF247A79D504B6E3695EB49314F104CB9DC02CF281EB68EC458BC1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 33d84a480cf45e43c1ca85efbf51b895802410f08299b5684d62eee8565e0349
                    • Instruction ID: 4b9ef36d20b4f36ff5cd729eb051e9ed9567f908918a7a5d780d5ae9a6063a8f
                    • Opcode Fuzzy Hash: 33d84a480cf45e43c1ca85efbf51b895802410f08299b5684d62eee8565e0349
                    • Instruction Fuzzy Hash: 59114876F10210ABDB10AB78984875E7FF9EB48250F10486AED4EC7384EF3489428791
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9af2e71350931d74c169fe0276b74fb16d36e7187c39da74c9a4d0d013a301ff
                    • Instruction ID: 4a34d853b01e7e7b944e509de22f2d674666982617361b72be25a95b0fe4fb72
                    • Opcode Fuzzy Hash: 9af2e71350931d74c169fe0276b74fb16d36e7187c39da74c9a4d0d013a301ff
                    • Instruction Fuzzy Hash: 7B117071E113249BCB21EFB984803AD7BE6EB4D320B2514F9DC09EB242E735D9418F91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265311471.0000000002A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A8D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2a8d000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                    • Instruction ID: 692cff3ba3b505f8138f8050532f5f7ff12160033478125347e61ff4edd1480e
                    • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                    • Instruction Fuzzy Hash: C711DD75504684CFCB12DF24D5C4B15FFB1FB88318F28C6AAD84A4B696C33AD44ACB62
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4ed70eb4956f2a06f827f90bb644ce6911e08ddf315d5b8824e3a5f56e10fe0e
                    • Instruction ID: 1569f48d115838f33b9e6fa46f851f0f008a44b96d89adcb24d53f3f09f12e14
                    • Opcode Fuzzy Hash: 4ed70eb4956f2a06f827f90bb644ce6911e08ddf315d5b8824e3a5f56e10fe0e
                    • Instruction Fuzzy Hash: BB015B31A113248FCB21EFB984403AD7BE6EB48324B2518F9DC0AEB201E735D9418FA1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21c5d31ad26bca5a471fae13dd4f3f376a209b895063566c7c34e8a2860b022b
                    • Instruction ID: a213ccb3c3ae0b69a7dc0d5406f2789c2766283ee17f8d67599aed708e675e04
                    • Opcode Fuzzy Hash: 21c5d31ad26bca5a471fae13dd4f3f376a209b895063566c7c34e8a2860b022b
                    • Instruction Fuzzy Hash: E211C530D00229DFDF24EE94D9987ECBB72EF65319F1424AAD811BA190DB3448C6CF16
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1bcd226278e58ca66dd1af0cedd370238ba99a0f73cff6c2ee3fe6c1972a95f3
                    • Instruction ID: fcf9c7e48e3732ed12eed861e23b250f8fc84474bc2da9303ea1f0c379878c91
                    • Opcode Fuzzy Hash: 1bcd226278e58ca66dd1af0cedd370238ba99a0f73cff6c2ee3fe6c1972a95f3
                    • Instruction Fuzzy Hash: C2017C759501489FCB06FBB4F980A8C7BBAEF40300F0046B8C0049B2A5EF756E0EDBA1
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4baf989b5ff687c32483816e72eb634eca0c62e5cf52c3613960b0f6cbd0a977
                    • Instruction ID: 9f4ece18927f1188fe8a302a8d70c2e60bcc244c8d7fe332403e8c72477e5d56
                    • Opcode Fuzzy Hash: 4baf989b5ff687c32483816e72eb634eca0c62e5cf52c3613960b0f6cbd0a977
                    • Instruction Fuzzy Hash: B0F0C439B402148FD714EB64D598B6C77B2EF88315F5440A8E50A9B3E0DF35AD82CB51
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a891850630dcc5d592dc570f5b6dfb3438fd3583c16a94907dbacb467f00d158
                    • Instruction ID: aa96cca7bb60d91b9966bb8e4c848fb7a3d3b82f62fad215ec571e7fbfa20de0
                    • Opcode Fuzzy Hash: a891850630dcc5d592dc570f5b6dfb3438fd3583c16a94907dbacb467f00d158
                    • Instruction Fuzzy Hash: ADF0FB349401099FCB06FFA4FA40A9D7BBAEF40304F504678C0059B258EA356E0A8B91
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                    • API String ID: 0-2843079600
                    • Opcode ID: 4cbed454588682b3c213bd37eee254507f1148f7af6819e3e011e79919e74915
                    • Instruction ID: 6885118a7f59bcb57b882d7b4b608bda1939f666a75e017bf296832990896ea6
                    • Opcode Fuzzy Hash: 4cbed454588682b3c213bd37eee254507f1148f7af6819e3e011e79919e74915
                    • Instruction Fuzzy Hash: 14126E30B502198FDB65DF68CC94A9EBBF2BF88304F1089A9D5099B754DB309D86CF81
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                    • API String ID: 0-981061697
                    • Opcode ID: 35bb53f8b95b1e25b063c8489aa80728445ec71050ef5dac9d65dbbfc9325278
                    • Instruction ID: b75537fff3e999ee8ec6b8580b5715443eceeca32611ea33c3ea1882c5e2cb75
                    • Opcode Fuzzy Hash: 35bb53f8b95b1e25b063c8489aa80728445ec71050ef5dac9d65dbbfc9325278
                    • Instruction Fuzzy Hash: 18028E30A502098FDB99EFA4C594B6EBBF7BF84300F148469D8099B769DB35DC46CB81
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: XPbq$\Obq
                    • API String ID: 0-409418754
                    • Opcode ID: da1b98e9ee6c29d32f007622c4c1cd9ea5816f34f321f254760963b07d63eb59
                    • Instruction ID: e7f2402f3771cabea3bda579aa8dbf579c4360623cf396537d94eaacb9013edd
                    • Opcode Fuzzy Hash: da1b98e9ee6c29d32f007622c4c1cd9ea5816f34f321f254760963b07d63eb59
                    • Instruction Fuzzy Hash: 6BD1D731B600148FDF98DB68D4947AEBBE2FF88720F258469E646DB751CA31EC458BD0
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.3267374335.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_60f0000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID: PH]q
                    • API String ID: 0-3168235125
                    • Opcode ID: b9559bfdda073765bdae23bb27987956793d401defbb2a6bdef9013986846134
                    • Instruction ID: 771a8aba522223b69c88dc878d108683ed081f612ba7d13aab3ec0d132fac279
                    • Opcode Fuzzy Hash: b9559bfdda073765bdae23bb27987956793d401defbb2a6bdef9013986846134
                    • Instruction Fuzzy Hash: CD22E130B501088FDB94DB68D984BAEBBF6EF89310F108469D506DB7A1DB35EC46CB91
                    Memory Dump Source
                    • Source File: 00000002.00000002.3265501459.0000000002B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02B50000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_2b50000_RegSvcs.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6242c706244d72b94ed210e3102f5d32af4b84f43e10ee56bd9ba1f4f103c9b8
                    • Instruction ID: c9bbb11f075ee4b61c8af91c90b6d4b2a015ea85349962603a173da6434a1843
                    • Opcode Fuzzy Hash: 6242c706244d72b94ed210e3102f5d32af4b84f43e10ee56bd9ba1f4f103c9b8
                    • Instruction Fuzzy Hash: C3B14E70E002298FDF14DFA9D9857DDBBF2EF88314F148169D819AB254EB749885CB81