Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rUAE_LPO.com.exe

Overview

General Information

Sample name:rUAE_LPO.com.exe
Analysis ID:1538408
MD5:a305269db6286fc4dd1d73ac5d2bf208
SHA1:b8777b46a2b1ae40b8d6ff32cc79174e1e617983
SHA256:14995ab5376dccba2f4e91e4efcf09ab18d5645f262ee8cef70d4da8b9317699
Tags:exeuser-Porcupine
Infos:

Detection

AsyncRAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • rUAE_LPO.com.exe (PID: 6368 cmdline: "C:\Users\user\Desktop\rUAE_LPO.com.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
    • rUAE_LPO.com.exe (PID: 2724 cmdline: "C:\Users\user\Desktop\rUAE_LPO.com.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
    • rUAE_LPO.com.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\rUAE_LPO.com.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
    • rUAE_LPO.com.exe (PID: 4796 cmdline: "C:\Users\user\Desktop\rUAE_LPO.com.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
      • cmd.exe (PID: 5560 cmdline: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 5756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 1868 cmdline: schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' MD5: 48C2FE20575769DE916F48EF0676A965)
      • cmd.exe (PID: 6616 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 6256 cmdline: timeout 3 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • windowsBook.exe (PID: 3652 cmdline: "C:\Users\user\AppData\Local\Temp\windowsBook.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
          • windowsBook.exe (PID: 5240 cmdline: "C:\Users\user\AppData\Local\Temp\windowsBook.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
  • windowsBook.exe (PID: 3292 cmdline: C:\Users\user\AppData\Local\Temp\windowsBook.exe MD5: A305269DB6286FC4DD1D73AC5D2BF208)
    • windowsBook.exe (PID: 1868 cmdline: "C:\Users\user\AppData\Local\Temp\windowsBook.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
    • windowsBook.exe (PID: 6516 cmdline: "C:\Users\user\AppData\Local\Temp\windowsBook.exe" MD5: A305269DB6286FC4DD1D73AC5D2BF208)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"External_config_on_Pastebin": "null", "Server": "quin.ydns.eu", "Ports": "1962", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "windowsBook.exe", "Install_File": "ZWVDQ2xkSDdBeUNVdEFXN0ZMenlQTERTN1l6QWdxWno="}
SourceRuleDescriptionAuthorStrings
dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x1e332:$x1: AsyncRAT
  • 0x1e370:$x1: AsyncRAT
SourceRuleDescriptionAuthorStrings
00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
  • 0x1fe36:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x1d85f:$x1: AsyncRAT
  • 0x1d89d:$x1: AsyncRAT
00000005.00000002.2109979474.0000000004EC6000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0xdd03:$x1: AsyncRAT
  • 0xdd41:$x1: AsyncRAT
00000011.00000002.2229647139.0000000000C4D000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0x315bb:$x1: AsyncRAT
  • 0x315f9:$x1: AsyncRAT
00000000.00000002.2066706772.0000000006BD0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    Click to see the 28 entries
    SourceRuleDescriptionAuthorStrings
    0.2.rUAE_LPO.com.exe.379e790.3.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      0.2.rUAE_LPO.com.exe.6bd0000.5.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0.2.rUAE_LPO.com.exe.2796c58.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            0.2.rUAE_LPO.com.exe.2796c58.0.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0x8479:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0x9838:$a2: Stub.exe
            • 0x98c8:$a2: Stub.exe
            • 0x509d:$a3: get_ActivatePong
            • 0x8691:$a4: vmware
            • 0x8509:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x5e97:$a6: get_SslClient
            Click to see the 30 entries

            System Summary

            barindex
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\rUAE_LPO.com.exe", ParentImage: C:\Users\user\Desktop\rUAE_LPO.com.exe, ParentProcessId: 4796, ParentProcessName: rUAE_LPO.com.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, ProcessId: 5560, ProcessName: cmd.exe
            Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, CommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\rUAE_LPO.com.exe", ParentImage: C:\Users\user\Desktop\rUAE_LPO.com.exe, ParentProcessId: 4796, ParentProcessName: rUAE_LPO.com.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, ProcessId: 5560, ProcessName: cmd.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' , CommandLine: schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' , CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5560, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' , ProcessId: 1868, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T08:35:14.455430+020020355951Domain Observed Used for C2 Detected185.38.142.2401962192.168.2.549716TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T08:35:14.455430+020020356071Domain Observed Used for C2 Detected185.38.142.2401962192.168.2.549716TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T08:35:14.455430+020028424781Malware Command and Control Activity Detected185.38.142.2401962192.168.2.549716TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "quin.ydns.eu", "Ports": "1962", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "windowsBook.exe", "Install_File": "ZWVDQ2xkSDdBeUNVdEFXN0ZMenlQTERTN1l6QWdxWno="}
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeReversingLabs: Detection: 26%
            Source: rUAE_LPO.com.exeReversingLabs: Detection: 26%
            Source: rUAE_LPO.com.exeVirustotal: Detection: 32%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeJoe Sandbox ML: detected
            Source: rUAE_LPO.com.exeJoe Sandbox ML: detected
            Source: rUAE_LPO.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: rUAE_LPO.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: AJYP.pdb source: rUAE_LPO.com.exe, windowsBook.exe.5.dr
            Source: Binary string: AJYP.pdbSHA256 source: rUAE_LPO.com.exe, windowsBook.exe.5.dr

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 185.38.142.240:1962 -> 192.168.2.5:49716
            Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 185.38.142.240:1962 -> 192.168.2.5:49716
            Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 185.38.142.240:1962 -> 192.168.2.5:49716
            Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 185.38.142.240:1962 -> 192.168.2.5:49716
            Source: Malware configuration extractorURLs: quin.ydns.eu
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPE
            Source: global trafficTCP traffic: 192.168.2.5:49716 -> 185.38.142.240:1962
            Source: Joe Sandbox ViewASN Name: NETSOLUTIONSNL NETSOLUTIONSNL
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficDNS traffic detected: DNS query: quin.ydns.eu
            Source: windowsBook.exe, 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.15.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: windowsBook.exe, 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabS
            Source: rUAE_LPO.com.exe, 00000005.00000002.2106829519.000000000287D000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTR

            System Summary

            barindex
            Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000005.00000002.2109979474.0000000004EC6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000011.00000002.2229647139.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000011.00000002.2232027757.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: Process Memory Space: windowsBook.exe PID: 5240, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_00A0DE8C0_2_00A0DE8C
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F1A6980_2_06F1A698
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F1A6930_2_06F1A693
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F164C00_2_06F164C0
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F183D80_2_06F183D8
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F1CF980_2_06F1CF98
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F18CB00_2_06F18CB0
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F16D300_2_06F16D30
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F168F80_2_06F168F8
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 12_2_00AADE8C12_2_00AADE8C
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_0111DE8C13_2_0111DE8C
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_0732A69813_2_0732A698
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_0732A68F13_2_0732A68F
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_0732648B13_2_0732648B
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_073264C013_2_073264C0
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_073283D813_2_073283D8
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_0732CE9013_2_0732CE90
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_07326D3013_2_07326D30
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_07328CB013_2_07328CB0
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_07328CA013_2_07328CA0
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 13_2_073268F813_2_073268F8
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 15_2_017563D815_2_017563D8
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 15_2_01756CA815_2_01756CA8
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 15_2_0175609015_2_01756090
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 15_2_0175AF5815_2_0175AF58
            Source: rUAE_LPO.com.exe, 00000000.00000002.2066995348.0000000007320000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exe, 00000000.00000002.2058828936.0000000003781000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exe, 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exe, 00000000.00000002.2057216286.0000000000A1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exe, 00000000.00000000.2009290346.00000000003F8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAJYP.exe" vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exe, 00000005.00000002.2105635275.000000000040E000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exeBinary or memory string: OriginalFilenameAJYP.exe" vs rUAE_LPO.com.exe
            Source: rUAE_LPO.com.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000005.00000002.2109979474.0000000004EC6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000011.00000002.2229647139.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000011.00000002.2232027757.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: Process Memory Space: windowsBook.exe PID: 5240, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: rUAE_LPO.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: windowsBook.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: 0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpack, at4ONG9F0NYCELN5Tj.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.rUAE_LPO.com.exe.379e790.3.raw.unpack, at4ONG9F0NYCELN5Tj.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, OiHoolIAygQAXBT.csBase64 encoded string: 'yKawK3VpaUozVt7nSUZH+FnSyshePzOpFVCnRwX7U4ZB280WpfMTuTYeExR0FWuvbGpl3SI6rcp8bs+ljbVa2lDFNksGpMvQB+F6XFct3J60IeY1leqgjx0W7B1p+kqD/QtuP0XvjgWxZQ6bRM4s9auajVMXd2Y/Hgg/g2fz1ZipgNNWkwZoA0gfIfq8C+K+1i+++6eXPAokDnmrOM+EdaCtg8b5VGEj6UB1qrLieygyNrM6/SLeKezb1PA9AtA8U9IirRGLrYGl6gMwhQMH2ARPD9qVLreMF1ObJjWzeBmp1rLB4uTd/LTYiXbqf6vQ0SDyFPN74YEHEw5+xR5zSVxycirzV/2lIOJHuy1HYcQQVxoGAbLnZhMKMRQLzJEbpb/BoXIMSlHILNCGdkzsajyh/2CB9lgbze0+hcs7lWIUdnw/NG2Lh+NR9mTGqyRD8f6ztxYyBny2t7mnfhtYWyzP1/oxh+pwDbttOmnidk8vgIy4Z86FP2GdusQdiJac8alNHOjVOQGfiXF1PcBfUm0+IMYZU4BlX5S+8VjvPRSmWrd8hHO2nB+OflZE7cZ8+IQabffVZ7nGtNlcs5hpJV1n36PHaPpfOV1mftpl3KQ/IIepioZKvI0zVhG1R/MDkTxlmx+JcLVsaDJq02tWIAWR0dPcX5suErDeDucMUjXits8r7bCJ2GjAjghT1eu5Gu8Zl2ZRza7Iq/EA6DhGs5wcDpKYuHB/TOLrBxZV2S40V+lpzYBpbpzWEs6c6tIMHE3ejTrM0WAZR05tqWOuh+XvN4Ar/1NfvOHGxiSB8QZCoSyrCyJ785MPSL3gf49u/vm6Lkh1zPqAiS8w6VA1PpaEyeGajroYXuiWPP7obfDHTOwblMA6mf6orYIWZpWrFo94fu5vde5No6HKP5Yxo+VyFfKP4BwkSC75N4rviWlv81OiGc2r2X9HA3Jsc4Q6hrZSFiE7SoJhlraD1pP6yLDzfyNBmuuHE5I/e/deR6sSSPiejRj0u+JUrT+/h9acgZHQCTragNKUSpZMseB7Fiw5qpkclFu2scGyuXx+nKoO2KzPSbRjsXOfaApX/1ofb5tCm+hSFwTTih4mq7N0Tkh2mMQ4Z0ubCatWr9VO6bw3/EX5cF4oe3WV5uKBXly7ztB7lplwxOVmAxWZ3rbBOJofvRitOUtUmf/4Lgn1akzk/X8n4brrIUAMz9YS+lYKd0rLTpKme2XK3WRSa5DL/Z5Ar6MyscXBmwcY24C0yatbtGPlxZ1Lfj6Aexhbamrq8W2Ck6bqubyV+HSJvGJUcarOxwSAmQzDVNKmW3RxN452KM2y9VLc5jNxaYZdGdqteQFoDrrZb5fv0ZWR/fdDBAQCMhHQKkgfhVLIdWTr6hOpiDs9NnzmdYo0ER1y7Gj8J2whXqEYXznmo8y372z7j9PUPQhWCnEs/veEaNpHUpG4Yjy0GEvrzdp7tNpOxzDr433hsmkDwTgJHr3sD8uUGNJ0sgBTbOTtIC/hZCKqq1iieLppecA846W0MkBwrFZKesVwH/bmBMZlgbomvWhhIhEs9nGYSEAzLj0x4JkF//exESLXp6840pAL1HFBOLRknjEBXOFecVxcEgIRQZG/8NcfTlNUgJVm9re1UQP39qvdNyoESg/luLQ84lGy0DjQQpo5utjubbf0mggLLHic6Aaimct7g3buEckjUdLvvlK2LReaDwvkENlysrHLxpamLm6RRV139k/R3GBI1F1H6PbTST0J12/oFDv/1btrRvDU22dYPOLgAgRhzBOg4MlI4XrVvQUwcr2wMQbPZk1k5jixKcbjh5uJq8zl5ro3hrR5k7aWO71Qy9uxmbmD1EkZDOtYxLCMYe+eBkuE7FN7A/ioFIr/TVhMbSeP4iF4R8YS1DpJ7+1skdNZ6GeMfw/XBZJJGp/jH9ulBEolRrJ2NvXvgKDwWSw5lSEYKT5qXrX99BqwBqy3VLDQqpVEvVfuaMzqQVwpCPQI1blHF2FwZKXd6DSiO0Npi2XtAQcZjb/9SaEwoORNr8cowR/HkJIdV/pkk//7f/Y9gWsmNtiivR6bi6C0pvtSkYA+nGIVS3IRHiVt2PljPWGwCQcO/nI5qxksSsByYMBvdS5+VYRdzEQUhFPzTZPmiXi4LIMAwGcQ0NKTsb5u7zrIqhVwnBp75hJntAArJAccK1GWqjX4e+CCBwgKc1JuLSCaxzooKaKL7XfAP81lGd/phOldRleApUAXNeOHSqQN8Ru1jj3AhjYtVlIr58wknbZNIEc8atQcpyGUOAWCvCfBgeg5rqVm04R+2HJyheDy7nBnxT+rbnGvPMgGU0gwrhduZlOYsaM=', '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
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, OiHoolIAygQAXBT.csBase64 encoded string: 'yKawK3VpaUozVt7nSUZH+FnSyshePzOpFVCnRwX7U4ZB280WpfMTuTYeExR0FWuvbGpl3SI6rcp8bs+ljbVa2lDFNksGpMvQB+F6XFct3J60IeY1leqgjx0W7B1p+kqD/QtuP0XvjgWxZQ6bRM4s9auajVMXd2Y/Hgg/g2fz1ZipgNNWkwZoA0gfIfq8C+K+1i+++6eXPAokDnmrOM+EdaCtg8b5VGEj6UB1qrLieygyNrM6/SLeKezb1PA9AtA8U9IirRGLrYGl6gMwhQMH2ARPD9qVLreMF1ObJjWzeBmp1rLB4uTd/LTYiXbqf6vQ0SDyFPN74YEHEw5+xR5zSVxycirzV/2lIOJHuy1HYcQQVxoGAbLnZhMKMRQLzJEbpb/BoXIMSlHILNCGdkzsajyh/2CB9lgbze0+hcs7lWIUdnw/NG2Lh+NR9mTGqyRD8f6ztxYyBny2t7mnfhtYWyzP1/oxh+pwDbttOmnidk8vgIy4Z86FP2GdusQdiJac8alNHOjVOQGfiXF1PcBfUm0+IMYZU4BlX5S+8VjvPRSmWrd8hHO2nB+OflZE7cZ8+IQabffVZ7nGtNlcs5hpJV1n36PHaPpfOV1mftpl3KQ/IIepioZKvI0zVhG1R/MDkTxlmx+JcLVsaDJq02tWIAWR0dPcX5suErDeDucMUjXits8r7bCJ2GjAjghT1eu5Gu8Zl2ZRza7Iq/EA6DhGs5wcDpKYuHB/TOLrBxZV2S40V+lpzYBpbpzWEs6c6tIMHE3ejTrM0WAZR05tqWOuh+XvN4Ar/1NfvOHGxiSB8QZCoSyrCyJ785MPSL3gf49u/vm6Lkh1zPqAiS8w6VA1PpaEyeGajroYXuiWPP7obfDHTOwblMA6mf6orYIWZpWrFo94fu5vde5No6HKP5Yxo+VyFfKP4BwkSC75N4rviWlv81OiGc2r2X9HA3Jsc4Q6hrZSFiE7SoJhlraD1pP6yLDzfyNBmuuHE5I/e/deR6sSSPiejRj0u+JUrT+/h9acgZHQCTragNKUSpZMseB7Fiw5qpkclFu2scGyuXx+nKoO2KzPSbRjsXOfaApX/1ofb5tCm+hSFwTTih4mq7N0Tkh2mMQ4Z0ubCatWr9VO6bw3/EX5cF4oe3WV5uKBXly7ztB7lplwxOVmAxWZ3rbBOJofvRitOUtUmf/4Lgn1akzk/X8n4brrIUAMz9YS+lYKd0rLTpKme2XK3WRSa5DL/Z5Ar6MyscXBmwcY24C0yatbtGPlxZ1Lfj6Aexhbamrq8W2Ck6bqubyV+HSJvGJUcarOxwSAmQzDVNKmW3RxN452KM2y9VLc5jNxaYZdGdqteQFoDrrZb5fv0ZWR/fdDBAQCMhHQKkgfhVLIdWTr6hOpiDs9NnzmdYo0ER1y7Gj8J2whXqEYXznmo8y372z7j9PUPQhWCnEs/veEaNpHUpG4Yjy0GEvrzdp7tNpOxzDr433hsmkDwTgJHr3sD8uUGNJ0sgBTbOTtIC/hZCKqq1iieLppecA846W0MkBwrFZKesVwH/bmBMZlgbomvWhhIhEs9nGYSEAzLj0x4JkF//exESLXp6840pAL1HFBOLRknjEBXOFecVxcEgIRQZG/8NcfTlNUgJVm9re1UQP39qvdNyoESg/luLQ84lGy0DjQQpo5utjubbf0mggLLHic6Aaimct7g3buEckjUdLvvlK2LReaDwvkENlysrHLxpamLm6RRV139k/R3GBI1F1H6PbTST0J12/oFDv/1btrRvDU22dYPOLgAgRhzBOg4MlI4XrVvQUwcr2wMQbPZk1k5jixKcbjh5uJq8zl5ro3hrR5k7aWO71Qy9uxmbmD1EkZDOtYxLCMYe+eBkuE7FN7A/ioFIr/TVhMbSeP4iF4R8YS1DpJ7+1skdNZ6GeMfw/XBZJJGp/jH9ulBEolRrJ2NvXvgKDwWSw5lSEYKT5qXrX99BqwBqy3VLDQqpVEvVfuaMzqQVwpCPQI1blHF2FwZKXd6DSiO0Npi2XtAQcZjb/9SaEwoORNr8cowR/HkJIdV/pkk//7f/Y9gWsmNtiivR6bi6C0pvtSkYA+nGIVS3IRHiVt2PljPWGwCQcO/nI5qxksSsByYMBvdS5+VYRdzEQUhFPzTZPmiXi4LIMAwGcQ0NKTsb5u7zrIqhVwnBp75hJntAArJAccK1GWqjX4e+CCBwgKc1JuLSCaxzooKaKL7XfAP81lGd/phOldRleApUAXNeOHSqQN8Ru1jj3AhjYtVlIr58wknbZNIEc8atQcpyGUOAWCvCfBgeg5rqVm04R+2HJyheDy7nBnxT+rbnGvPMgGU0gwrhduZlOYsaM=', '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
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, OiHoolIAygQAXBT.csBase64 encoded string: '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', 'TYJElFG2H7en+iOkEBBBshDsd73cVMDmVb2esMoaqK3ap/chQz9T0P6HrfFDa2qaJroiBJ7K3yAqjpqTIVjRxBGcO//r84OI+XSGVvklW2xU4tMk0xCf8fYRCF3nC1MK1T36SdD+olDlwDwNYBOpJ+quxN1K0yjv0Enplty0LH3CI++7Du1qe4oa7T3GfqtG7Gg2hixaqdvtncI03OnYCHdIMzlpsPKKuImMi1U5VrUDc4G33ZmIIRjPq+RYE4+gzcJi7YXdEPQdBEboEuPTypjBpeK98De7DF3t1Iglhok0NsXWFhcEPpbpIKY8x7N9nd/XtPPMXgsoZF8EDsG8++tdPvZtENZOOKcvZsoNGSoNXZdL7TlzLViZEe8OBa+eHViDh/hq9kMqpUSesUwIh3LzOHz8TnflPbJmN9rW8zYfWH7GRKoqcJTO/TdXKBnSLoNJZzBMylfCRKYnFoZtIzWguBG9nIFBpWU3FkNt90At31OvSPSLEjYoUyl6ahl+7ueEoN04/m+aviBO7uO7GtKaXKxMbhdkSE85iaZNhZbNPfCizOGE89m3FGi/O+YRx7BnPUUsnIRv/+dDFiXzqqRS7hd/xQv0OY8Q1wIUESHkj9QAGFk+kCMnTogSiHIuWR3PUzq
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, OiHoolIAygQAXBT.csBase64 encoded string: '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', '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
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, UsZR4WAuccc4bG2t0V.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, UsZR4WAuccc4bG2t0V.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: _0020.AddAccessRule
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: _0020.SetAccessControl
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, ja00XrikEODt9WNI44.csSecurity API names: _0020.AddAccessRule
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, UsZR4WAuccc4bG2t0V.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, QlQTgMLzdOeM.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@27/7@2/1
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rUAE_LPO.com.exe.logJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMutant created: NULL
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMutant created: \Sessions\1\BaseNamedObjects\8xLI57IVXCDFxeWa@
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5756:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6468:120:WilError_03
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile created: C:\Users\user\AppData\Local\Temp\windowsBook.exeJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat""
            Source: rUAE_LPO.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: rUAE_LPO.com.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: rUAE_LPO.com.exeReversingLabs: Detection: 26%
            Source: rUAE_LPO.com.exeVirustotal: Detection: 32%
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile read: C:\Users\user\Desktop\rUAE_LPO.com.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat""
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"'
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3
            Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe C:\Users\user\AppData\Local\Temp\windowsBook.exe
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exitJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat""Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptnet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: webio.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: rUAE_LPO.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: rUAE_LPO.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: rUAE_LPO.com.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: AJYP.pdb source: rUAE_LPO.com.exe, windowsBook.exe.5.dr
            Source: Binary string: AJYP.pdbSHA256 source: rUAE_LPO.com.exe, windowsBook.exe.5.dr

            Data Obfuscation

            barindex
            Source: 0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpack, at4ONG9F0NYCELN5Tj.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
            Source: 0.2.rUAE_LPO.com.exe.379e790.3.raw.unpack, at4ONG9F0NYCELN5Tj.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{cPRyvIfYviaTKciquO(typeof(IntPtr).TypeHandle),cPRyvIfYviaTKciquO(typeof(Type).TypeHandle)})
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, ja00XrikEODt9WNI44.cs.Net Code: zCR6xxIx4d System.Reflection.Assembly.Load(byte[])
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, ja00XrikEODt9WNI44.cs.Net Code: zCR6xxIx4d System.Reflection.Assembly.Load(byte[])
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, ja00XrikEODt9WNI44.cs.Net Code: zCR6xxIx4d System.Reflection.Assembly.Load(byte[])
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_00A0FF81 push ds; iretd 0_2_00A0FF82
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F1B418 push eax; iretd 0_2_06F1B419
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F100BF push ds; iretd 0_2_06F100C2
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F10079 push ds; iretd 0_2_06F1007A
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F1007B push ds; iretd 0_2_06F10082
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeCode function: 0_2_06F12C8B pushfd ; iretd 0_2_06F12C92
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeCode function: 15_2_01753AE0 push ebx; retf 7135h15_2_01753BDA
            Source: rUAE_LPO.com.exeStatic PE information: section name: .text entropy: 7.958150492671751
            Source: windowsBook.exe.5.drStatic PE information: section name: .text entropy: 7.958150492671751
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, gBcrXPOXFXIV4tRjmt.csHigh entropy of concatenated method names: 'Dispose', 'rUhKVuZLdR', 'RWp4gdtD7c', 'DTmssul2M2', 'GvHK8XnfBP', 'v2NKzdH6qI', 'ProcessDialogKey', 'R0i4MF5OWH', 'b8N4KRISIn', 'V7w443aXPC'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, rtDxqSZRhmxyxWM1jr.csHigh entropy of concatenated method names: 'DQKmCKFQuB', 'WI1moCipbE', 'BklmFcssjF', 'eCUF8C1SoV', 'ttYFzs8b2s', 'OOamMCW86k', 'Eo3mK9s66C', 'xCqm4RgD1U', 'IupmwhMqg5', 'dqCm6hx8JU'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, vaXPCn83dQ8gY8wOjK.csHigh entropy of concatenated method names: 'pY1DKBRsLF', 'fOWDwFSfdY', 'XaaD60l7f9', 'v7oDChlr2d', 'OTADOru55T', 'v9BDStx5ZO', 'XmmDFiL6dk', 'iJ2UjxexDr', 'pktUPoYvNi', 'I5iUVZxdhh'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, DFSrAf4PGsaxQIaFII.csHigh entropy of concatenated method names: 'TpQxF3BGn', 'TdOJ4VlhD', 'WRHBsp79J', 'jf6eu1e0g', 'HJGErfJlJ', 'Yxak1scfo', 'DaiFK6ptkAga7gOh8h', 'TJO11w1QBDcmifeoqJ', 'BJ8U9LEHi', 'FVvtYjgvv'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, IvfphO0H1p6GM1BGgc.csHigh entropy of concatenated method names: 'BZTFni49Uw', 'aHVFci59DJ', 'H46F1d289e', 'ToString', 'Y8hFvu3lNH', 'NEdFjDsTjP', 'PVQoUXdSxFl1awXomch', 'ekvf9HdZuy5ALaMUM5G', 'Xer0NDdFSnOfwavssmM'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, GeeTyhcaukqC48ew3U.csHigh entropy of concatenated method names: 'dHcXTQ1HPI', 'F2iX74yHKS', 'ToString', 'Ri6XCBLg8n', 'gaUXOTNKGs', 'WfxXo3SEG6', 'mOXXSqWgY7', 'USRXFRODlJ', 'ADwXmJU60Q', 'ageXij6KpK'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, u9uJTJ6I33ofmI2o9H.csHigh entropy of concatenated method names: 'L11KmsZR4W', 'tccKic4bG2', 'c9sKTupYTD', 'MnlK7PqGaa', 'UlGKljFr9Y', 'blnK5t87gE', 'HXNkauEjDbIdNksOQ4', 'V8Ux0mrVBe8pP2uWum', 'SgZKKTH3qn', 'O6XKw3v2Uy'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, lvgmbkge7XdgNrcn61.csHigh entropy of concatenated method names: 'CdEQB3dMQwqluIKh2CY', 'lBsTAcdIn4ip1f67y71', 'mZJFUKGhjP', 'pkmFD6QRvV', 'IDZFtWRkNe', 'Lug3GbdhK11sGQpqOsn', 'Qf5MyPdO2WL60JZDFyE'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, kF5OWHV48NRISInv7w.csHigh entropy of concatenated method names: 'rSRU2JVHYZ', 'ENGUgvI6w4', 'yDSUIHC29Q', 'uYbUWqqqC6', 'iavURk1OEZ', 'NgSUGZnnSJ', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, uGaaEuk9RaLkGvlGjF.csHigh entropy of concatenated method names: 'zvrShdSmFv', 'P84SeH1da9', 'OtXoIEqvT0', 'TWvoWEvVPC', 'EKKoGmSa5V', 'Gfmo0GTakH', 'BlwoZYk8WX', 'y3noyZl1js', 'Q9boNAkRqp', 'TkfoYalf1E'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, IohLxTKwRZmbFlUlDfy.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qSwtRmfDDI', 'aHMt906o9b', 'dn4tnOv9HI', 'LW3tc98G8j', 'jJtt184S42', 'qyytvw8Z95', 'bVvtjxUxXH'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, ja00XrikEODt9WNI44.csHigh entropy of concatenated method names: 'VArwaURcZh', 'fEuwC363kj', 'bVPwO97PnS', 'Vgbwowcgny', 'jT7wSNm2Ik', 'nIvwFj261p', 'G1OwmPak6M', 'gLqwiEdYmd', 'AxDwfA7jDp', 'hDmwTIxvfW'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, EugvXbKMS5ALgobGfc0.csHigh entropy of concatenated method names: 'D9SDbsL9Ql', 'yL2Drpnc68', 'g8aDxniJfI', 'bqsDJqBrAT', 'WZQDhYEEp4', 'YaKDBmmDd0', 'kqKDekvUVg', 'r1pDAFFi5U', 'RO8DEiu3tY', 'n4uDkpgvPn'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, XE5EaNK4QbMtF8GGVwo.csHigh entropy of concatenated method names: 'E8GtbVUNWK', 'SZGtrY8XoP', 'j4WtxPGvrA', 'qrjRmZn0kys40EYaa5S', 'lebj5qng6aC3Rm3p8MD', 'oy9VX6nbw92Zs4n7LTQ', 'mID2sIn6NNwmBwKK1yY', 'Xlb5bTnEoHKNBk6vMaY'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, LfpPOSsKSUFq1iX8Nl.csHigh entropy of concatenated method names: 'NVhHAO98ki', 'e0ZHEtnoRh', 'wPIH25joY4', 'AI8Hgiebvl', 'b3iHWZC7DP', 'wLpHGDUIgk', 'QjcHZ5RnSD', 'TU6Hy6SH20', 'lgcHYQFYoA', 'BlkHLOZxXA'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, VLjh24E9supYTDNnlP.csHigh entropy of concatenated method names: 'WJboJQwBC8', 'j8soBNTq7o', 'rcqoAvUQoX', 'LXXoEX8xrw', 'VRiol5HBCW', 'zoNo5belCP', 'wT6oXTGhx8', 'PPqoU1pcUC', 'kbYoDTVBOJ', 'U65otTB1n7'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, UsZR4WAuccc4bG2t0V.csHigh entropy of concatenated method names: 'Ia6ORJvRab', 'CyLO9Wx5WQ', 'thpOnVZs7J', 'bM7OcMyIIx', 'eZKO1aNnwO', 'EurOvcMHeU', 'zTtOjTcGDC', 'NVIOPkPSOA', 'VUtOVUl3G5', 'oVaO8PLPk1'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, OkCM60NmyAtFOQfQUD.csHigh entropy of concatenated method names: 'tbNmbu9pLk', 'wSPmrOju3t', 'E59mx0I7JQ', 'N5OmJE99NZ', 'FxDmhOsHPp', 'dfMmBVWa3E', 'fjMmesLKS5', 'qVDmAa1rea', 'RdMmEBX1h1', 'Hirmk6pLmR'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, wpaG8yRb7t7ykAyuog.csHigh entropy of concatenated method names: 'FIHlYH9tTF', 'yyglpE3LFS', 'j9alRno07T', 'h2fl9dDCvo', 'StPlgRpJhU', 'jHvlIyQc1i', 'xPYlWC7IUh', 'DX6lGnYaoO', 'v27l0V07YH', 'XsFlZl7sIa'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, y9Y4ln2t87gEHOfKCO.csHigh entropy of concatenated method names: 'AxaFa12cKu', 'revFOBLcoO', 'ik6FSCIcIh', 'IMnFm4ESfd', 'VHBFiNWDlt', 'KcRS1U1fy5', 'b11SvD1QSk', 'y0uSjWQSTY', 'w6JSP5KwRh', 'we8SVfDuga'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, UHXnfBPP32NdH6qI90.csHigh entropy of concatenated method names: 'z83UC7ecxL', 'GGhUOyqxBn', 'WkrUouJvcT', 'qSdUS0HlwN', 'SbsUFLoEoh', 'oiwUmJsjBE', 'KifUiS4N2n', 'hsfUf9V5bs', 'm8bUTZGPql', 'kUyU7aKVLp'
            Source: 0.2.rUAE_LPO.com.exe.38f9270.2.raw.unpack, T69rpRnjd8kRs2GVQZ.csHigh entropy of concatenated method names: 'ToString', 'uYs5Lvo5cO', 'l635g6I8Kw', 'IVj5If43W2', 'H2q5WQCnFY', 'IVO5GEmHRr', 'i8p50aGxCa', 'TKR5Zt2g06', 'MCo5yif1Ze', 'Tx35NYqmPX'
            Source: 0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
            Source: 0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpack, at4ONG9F0NYCELN5Tj.csHigh entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, gBcrXPOXFXIV4tRjmt.csHigh entropy of concatenated method names: 'Dispose', 'rUhKVuZLdR', 'RWp4gdtD7c', 'DTmssul2M2', 'GvHK8XnfBP', 'v2NKzdH6qI', 'ProcessDialogKey', 'R0i4MF5OWH', 'b8N4KRISIn', 'V7w443aXPC'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, rtDxqSZRhmxyxWM1jr.csHigh entropy of concatenated method names: 'DQKmCKFQuB', 'WI1moCipbE', 'BklmFcssjF', 'eCUF8C1SoV', 'ttYFzs8b2s', 'OOamMCW86k', 'Eo3mK9s66C', 'xCqm4RgD1U', 'IupmwhMqg5', 'dqCm6hx8JU'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, vaXPCn83dQ8gY8wOjK.csHigh entropy of concatenated method names: 'pY1DKBRsLF', 'fOWDwFSfdY', 'XaaD60l7f9', 'v7oDChlr2d', 'OTADOru55T', 'v9BDStx5ZO', 'XmmDFiL6dk', 'iJ2UjxexDr', 'pktUPoYvNi', 'I5iUVZxdhh'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, DFSrAf4PGsaxQIaFII.csHigh entropy of concatenated method names: 'TpQxF3BGn', 'TdOJ4VlhD', 'WRHBsp79J', 'jf6eu1e0g', 'HJGErfJlJ', 'Yxak1scfo', 'DaiFK6ptkAga7gOh8h', 'TJO11w1QBDcmifeoqJ', 'BJ8U9LEHi', 'FVvtYjgvv'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, IvfphO0H1p6GM1BGgc.csHigh entropy of concatenated method names: 'BZTFni49Uw', 'aHVFci59DJ', 'H46F1d289e', 'ToString', 'Y8hFvu3lNH', 'NEdFjDsTjP', 'PVQoUXdSxFl1awXomch', 'ekvf9HdZuy5ALaMUM5G', 'Xer0NDdFSnOfwavssmM'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, GeeTyhcaukqC48ew3U.csHigh entropy of concatenated method names: 'dHcXTQ1HPI', 'F2iX74yHKS', 'ToString', 'Ri6XCBLg8n', 'gaUXOTNKGs', 'WfxXo3SEG6', 'mOXXSqWgY7', 'USRXFRODlJ', 'ADwXmJU60Q', 'ageXij6KpK'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, u9uJTJ6I33ofmI2o9H.csHigh entropy of concatenated method names: 'L11KmsZR4W', 'tccKic4bG2', 'c9sKTupYTD', 'MnlK7PqGaa', 'UlGKljFr9Y', 'blnK5t87gE', 'HXNkauEjDbIdNksOQ4', 'V8Ux0mrVBe8pP2uWum', 'SgZKKTH3qn', 'O6XKw3v2Uy'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, lvgmbkge7XdgNrcn61.csHigh entropy of concatenated method names: 'CdEQB3dMQwqluIKh2CY', 'lBsTAcdIn4ip1f67y71', 'mZJFUKGhjP', 'pkmFD6QRvV', 'IDZFtWRkNe', 'Lug3GbdhK11sGQpqOsn', 'Qf5MyPdO2WL60JZDFyE'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, kF5OWHV48NRISInv7w.csHigh entropy of concatenated method names: 'rSRU2JVHYZ', 'ENGUgvI6w4', 'yDSUIHC29Q', 'uYbUWqqqC6', 'iavURk1OEZ', 'NgSUGZnnSJ', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, uGaaEuk9RaLkGvlGjF.csHigh entropy of concatenated method names: 'zvrShdSmFv', 'P84SeH1da9', 'OtXoIEqvT0', 'TWvoWEvVPC', 'EKKoGmSa5V', 'Gfmo0GTakH', 'BlwoZYk8WX', 'y3noyZl1js', 'Q9boNAkRqp', 'TkfoYalf1E'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, IohLxTKwRZmbFlUlDfy.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qSwtRmfDDI', 'aHMt906o9b', 'dn4tnOv9HI', 'LW3tc98G8j', 'jJtt184S42', 'qyytvw8Z95', 'bVvtjxUxXH'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, ja00XrikEODt9WNI44.csHigh entropy of concatenated method names: 'VArwaURcZh', 'fEuwC363kj', 'bVPwO97PnS', 'Vgbwowcgny', 'jT7wSNm2Ik', 'nIvwFj261p', 'G1OwmPak6M', 'gLqwiEdYmd', 'AxDwfA7jDp', 'hDmwTIxvfW'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, EugvXbKMS5ALgobGfc0.csHigh entropy of concatenated method names: 'D9SDbsL9Ql', 'yL2Drpnc68', 'g8aDxniJfI', 'bqsDJqBrAT', 'WZQDhYEEp4', 'YaKDBmmDd0', 'kqKDekvUVg', 'r1pDAFFi5U', 'RO8DEiu3tY', 'n4uDkpgvPn'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, XE5EaNK4QbMtF8GGVwo.csHigh entropy of concatenated method names: 'E8GtbVUNWK', 'SZGtrY8XoP', 'j4WtxPGvrA', 'qrjRmZn0kys40EYaa5S', 'lebj5qng6aC3Rm3p8MD', 'oy9VX6nbw92Zs4n7LTQ', 'mID2sIn6NNwmBwKK1yY', 'Xlb5bTnEoHKNBk6vMaY'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, LfpPOSsKSUFq1iX8Nl.csHigh entropy of concatenated method names: 'NVhHAO98ki', 'e0ZHEtnoRh', 'wPIH25joY4', 'AI8Hgiebvl', 'b3iHWZC7DP', 'wLpHGDUIgk', 'QjcHZ5RnSD', 'TU6Hy6SH20', 'lgcHYQFYoA', 'BlkHLOZxXA'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, VLjh24E9supYTDNnlP.csHigh entropy of concatenated method names: 'WJboJQwBC8', 'j8soBNTq7o', 'rcqoAvUQoX', 'LXXoEX8xrw', 'VRiol5HBCW', 'zoNo5belCP', 'wT6oXTGhx8', 'PPqoU1pcUC', 'kbYoDTVBOJ', 'U65otTB1n7'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, UsZR4WAuccc4bG2t0V.csHigh entropy of concatenated method names: 'Ia6ORJvRab', 'CyLO9Wx5WQ', 'thpOnVZs7J', 'bM7OcMyIIx', 'eZKO1aNnwO', 'EurOvcMHeU', 'zTtOjTcGDC', 'NVIOPkPSOA', 'VUtOVUl3G5', 'oVaO8PLPk1'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, OkCM60NmyAtFOQfQUD.csHigh entropy of concatenated method names: 'tbNmbu9pLk', 'wSPmrOju3t', 'E59mx0I7JQ', 'N5OmJE99NZ', 'FxDmhOsHPp', 'dfMmBVWa3E', 'fjMmesLKS5', 'qVDmAa1rea', 'RdMmEBX1h1', 'Hirmk6pLmR'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, wpaG8yRb7t7ykAyuog.csHigh entropy of concatenated method names: 'FIHlYH9tTF', 'yyglpE3LFS', 'j9alRno07T', 'h2fl9dDCvo', 'StPlgRpJhU', 'jHvlIyQc1i', 'xPYlWC7IUh', 'DX6lGnYaoO', 'v27l0V07YH', 'XsFlZl7sIa'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, y9Y4ln2t87gEHOfKCO.csHigh entropy of concatenated method names: 'AxaFa12cKu', 'revFOBLcoO', 'ik6FSCIcIh', 'IMnFm4ESfd', 'VHBFiNWDlt', 'KcRS1U1fy5', 'b11SvD1QSk', 'y0uSjWQSTY', 'w6JSP5KwRh', 'we8SVfDuga'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, UHXnfBPP32NdH6qI90.csHigh entropy of concatenated method names: 'z83UC7ecxL', 'GGhUOyqxBn', 'WkrUouJvcT', 'qSdUS0HlwN', 'SbsUFLoEoh', 'oiwUmJsjBE', 'KifUiS4N2n', 'hsfUf9V5bs', 'm8bUTZGPql', 'kUyU7aKVLp'
            Source: 0.2.rUAE_LPO.com.exe.3946a90.4.raw.unpack, T69rpRnjd8kRs2GVQZ.csHigh entropy of concatenated method names: 'ToString', 'uYs5Lvo5cO', 'l635g6I8Kw', 'IVj5If43W2', 'H2q5WQCnFY', 'IVO5GEmHRr', 'i8p50aGxCa', 'TKR5Zt2g06', 'MCo5yif1Ze', 'Tx35NYqmPX'
            Source: 0.2.rUAE_LPO.com.exe.379e790.3.raw.unpack, MainForm.csHigh entropy of concatenated method names: 'YgSHuitkd', 'aiP2N9Y7C', 'gHQx79i6W', 'AGv9PUWi3', 'QMsbTCblb', 'beIGikGSa', 'clTPOt4ON', 'fF0vNYCEL', 'C5TCjFvvv', 'ln3BTm5Rw'
            Source: 0.2.rUAE_LPO.com.exe.379e790.3.raw.unpack, at4ONG9F0NYCELN5Tj.csHigh entropy of concatenated method names: 'nVoxarmF975Urj2p8sJ', 'tIta6WmWAkGE6iVCWgt', 'Y8N2DklRel', 'hpreq0m6Xcu1pidWj9b', 'KFC0XvmT5N8D2LR210h', 'a5foommXYpDAHBV6LjL', 'd3wYgimbV84NAc2fo7p', 'ItvPp5mqvV1adE08UOg', 'KA7rbWmJ0EMRNxYE2Vd', 'PPtPBAmQMyT7QpfjJpI'
            Source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, WTlNonEqlrS.csHigh entropy of concatenated method names: 'RWIUTDDJGmvVUeD', 'DHwRZvzGtdyaOf', 'NVxhYPkjFbHe', 'QkrTDbktNZMNeeJWG', 'ullDtQBniM', 'uYnSlYOLGcD', 'hTHxBxeTyyhQFG', 'GPwCvvvaQvBVarLM', 'YirdoSqTbqrnwm', 'SPWfuVwfHoJf'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, gBcrXPOXFXIV4tRjmt.csHigh entropy of concatenated method names: 'Dispose', 'rUhKVuZLdR', 'RWp4gdtD7c', 'DTmssul2M2', 'GvHK8XnfBP', 'v2NKzdH6qI', 'ProcessDialogKey', 'R0i4MF5OWH', 'b8N4KRISIn', 'V7w443aXPC'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, rtDxqSZRhmxyxWM1jr.csHigh entropy of concatenated method names: 'DQKmCKFQuB', 'WI1moCipbE', 'BklmFcssjF', 'eCUF8C1SoV', 'ttYFzs8b2s', 'OOamMCW86k', 'Eo3mK9s66C', 'xCqm4RgD1U', 'IupmwhMqg5', 'dqCm6hx8JU'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, vaXPCn83dQ8gY8wOjK.csHigh entropy of concatenated method names: 'pY1DKBRsLF', 'fOWDwFSfdY', 'XaaD60l7f9', 'v7oDChlr2d', 'OTADOru55T', 'v9BDStx5ZO', 'XmmDFiL6dk', 'iJ2UjxexDr', 'pktUPoYvNi', 'I5iUVZxdhh'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, DFSrAf4PGsaxQIaFII.csHigh entropy of concatenated method names: 'TpQxF3BGn', 'TdOJ4VlhD', 'WRHBsp79J', 'jf6eu1e0g', 'HJGErfJlJ', 'Yxak1scfo', 'DaiFK6ptkAga7gOh8h', 'TJO11w1QBDcmifeoqJ', 'BJ8U9LEHi', 'FVvtYjgvv'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, IvfphO0H1p6GM1BGgc.csHigh entropy of concatenated method names: 'BZTFni49Uw', 'aHVFci59DJ', 'H46F1d289e', 'ToString', 'Y8hFvu3lNH', 'NEdFjDsTjP', 'PVQoUXdSxFl1awXomch', 'ekvf9HdZuy5ALaMUM5G', 'Xer0NDdFSnOfwavssmM'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, GeeTyhcaukqC48ew3U.csHigh entropy of concatenated method names: 'dHcXTQ1HPI', 'F2iX74yHKS', 'ToString', 'Ri6XCBLg8n', 'gaUXOTNKGs', 'WfxXo3SEG6', 'mOXXSqWgY7', 'USRXFRODlJ', 'ADwXmJU60Q', 'ageXij6KpK'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, u9uJTJ6I33ofmI2o9H.csHigh entropy of concatenated method names: 'L11KmsZR4W', 'tccKic4bG2', 'c9sKTupYTD', 'MnlK7PqGaa', 'UlGKljFr9Y', 'blnK5t87gE', 'HXNkauEjDbIdNksOQ4', 'V8Ux0mrVBe8pP2uWum', 'SgZKKTH3qn', 'O6XKw3v2Uy'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, lvgmbkge7XdgNrcn61.csHigh entropy of concatenated method names: 'CdEQB3dMQwqluIKh2CY', 'lBsTAcdIn4ip1f67y71', 'mZJFUKGhjP', 'pkmFD6QRvV', 'IDZFtWRkNe', 'Lug3GbdhK11sGQpqOsn', 'Qf5MyPdO2WL60JZDFyE'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, kF5OWHV48NRISInv7w.csHigh entropy of concatenated method names: 'rSRU2JVHYZ', 'ENGUgvI6w4', 'yDSUIHC29Q', 'uYbUWqqqC6', 'iavURk1OEZ', 'NgSUGZnnSJ', 'Next', 'Next', 'Next', 'NextBytes'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, uGaaEuk9RaLkGvlGjF.csHigh entropy of concatenated method names: 'zvrShdSmFv', 'P84SeH1da9', 'OtXoIEqvT0', 'TWvoWEvVPC', 'EKKoGmSa5V', 'Gfmo0GTakH', 'BlwoZYk8WX', 'y3noyZl1js', 'Q9boNAkRqp', 'TkfoYalf1E'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, IohLxTKwRZmbFlUlDfy.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'qSwtRmfDDI', 'aHMt906o9b', 'dn4tnOv9HI', 'LW3tc98G8j', 'jJtt184S42', 'qyytvw8Z95', 'bVvtjxUxXH'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, ja00XrikEODt9WNI44.csHigh entropy of concatenated method names: 'VArwaURcZh', 'fEuwC363kj', 'bVPwO97PnS', 'Vgbwowcgny', 'jT7wSNm2Ik', 'nIvwFj261p', 'G1OwmPak6M', 'gLqwiEdYmd', 'AxDwfA7jDp', 'hDmwTIxvfW'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, EugvXbKMS5ALgobGfc0.csHigh entropy of concatenated method names: 'D9SDbsL9Ql', 'yL2Drpnc68', 'g8aDxniJfI', 'bqsDJqBrAT', 'WZQDhYEEp4', 'YaKDBmmDd0', 'kqKDekvUVg', 'r1pDAFFi5U', 'RO8DEiu3tY', 'n4uDkpgvPn'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, XE5EaNK4QbMtF8GGVwo.csHigh entropy of concatenated method names: 'E8GtbVUNWK', 'SZGtrY8XoP', 'j4WtxPGvrA', 'qrjRmZn0kys40EYaa5S', 'lebj5qng6aC3Rm3p8MD', 'oy9VX6nbw92Zs4n7LTQ', 'mID2sIn6NNwmBwKK1yY', 'Xlb5bTnEoHKNBk6vMaY'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, LfpPOSsKSUFq1iX8Nl.csHigh entropy of concatenated method names: 'NVhHAO98ki', 'e0ZHEtnoRh', 'wPIH25joY4', 'AI8Hgiebvl', 'b3iHWZC7DP', 'wLpHGDUIgk', 'QjcHZ5RnSD', 'TU6Hy6SH20', 'lgcHYQFYoA', 'BlkHLOZxXA'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, VLjh24E9supYTDNnlP.csHigh entropy of concatenated method names: 'WJboJQwBC8', 'j8soBNTq7o', 'rcqoAvUQoX', 'LXXoEX8xrw', 'VRiol5HBCW', 'zoNo5belCP', 'wT6oXTGhx8', 'PPqoU1pcUC', 'kbYoDTVBOJ', 'U65otTB1n7'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, UsZR4WAuccc4bG2t0V.csHigh entropy of concatenated method names: 'Ia6ORJvRab', 'CyLO9Wx5WQ', 'thpOnVZs7J', 'bM7OcMyIIx', 'eZKO1aNnwO', 'EurOvcMHeU', 'zTtOjTcGDC', 'NVIOPkPSOA', 'VUtOVUl3G5', 'oVaO8PLPk1'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, OkCM60NmyAtFOQfQUD.csHigh entropy of concatenated method names: 'tbNmbu9pLk', 'wSPmrOju3t', 'E59mx0I7JQ', 'N5OmJE99NZ', 'FxDmhOsHPp', 'dfMmBVWa3E', 'fjMmesLKS5', 'qVDmAa1rea', 'RdMmEBX1h1', 'Hirmk6pLmR'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, wpaG8yRb7t7ykAyuog.csHigh entropy of concatenated method names: 'FIHlYH9tTF', 'yyglpE3LFS', 'j9alRno07T', 'h2fl9dDCvo', 'StPlgRpJhU', 'jHvlIyQc1i', 'xPYlWC7IUh', 'DX6lGnYaoO', 'v27l0V07YH', 'XsFlZl7sIa'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, y9Y4ln2t87gEHOfKCO.csHigh entropy of concatenated method names: 'AxaFa12cKu', 'revFOBLcoO', 'ik6FSCIcIh', 'IMnFm4ESfd', 'VHBFiNWDlt', 'KcRS1U1fy5', 'b11SvD1QSk', 'y0uSjWQSTY', 'w6JSP5KwRh', 'we8SVfDuga'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, UHXnfBPP32NdH6qI90.csHigh entropy of concatenated method names: 'z83UC7ecxL', 'GGhUOyqxBn', 'WkrUouJvcT', 'qSdUS0HlwN', 'SbsUFLoEoh', 'oiwUmJsjBE', 'KifUiS4N2n', 'hsfUf9V5bs', 'm8bUTZGPql', 'kUyU7aKVLp'
            Source: 0.2.rUAE_LPO.com.exe.7320000.6.raw.unpack, T69rpRnjd8kRs2GVQZ.csHigh entropy of concatenated method names: 'ToString', 'uYs5Lvo5cO', 'l635g6I8Kw', 'IVj5If43W2', 'H2q5WQCnFY', 'IVO5GEmHRr', 'i8p50aGxCa', 'TKR5Zt2g06', 'MCo5yif1Ze', 'Tx35NYqmPX'
            Source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, WTlNonEqlrS.csHigh entropy of concatenated method names: 'RWIUTDDJGmvVUeD', 'DHwRZvzGtdyaOf', 'NVxhYPkjFbHe', 'QkrTDbktNZMNeeJWG', 'ullDtQBniM', 'uYnSlYOLGcD', 'hTHxBxeTyyhQFG', 'GPwCvvvaQvBVarLM', 'YirdoSqTbqrnwm', 'SPWfuVwfHoJf'
            Source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, WTlNonEqlrS.csHigh entropy of concatenated method names: 'RWIUTDDJGmvVUeD', 'DHwRZvzGtdyaOf', 'NVxhYPkjFbHe', 'QkrTDbktNZMNeeJWG', 'ullDtQBniM', 'uYnSlYOLGcD', 'hTHxBxeTyyhQFG', 'GPwCvvvaQvBVarLM', 'YirdoSqTbqrnwm', 'SPWfuVwfHoJf'
            Source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, WTlNonEqlrS.csHigh entropy of concatenated method names: 'RWIUTDDJGmvVUeD', 'DHwRZvzGtdyaOf', 'NVxhYPkjFbHe', 'QkrTDbktNZMNeeJWG', 'ullDtQBniM', 'uYnSlYOLGcD', 'hTHxBxeTyyhQFG', 'GPwCvvvaQvBVarLM', 'YirdoSqTbqrnwm', 'SPWfuVwfHoJf'
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile created: C:\Users\user\AppData\Local\Temp\windowsBook.exeJump to dropped file

            Boot Survival

            barindex
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"'
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 3652, type: MEMORYSTR
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTR
            Source: rUAE_LPO.com.exe, 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, rUAE_LPO.com.exe, 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, windowsBook.exe, 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: A00000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 4780000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 74B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 84B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 8660000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 9660000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 2730000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: 4730000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: AA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 2420000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 4420000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 6D70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 7D70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 7F10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 8F10000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 1110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 74C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 84C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 8650000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 9650000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 31F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 16B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 1190000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 2C50000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory allocated: 2950000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeWindow / User API: threadDelayed 6765Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeWindow / User API: threadDelayed 3086Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exe TID: 1988Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exe TID: 5356Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 2300Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 6412Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 5488Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 3376Thread sleep time: -27670116110564310s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 1372Thread sleep count: 6765 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 1372Thread sleep count: 3086 > 30Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exe TID: 6256Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: windowsBook.exe, 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: windowsBook.exe, 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(.W
            Source: windowsBook.exe, 0000000F.00000002.3258819221.0000000005569000.00000004.00000020.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3258938130.000000000557B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeMemory written: C:\Users\user\Desktop\rUAE_LPO.com.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeMemory written: C:\Users\user\AppData\Local\Temp\windowsBook.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Users\user\Desktop\rUAE_LPO.com.exe "C:\Users\user\Desktop\rUAE_LPO.com.exe"Jump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exitJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat""Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 3Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe" Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeProcess created: C:\Users\user\AppData\Local\Temp\windowsBook.exe "C:\Users\user\AppData\Local\Temp\windowsBook.exe"Jump to behavior
            Source: windowsBook.exe, 0000000F.00000002.3253071159.0000000003250000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.000000000327F000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.0000000003244000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q
            Source: windowsBook.exe, 0000000F.00000002.3253071159.0000000003250000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.000000000327F000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.0000000003244000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: windowsBook.exe, 0000000F.00000002.3253071159.000000000327F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]qT,(
            Source: windowsBook.exe, 0000000F.00000002.3253071159.000000000327F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q4.(
            Source: windowsBook.exe, 0000000F.00000002.3253071159.0000000003250000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.000000000327F000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.0000000003244000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q%
            Source: windowsBook.exe, 0000000F.00000002.3253071159.0000000003244000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q`H$
            Source: windowsBook.exe, 0000000F.00000002.3253071159.0000000003244000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q@J$
            Source: windowsBook.exe, 0000000F.00000002.3253071159.0000000003250000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.0000000003257000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q
            Source: windowsBook.exe, 0000000F.00000002.3253071159.000000000325E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`,]q
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Users\user\Desktop\rUAE_LPO.com.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Users\user\Desktop\rUAE_LPO.com.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windowsBook.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windowsBook.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windowsBook.exe VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeQueries volume information: C:\Users\user\AppData\Local\Temp\windowsBook.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.rUAE_LPO.com.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.2436d98.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.2796c58.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.278ad74.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.windowsBook.exe.242aeb4.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 6368, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: rUAE_LPO.com.exe PID: 4796, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 3292, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: windowsBook.exe PID: 6516, type: MEMORYSTR
            Source: windowsBook.exe, 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\rUAE_LPO.com.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Users\user\AppData\Local\Temp\windowsBook.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.379e790.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.6bd0000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.379e790.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2066706772.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2058828936.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.379e790.3.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.6bd0000.5.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.6bd0000.5.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.rUAE_LPO.com.exe.379e790.3.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2066706772.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2058828936.0000000003781000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information1
            Scripting
            Valid Accounts1
            Windows Management Instrumentation
            2
            Scheduled Task/Job
            112
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            Query Registry
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Scheduled Task/Job
            1
            Scripting
            2
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory221
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt1
            DLL Side-Loading
            1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager2
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared Drive1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook112
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
            Obfuscated Files or Information
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
            Software Packing
            DCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538408 Sample: rUAE_LPO.com.exe Startdate: 21/10/2024 Architecture: WINDOWS Score: 100 50 quin.ydns.eu 2->50 56 Suricata IDS alerts for network traffic 2->56 58 Found malware configuration 2->58 60 Malicious sample detected (through community Yara rule) 2->60 62 12 other signatures 2->62 10 rUAE_LPO.com.exe 3 2->10         started        14 windowsBook.exe 3 2->14         started        signatures3 process4 file5 48 C:\Users\user\...\rUAE_LPO.com.exe.log, ASCII 10->48 dropped 64 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->64 66 Injects a PE file into a foreign processes 10->66 16 rUAE_LPO.com.exe 6 10->16         started        19 rUAE_LPO.com.exe 10->19         started        21 rUAE_LPO.com.exe 10->21         started        68 Multi AV Scanner detection for dropped file 14->68 70 Machine Learning detection for dropped file 14->70 23 windowsBook.exe 2 14->23         started        26 windowsBook.exe 14->26         started        signatures6 process7 dnsIp8 46 C:\Users\user\AppData\...\windowsBook.exe, PE32 16->46 dropped 28 cmd.exe 1 16->28         started        30 cmd.exe 1 16->30         started        52 quin.ydns.eu 185.38.142.240, 1962, 49716 NETSOLUTIONSNL Portugal 23->52 file9 process10 signatures11 33 windowsBook.exe 2 28->33         started        36 conhost.exe 28->36         started        38 timeout.exe 1 28->38         started        72 Uses schtasks.exe or at.exe to add and modify task schedules 30->72 40 conhost.exe 30->40         started        42 schtasks.exe 1 30->42         started        process12 signatures13 54 Injects a PE file into a foreign processes 33->54 44 windowsBook.exe 2 33->44         started        process14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            rUAE_LPO.com.exe26%ReversingLabsWin32.Dropper.Generic
            rUAE_LPO.com.exe33%VirustotalBrowse
            rUAE_LPO.com.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\windowsBook.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\windowsBook.exe26%ReversingLabsWin32.Dropper.Generic
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            quin.ydns.eu
            185.38.142.240
            truetrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              quin.ydns.eutrue
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerUAE_LPO.com.exe, 00000005.00000002.2106829519.000000000287D000.00000004.00000800.00020000.00000000.sdmp, windowsBook.exe, 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                185.38.142.240
                quin.ydns.euPortugal
                47674NETSOLUTIONSNLtrue
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1538408
                Start date and time:2024-10-21 08:34:04 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 6m 40s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:19
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:rUAE_LPO.com.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@27/7@2/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 153
                • Number of non-executed functions: 7
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 2.19.126.163, 2.19.126.137
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net
                • Execution Graph export aborted for target rUAE_LPO.com.exe, PID 4796 because it is empty
                • Execution Graph export aborted for target windowsBook.exe, PID 5240 because it is empty
                • Execution Graph export aborted for target windowsBook.exe, PID 6516 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                TimeTypeDescription
                02:34:56API Interceptor1x Sleep call for process: rUAE_LPO.com.exe modified
                02:35:06API Interceptor3x Sleep call for process: windowsBook.exe modified
                08:35:02Task SchedulerRun new task: windowsBook path: "C:\Users\user\AppData\Local\Temp\windowsBook.exe"
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                NETSOLUTIONSNLA9BripDhRY.lnkGet hashmaliciousUnknownBrowse
                • 185.38.142.128
                93.123.85.253-bot.armv4l-2024-08-28T17_49_11.elfGet hashmaliciousUnknownBrowse
                • 188.93.233.79
                a591d3d035cf90395ad1078a415a46b5b44dd813496291b702fe36cfb22dee36_dump.exeGet hashmaliciousRedLineBrowse
                • 185.38.142.10
                b3u71vBG0u.exeGet hashmaliciousRedLineBrowse
                • 185.38.142.10
                2MbHBiqXH2.rtfGet hashmaliciousRedLineBrowse
                • 185.38.142.10
                YPSvIjQCzd.exeGet hashmaliciousRedLineBrowse
                • 185.38.142.10
                Invoice LGMSCH0040924 Paid - EFT Remittance Advice and Receipt.docx.docGet hashmaliciousRedLineBrowse
                • 185.38.142.10
                MSH INV 2024-0117 Secure Payment Invoice for .exeGet hashmaliciousRedLineBrowse
                • 185.38.142.10
                sclfmLKwR7.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 185.38.142.103
                3nYvEPuDi1.elfGet hashmaliciousGafgyt, MiraiBrowse
                • 185.38.142.103
                No context
                No context
                Process:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                Category:dropped
                Size (bytes):71954
                Entropy (8bit):7.996617769952133
                Encrypted:true
                SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                Malicious:false
                Reputation:high, very likely benign file
                Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                Process:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                File Type:data
                Category:dropped
                Size (bytes):328
                Entropy (8bit):3.129285522755915
                Encrypted:false
                SSDEEP:6:kKl89UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:9fDnLNkPlE99SNxAhUe/3
                MD5:5E7C930A7751C6AE8BCD5168A1DA293F
                SHA1:241C8E3E58EB3A719F37EFE6EA824F7BF59F261C
                SHA-256:8C22AFC76C5F954F9F1DE23670754FB6EFE06C6656F8FCE1F7D483FFE4784E59
                SHA-512:D7AEC2C054C5C3ED43578B3DA3EEF3750EE7A6C6128FECD99441ED651518ACCC777DF39256891832486931232055010A48A61873953EBE465216440BF2355448
                Malicious:false
                Preview:p...... ........w!.c.#..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                Process:C:\Users\user\Desktop\rUAE_LPO.com.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1415
                Entropy (8bit):5.352427679901606
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRaKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPHKMRatHo6hAH4
                MD5:97AD91F1C1F572C945DA12233082171D
                SHA1:D5E33DDAB37E32E416FC40419FB26B3C0563519D
                SHA-256:3F64591E0447E6F5034BC69A8A8D4C7ED36DAC5FE1E408401AE1B98F0D915F7E
                SHA-512:8FAEED342DADC17571F711DDC1BE67C79A51CA5BD56B5DA13E472ED45FC4EC6F1DC704BA92E81E97F5ECFD73F3D88F9B9CD9AE4EADDF993BFF826627215FBBCE
                Malicious:true
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fc
                Process:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1415
                Entropy (8bit):5.352427679901606
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPE4KMRaKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPHKMRatHo6hAH4
                MD5:97AD91F1C1F572C945DA12233082171D
                SHA1:D5E33DDAB37E32E416FC40419FB26B3C0563519D
                SHA-256:3F64591E0447E6F5034BC69A8A8D4C7ED36DAC5FE1E408401AE1B98F0D915F7E
                SHA-512:8FAEED342DADC17571F711DDC1BE67C79A51CA5BD56B5DA13E472ED45FC4EC6F1DC704BA92E81E97F5ECFD73F3D88F9B9CD9AE4EADDF993BFF826627215FBBCE
                Malicious:false
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Data, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Data\1b8c564fd69668e6e62d136259980d9e\System.Data.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fc
                Process:C:\Users\user\Desktop\rUAE_LPO.com.exe
                File Type:DOS batch file, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):159
                Entropy (8bit):5.037612088974647
                Encrypted:false
                SSDEEP:3:mKDDCMNqTtvL5oUkh4E2J5xAIhTsmqRDUkh4E2J5xAInTRINOwZPy:hWKqTtT6923fhTsmq1923fThwk
                MD5:2CE42A745584D48542777717D2380C75
                SHA1:F81B8546DF14802D2CC663DE63183D9D37D6FBC0
                SHA-256:B8DF57F8090C0A30B44404209816046D3BE2127DBD20B3A108EC33BD872A11FD
                SHA-512:DA76D47B4F33E5F3CF3E49C8A2B594D529F3E1C62EBB407C5B4092CD446B78D8BA9D2BC31E7A4B07FC123B41EA86666C354D2424A9C6E0761A110BBF0D342677
                Malicious:false
                Preview:@echo off..timeout 3 > NUL..START "" "C:\Users\user\AppData\Local\Temp\windowsBook.exe"..CD C:\Users\user\AppData\Local\Temp\..DEL "tmpBE0.tmp.bat" /f /q..
                Process:C:\Users\user\Desktop\rUAE_LPO.com.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):485888
                Entropy (8bit):7.946911188368196
                Encrypted:false
                SSDEEP:12288:EfA3XkhMOoltiJu9IRWU/5fV1NJrazIY:tkh5oDiJuKRWU3U0
                MD5:A305269DB6286FC4DD1D73AC5D2BF208
                SHA1:B8777B46A2B1AE40B8D6FF32CC79174E1E617983
                SHA-256:14995AB5376DCCBA2F4E91E4EFCF09AB18D5645F262EE8CEF70D4DA8B9317699
                SHA-512:D05EA3EA97DFA9001292B3C56DE44A6173405D1A7ADDC5CC08A34CB8B659CF0492DBF3048D59B9132B050187CD9C200CFB9752F3F37CC74CB9C9860AFADAA10E
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 26%
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0..J...........h... ........@.. ....................................@.................................5h..O....................................N..T............................................ ............... ..H............text....H... ...J.................. ..`.rsrc................L..............@..@.reloc...............h..............@..B................ih......H.......xV..|=......4....................................................0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*...0............{.....+..*&...}....*".(.....*..0..y..........@...%.G...(......~I...%-.&~H.....C...s....%.I...(...+...o.....+ .o........(....r...p(....(.......o....-....,..o .....*.........A.,m.......0...........(!.............}...
                Process:C:\Windows\SysWOW64\timeout.exe
                File Type:ASCII text, with CRLF line terminators, with overstriking
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.41440934524794
                Encrypted:false
                SSDEEP:3:hYFqdLGAR+mQRKVxLZXt0sn:hYFqGaNZKsn
                MD5:3DD7DD37C304E70A7316FE43B69F421F
                SHA1:A3754CFC33E9CA729444A95E95BCB53384CB51E4
                SHA-256:4FA27CE1D904EA973430ADC99062DCF4BAB386A19AB0F8D9A4185FA99067F3AA
                SHA-512:713533E973CF0FD359AC7DB22B1399392C86D9FD1E715248F5724AAFBBF0EEB5EAC0289A0E892167EB559BE976C2AD0A0A0D8EFC407FFAF5B3C3A32AA9A0AAA4
                Malicious:false
                Preview:..Waiting for 3 seconds, press a key to continue ....2.1.0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.946911188368196
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                File name:rUAE_LPO.com.exe
                File size:485'888 bytes
                MD5:a305269db6286fc4dd1d73ac5d2bf208
                SHA1:b8777b46a2b1ae40b8d6ff32cc79174e1e617983
                SHA256:14995ab5376dccba2f4e91e4efcf09ab18d5645f262ee8cef70d4da8b9317699
                SHA512:d05ea3ea97dfa9001292b3c56de44a6173405d1a7addc5cc08a34cb8b659cf0492dbf3048d59b9132b050187cd9c200cfb9752f3f37cc74cb9c9860afadaa10e
                SSDEEP:12288:EfA3XkhMOoltiJu9IRWU/5fV1NJrazIY:tkh5oDiJuKRWU3U0
                TLSH:DCA4121371E81F0ECAFB27FAA132286403F3A4560613E94D5CD2A4EB63B7B495684F57
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0..J...........h... ........@.. ....................................@................................
                Icon Hash:070b2365ecc8682b
                Entrypoint:0x47688a
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x6715CAA0 [Mon Oct 21 03:29:36 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add dword ptr [eax], eax
                add byte ptr [eax], al
                add al, byte ptr [eax]
                add byte ptr [eax], al
                add eax, dword ptr [eax]
                add byte ptr [eax], al
                add al, 00h
                add byte ptr [eax], al
                add eax, 06000000h
                add byte ptr [eax], al
                add byte ptr [edi], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x768350x4f.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x780000x1aac.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x74ef40x54.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x748b00x74a001f06a5c222dd9a2bfc0151176c93bd43False0.9629199323419079data7.958150492671751IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x780000x1aac0x1c00b4e0f8d91b4cc3f2ebf0dc3ce1fa804fFalse0.8445870535714286data7.147413531617353IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x7a0000xc0x20097d47bd1364f94b077aba682e8dd0c1cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x780c80x16a5PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9608418147317578
                RT_GROUP_ICON0x797800x14data1.05
                RT_VERSION0x797a40x304data0.44689119170984454
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-10-21T08:35:14.455430+02002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1185.38.142.2401962192.168.2.549716TCP
                2024-10-21T08:35:14.455430+02002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1185.38.142.2401962192.168.2.549716TCP
                2024-10-21T08:35:14.455430+02002035595ET MALWARE Generic AsyncRAT Style SSL Cert1185.38.142.2401962192.168.2.549716TCP
                2024-10-21T08:35:14.455430+02002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1185.38.142.2401962192.168.2.549716TCP
                TimestampSource PortDest PortSource IPDest IP
                Oct 21, 2024 08:35:13.603147984 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:13.608052015 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:13.608117104 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:13.618658066 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:13.623486042 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:14.443073988 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:14.443087101 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:14.443161011 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:14.450552940 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:14.455430031 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:14.691627026 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:14.767100096 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:16.374180079 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:16.379071951 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:16.379144907 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:16.383971930 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:26.597493887 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:26.602421999 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:26.602511883 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:26.607391119 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:26.842559099 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:26.892237902 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:26.959393024 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:26.966125011 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:26.971041918 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:26.971112013 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:26.976473093 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:36.619249105 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:36.673500061 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:36.736126900 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:36.782783031 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:36.830113888 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:36.835045099 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:36.835103989 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:36.840009928 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:37.078279018 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:37.126542091 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:37.195297956 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:37.196702957 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:37.201602936 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:37.201684952 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:37.206487894 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:47.066082001 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:47.070899963 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:47.070950985 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:47.075766087 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:47.311606884 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:47.360918045 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:47.428508997 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:47.429743052 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:47.434890985 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:47.434946060 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:47.439944983 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:57.299015045 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:57.303901911 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:57.303987026 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:57.308830023 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:57.543961048 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:57.595304966 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:57.660720110 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:57.662271023 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:57.667077065 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:35:57.667130947 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:35:57.671860933 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:06.618539095 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:06.673444033 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:06.735410929 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:06.782809019 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:07.543499947 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:07.548394918 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:07.548449993 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:07.553348064 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:07.788669109 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:07.829722881 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:07.905510902 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:07.907149076 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:07.912103891 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:07.912283897 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:07.917248011 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:17.857688904 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:17.862807035 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:17.862869978 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:17.867729902 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:18.104320049 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:18.157908916 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:18.220969915 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:18.223416090 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:18.228355885 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:18.228450060 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:18.233406067 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:28.041980982 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:28.047224045 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:28.047280073 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:28.052233934 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:28.287336111 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:28.329732895 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:28.404623032 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:28.454772949 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:28.609172106 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:28.613996029 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:28.614044905 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:28.618885040 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:36.619856119 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:36.673485994 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:36.736953974 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:36.782876968 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.269442081 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.274312019 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:38.274400949 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.279431105 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:38.514569998 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:38.564141989 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.631417990 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:38.674129009 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.697904110 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.702833891 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:38.702888012 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:38.707755089 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:48.502553940 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:48.507584095 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:48.507687092 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:48.512443066 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:48.747617006 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:48.798535109 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:48.864598036 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:48.866786003 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:48.871694088 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:48.871787071 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:48.876681089 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:58.157629013 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:58.162617922 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:58.167232037 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:58.175193071 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:58.407535076 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:58.454870939 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:58.524323940 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:58.525156021 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:58.530071020 CEST196249716185.38.142.240192.168.2.5
                Oct 21, 2024 08:36:58.530194044 CEST497161962192.168.2.5185.38.142.240
                Oct 21, 2024 08:36:58.535104036 CEST196249716185.38.142.240192.168.2.5
                TimestampSource PortDest PortSource IPDest IP
                Oct 21, 2024 08:35:13.585401058 CEST6483753192.168.2.51.1.1.1
                Oct 21, 2024 08:35:13.600521088 CEST53648371.1.1.1192.168.2.5
                Oct 21, 2024 08:35:26.283344030 CEST5733053192.168.2.51.1.1.1
                Oct 21, 2024 08:35:26.302964926 CEST53573301.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 21, 2024 08:35:13.585401058 CEST192.168.2.51.1.1.10x26efStandard query (0)quin.ydns.euA (IP address)IN (0x0001)false
                Oct 21, 2024 08:35:26.283344030 CEST192.168.2.51.1.1.10xf232Standard query (0)quin.ydns.euA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 21, 2024 08:35:13.600521088 CEST1.1.1.1192.168.2.50x26efNo error (0)quin.ydns.eu185.38.142.240A (IP address)IN (0x0001)false
                Oct 21, 2024 08:35:26.302964926 CEST1.1.1.1192.168.2.50xf232No error (0)quin.ydns.eu185.38.142.240A (IP address)IN (0x0001)false

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:02:34:52
                Start date:21/10/2024
                Path:C:\Users\user\Desktop\rUAE_LPO.com.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\rUAE_LPO.com.exe"
                Imagebase:0x380000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2066706772.0000000006BD0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.2058313931.0000000002781000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2058828936.0000000003781000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:3
                Start time:02:34:56
                Start date:21/10/2024
                Path:C:\Users\user\Desktop\rUAE_LPO.com.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\rUAE_LPO.com.exe"
                Imagebase:0x220000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:4
                Start time:02:34:56
                Start date:21/10/2024
                Path:C:\Users\user\Desktop\rUAE_LPO.com.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\rUAE_LPO.com.exe"
                Imagebase:0xd0000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:5
                Start time:02:34:56
                Start date:21/10/2024
                Path:C:\Users\user\Desktop\rUAE_LPO.com.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\rUAE_LPO.com.exe"
                Imagebase:0x540000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000005.00000002.2106829519.0000000002731000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000005.00000002.2109979474.0000000004EC6000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.2105635275.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:low
                Has exited:true

                Target ID:6
                Start time:02:35:01
                Start date:21/10/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"' & exit
                Imagebase:0x790000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:7
                Start time:02:35:01
                Start date:21/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6d64d0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:8
                Start time:02:35:01
                Start date:21/10/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\tmpBE0.tmp.bat""
                Imagebase:0x790000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:9
                Start time:02:35:01
                Start date:21/10/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6d64d0000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:02:35:02
                Start date:21/10/2024
                Path:C:\Windows\SysWOW64\schtasks.exe
                Wow64 process (32bit):true
                Commandline:schtasks /create /f /sc onlogon /rl highest /tn "windowsBook" /tr '"C:\Users\user\AppData\Local\Temp\windowsBook.exe"'
                Imagebase:0x380000
                File size:187'904 bytes
                MD5 hash:48C2FE20575769DE916F48EF0676A965
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:11
                Start time:02:35:02
                Start date:21/10/2024
                Path:C:\Windows\SysWOW64\timeout.exe
                Wow64 process (32bit):true
                Commandline:timeout 3
                Imagebase:0x580000
                File size:25'088 bytes
                MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:02:35:02
                Start date:21/10/2024
                Path:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                Imagebase:0x110000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000C.00000002.2159242218.0000000002421000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 26%, ReversingLabs
                Reputation:low
                Has exited:true

                Target ID:13
                Start time:02:35:05
                Start date:21/10/2024
                Path:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
                Imagebase:0x970000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:14
                Start time:02:35:07
                Start date:21/10/2024
                Path:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
                Imagebase:0x3d0000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:15
                Start time:02:35:07
                Start date:21/10/2024
                Path:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
                Imagebase:0xce0000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.3250885449.0000000001258000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000F.00000002.3253071159.00000000031F1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:low
                Has exited:false

                Target ID:17
                Start time:02:35:09
                Start date:21/10/2024
                Path:C:\Users\user\AppData\Local\Temp\windowsBook.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\windowsBook.exe"
                Imagebase:0x7a0000
                File size:485'888 bytes
                MD5 hash:A305269DB6286FC4DD1D73AC5D2BF208
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000011.00000002.2229647139.0000000000C4D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000011.00000002.2232027757.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:low
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:8.3%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:3.3%
                  Total number of Nodes:209
                  Total number of Limit Nodes:9
                  execution_graph 28208 a0d380 28209 a0d3c6 GetCurrentProcess 28208->28209 28211 a0d411 28209->28211 28212 a0d418 GetCurrentThread 28209->28212 28211->28212 28213 a0d455 GetCurrentProcess 28212->28213 28214 a0d44e 28212->28214 28215 a0d48b 28213->28215 28214->28213 28216 a0d4b3 GetCurrentThreadId 28215->28216 28217 a0d4e4 28216->28217 28220 6f19a46 28221 6f19a2d 28220->28221 28222 6f19a3d 28221->28222 28225 6f1a368 28221->28225 28243 6f1a363 28221->28243 28226 6f1a382 28225->28226 28227 6f1a3a6 28226->28227 28261 6f1a693 28226->28261 28266 6f1ae8d 28226->28266 28270 6f1aaed 28226->28270 28275 6f1ace8 28226->28275 28280 6f1a989 28226->28280 28284 6f1a804 28226->28284 28289 6f1a93e 28226->28289 28294 6f1ad7a 28226->28294 28299 6f1ab7b 28226->28299 28304 6f1a698 28226->28304 28309 6f1b1d8 28226->28309 28314 6f1b016 28226->28314 28320 6f1a7f6 28226->28320 28325 6f1aa17 28226->28325 28330 6f1ab52 28226->28330 28227->28222 28244 6f1a369 28243->28244 28245 6f1a693 2 API calls 28244->28245 28246 6f1ab52 2 API calls 28244->28246 28247 6f1a3a6 28244->28247 28248 6f1aa17 2 API calls 28244->28248 28249 6f1a7f6 2 API calls 28244->28249 28250 6f1b016 2 API calls 28244->28250 28251 6f1b1d8 2 API calls 28244->28251 28252 6f1a698 2 API calls 28244->28252 28253 6f1ab7b 2 API calls 28244->28253 28254 6f1ad7a 2 API calls 28244->28254 28255 6f1a93e 2 API calls 28244->28255 28256 6f1a804 2 API calls 28244->28256 28257 6f1a989 2 API calls 28244->28257 28258 6f1ace8 2 API calls 28244->28258 28259 6f1aaed 2 API calls 28244->28259 28260 6f1ae8d 2 API calls 28244->28260 28245->28247 28246->28247 28247->28222 28248->28247 28249->28247 28250->28247 28251->28247 28252->28247 28253->28247 28254->28247 28255->28247 28256->28247 28257->28247 28258->28247 28259->28247 28260->28247 28262 6f1a6cb 28261->28262 28262->28227 28335 6f19508 28262->28335 28339 6f194ff 28262->28339 28343 6f190e3 28266->28343 28347 6f190e8 28266->28347 28267 6f1aea7 28267->28227 28271 6f1aaf1 28270->28271 28351 6f19280 28271->28351 28355 6f1927b 28271->28355 28272 6f1ab20 28276 6f1acf5 28275->28276 28278 6f19280 WriteProcessMemory 28276->28278 28279 6f1927b WriteProcessMemory 28276->28279 28277 6f1af5c 28278->28277 28279->28277 28281 6f1af7b 28280->28281 28359 6f191c0 28281->28359 28363 6f191bb 28281->28363 28285 6f1a752 28284->28285 28285->28227 28287 6f19508 CreateProcessA 28285->28287 28288 6f194ff CreateProcessA 28285->28288 28286 6f1a869 28286->28286 28287->28286 28288->28286 28290 6f1a944 28289->28290 28367 6f19370 28290->28367 28371 6f19368 28290->28371 28291 6f1a96a 28291->28227 28295 6f1ad7f 28294->28295 28297 6f190e3 Wow64SetThreadContext 28295->28297 28298 6f190e8 Wow64SetThreadContext 28295->28298 28296 6f1ae46 28297->28296 28298->28296 28300 6f1ab84 28299->28300 28302 6f19280 WriteProcessMemory 28300->28302 28303 6f1927b WriteProcessMemory 28300->28303 28301 6f1b200 28302->28301 28303->28301 28305 6f1a6cb 28304->28305 28305->28227 28307 6f19508 CreateProcessA 28305->28307 28308 6f194ff CreateProcessA 28305->28308 28306 6f1a869 28306->28306 28307->28306 28308->28306 28310 6f1b1dc 28309->28310 28312 6f19280 WriteProcessMemory 28310->28312 28313 6f1927b WriteProcessMemory 28310->28313 28311 6f1b200 28312->28311 28313->28311 28315 6f1b023 28314->28315 28316 6f1aa2e 28314->28316 28316->28314 28317 6f1aabb 28316->28317 28375 6f18c00 28316->28375 28379 6f18bfb 28316->28379 28317->28227 28321 6f1a752 28320->28321 28321->28227 28323 6f19508 CreateProcessA 28321->28323 28324 6f194ff CreateProcessA 28321->28324 28322 6f1a869 28322->28322 28323->28322 28324->28322 28327 6f1aa1d 28325->28327 28326 6f1aabb 28326->28227 28327->28326 28328 6f18c00 ResumeThread 28327->28328 28329 6f18bfb ResumeThread 28327->28329 28328->28327 28329->28327 28331 6f1aaf1 28330->28331 28333 6f19280 WriteProcessMemory 28331->28333 28334 6f1927b WriteProcessMemory 28331->28334 28332 6f1ab20 28333->28332 28334->28332 28336 6f19591 CreateProcessA 28335->28336 28338 6f19753 28336->28338 28338->28338 28340 6f19591 CreateProcessA 28339->28340 28342 6f19753 28340->28342 28342->28342 28344 6f1912d Wow64SetThreadContext 28343->28344 28346 6f19175 28344->28346 28346->28267 28348 6f1912d Wow64SetThreadContext 28347->28348 28350 6f19175 28348->28350 28350->28267 28352 6f192c8 WriteProcessMemory 28351->28352 28354 6f1931f 28352->28354 28354->28272 28356 6f192c8 WriteProcessMemory 28355->28356 28358 6f1931f 28356->28358 28358->28272 28360 6f19200 VirtualAllocEx 28359->28360 28362 6f1923d 28360->28362 28362->28281 28364 6f19200 VirtualAllocEx 28363->28364 28366 6f1923d 28364->28366 28366->28281 28368 6f193bb ReadProcessMemory 28367->28368 28370 6f193ff 28368->28370 28370->28291 28372 6f193bb ReadProcessMemory 28371->28372 28374 6f193ff 28372->28374 28374->28291 28376 6f18c40 ResumeThread 28375->28376 28378 6f18c71 28376->28378 28378->28316 28380 6f18c40 ResumeThread 28379->28380 28382 6f18c71 28380->28382 28382->28316 28114 a04668 28115 a0467a 28114->28115 28116 a04686 28115->28116 28120 a04778 28115->28120 28124 a03e28 28116->28124 28118 a046a5 28121 a0477c 28120->28121 28128 a04888 28121->28128 28125 a03e33 28124->28125 28136 a05cc8 28125->28136 28127 a0705f 28127->28118 28130 a048af 28128->28130 28129 a0498c 28130->28129 28132 a044b0 28130->28132 28133 a05918 CreateActCtxA 28132->28133 28135 a059db 28133->28135 28137 a05cd3 28136->28137 28140 a05cf8 28137->28140 28139 a071c5 28139->28127 28141 a05d03 28140->28141 28144 a05d28 28141->28144 28143 a072a2 28143->28139 28145 a05d33 28144->28145 28148 a05d58 28145->28148 28147 a073a5 28147->28143 28149 a05d63 28148->28149 28151 a0890b 28149->28151 28154 a0abbc 28149->28154 28150 a08949 28150->28147 28151->28150 28159 a0cca0 28151->28159 28155 a0abc0 28154->28155 28164 a0afe0 28155->28164 28169 a0aff0 28155->28169 28156 a0abc6 28156->28151 28160 a0ccac 28159->28160 28161 a0ccf5 28160->28161 28183 a0d268 28160->28183 28187 a0d258 28160->28187 28161->28150 28165 a0afe4 28164->28165 28173 a0b0e8 28165->28173 28178 a0b0d8 28165->28178 28166 a0afff 28166->28156 28171 a0b0e8 GetModuleHandleW 28169->28171 28172 a0b0d8 GetModuleHandleW 28169->28172 28170 a0afff 28170->28156 28171->28170 28172->28170 28174 a0b11c 28173->28174 28177 a0b0f9 28173->28177 28174->28166 28175 a0b320 GetModuleHandleW 28176 a0b34d 28175->28176 28176->28166 28177->28174 28177->28175 28179 a0b0dc 28178->28179 28180 a0b11c 28179->28180 28181 a0b320 GetModuleHandleW 28179->28181 28180->28166 28182 a0b34d 28181->28182 28182->28166 28184 a0d275 28183->28184 28185 a0d2af 28184->28185 28191 a0d030 28184->28191 28185->28161 28188 a0d268 28187->28188 28189 a0d030 2 API calls 28188->28189 28190 a0d2af 28188->28190 28189->28190 28190->28161 28192 a0d03b 28191->28192 28194 a0dbc0 28192->28194 28195 a0d15c 28192->28195 28194->28194 28196 a0d167 28195->28196 28197 a05d58 2 API calls 28196->28197 28198 a0dc2f 28197->28198 28198->28194 28218 a0d5c8 DuplicateHandle 28219 a0d65e 28218->28219 28383 a0fe98 28384 a0fec6 28383->28384 28385 a05d58 2 API calls 28384->28385 28386 a0fefc 28385->28386 28199 6f1e7f8 CloseHandle 28200 6f1e85f 28199->28200 28201 6f1b628 28202 6f1b7b3 28201->28202 28204 6f1b64e 28201->28204 28204->28202 28205 6f17a18 28204->28205 28206 6f1b8a8 PostMessageW 28205->28206 28207 6f1b914 28206->28207 28207->28204
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f07e6d03d4447fe6558ec3a25816f6f65521a95dbc0195585ef1d09705048d7e
                  • Instruction ID: ad67360bc36ce6d45be6e9bd56f2aaa9ec333afb0481ddcbecddc1027478426b
                  • Opcode Fuzzy Hash: f07e6d03d4447fe6558ec3a25816f6f65521a95dbc0195585ef1d09705048d7e
                  • Instruction Fuzzy Hash: 17511871D45219CFEB68CF66C800BE9F7B6BF89300F14C1AAD40DAA255EB705A85CF80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc5dffd210be88dde1feff078b5bc55275dc1c3bd833ed4be04c17d9efa88d07
                  • Instruction ID: 206bab4687686c21c5ef471e2d87e085c5a19b5318f55acbbae80aedfa76f8de
                  • Opcode Fuzzy Hash: bc5dffd210be88dde1feff078b5bc55275dc1c3bd833ed4be04c17d9efa88d07
                  • Instruction Fuzzy Hash: DA512A71D45619CFEB68CF66CC00BE9F7B6BF89300F14C1AAD409AA255EB705A85CF40

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 296 a0d370-a0d40f GetCurrentProcess 301 a0d411-a0d417 296->301 302 a0d418-a0d44c GetCurrentThread 296->302 301->302 303 a0d455-a0d489 GetCurrentProcess 302->303 304 a0d44e-a0d454 302->304 305 a0d492-a0d4ad call a0d55b 303->305 306 a0d48b-a0d491 303->306 304->303 310 a0d4b3-a0d4e2 GetCurrentThreadId 305->310 306->305 311 a0d4e4-a0d4ea 310->311 312 a0d4eb-a0d54d 310->312 311->312
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 00A0D3FE
                  • GetCurrentThread.KERNEL32 ref: 00A0D43B
                  • GetCurrentProcess.KERNEL32 ref: 00A0D478
                  • GetCurrentThreadId.KERNEL32 ref: 00A0D4D1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 63b3fd66afe6f3446b1ef4c4a7ff84f8a30cdf68be5357cc8e57cb7b4692bab5
                  • Instruction ID: 8354d7efdc9bea0e4797fa8d93a325b039e694d6e0c2012f7100b8c13bb4bd40
                  • Opcode Fuzzy Hash: 63b3fd66afe6f3446b1ef4c4a7ff84f8a30cdf68be5357cc8e57cb7b4692bab5
                  • Instruction Fuzzy Hash: 635168B09003498FDB14DFA9D548B9EBFF1EF89304F248459D409B73A1CB755948CB65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 319 a0d380-a0d40f GetCurrentProcess 323 a0d411-a0d417 319->323 324 a0d418-a0d44c GetCurrentThread 319->324 323->324 325 a0d455-a0d489 GetCurrentProcess 324->325 326 a0d44e-a0d454 324->326 327 a0d492-a0d4ad call a0d55b 325->327 328 a0d48b-a0d491 325->328 326->325 332 a0d4b3-a0d4e2 GetCurrentThreadId 327->332 328->327 333 a0d4e4-a0d4ea 332->333 334 a0d4eb-a0d54d 332->334 333->334
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 00A0D3FE
                  • GetCurrentThread.KERNEL32 ref: 00A0D43B
                  • GetCurrentProcess.KERNEL32 ref: 00A0D478
                  • GetCurrentThreadId.KERNEL32 ref: 00A0D4D1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 4af41b7bfa75a69a06ad1e2cd70833d2c6da71d366b8bacad45191f1934a68e6
                  • Instruction ID: cf0029f50389d833b01beb9570541ccedb73daad410a699e1aef0f21f7bfec55
                  • Opcode Fuzzy Hash: 4af41b7bfa75a69a06ad1e2cd70833d2c6da71d366b8bacad45191f1934a68e6
                  • Instruction Fuzzy Hash: 415158B09003098FDB14DFAAD548B9EBBF1EF88304F20C459E509B73A1DB75A944CB65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 363 a044b0-a059d9 CreateActCtxA 366 a059e2-a05a3c 363->366 367 a059db-a059e1 363->367 374 a05a4b-a05a4f 366->374 375 a05a3e-a05a41 366->375 367->366 376 a05a60 374->376 377 a05a51-a05a5d 374->377 375->374 379 a05a61 376->379 377->376 379->379
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00A059C9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: Create
                  • String ID: Xl
                  • API String ID: 2289755597-3414348151
                  • Opcode ID: f544b9a11f8f7ef5af1589569b83d7c1186544b7404f107663e0708bd242fdb6
                  • Instruction ID: 6dc23c3f646878c94774fdad16671a89d2defa514765f830c26bc0c9200f4835
                  • Opcode Fuzzy Hash: f544b9a11f8f7ef5af1589569b83d7c1186544b7404f107663e0708bd242fdb6
                  • Instruction Fuzzy Hash: 9A41E3B0D0071DCBDB24DFA9C848B9EBBF5BF49304F20856AD408AB295DB756945CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 393 6f194ff-6f1959d 395 6f195d6-6f195f6 393->395 396 6f1959f-6f195a9 393->396 403 6f195f8-6f19602 395->403 404 6f1962f-6f1965e 395->404 396->395 397 6f195ab-6f195ad 396->397 398 6f195d0-6f195d3 397->398 399 6f195af-6f195b9 397->399 398->395 401 6f195bb 399->401 402 6f195bd-6f195cc 399->402 401->402 402->402 405 6f195ce 402->405 403->404 406 6f19604-6f19606 403->406 410 6f19660-6f1966a 404->410 411 6f19697-6f19751 CreateProcessA 404->411 405->398 408 6f19629-6f1962c 406->408 409 6f19608-6f19612 406->409 408->404 412 6f19614 409->412 413 6f19616-6f19625 409->413 410->411 415 6f1966c-6f1966e 410->415 424 6f19753-6f19759 411->424 425 6f1975a-6f197e0 411->425 412->413 413->413 414 6f19627 413->414 414->408 416 6f19691-6f19694 415->416 417 6f19670-6f1967a 415->417 416->411 419 6f1967c 417->419 420 6f1967e-6f1968d 417->420 419->420 420->420 422 6f1968f 420->422 422->416 424->425 435 6f197f0-6f197f4 425->435 436 6f197e2-6f197e6 425->436 437 6f19804-6f19808 435->437 438 6f197f6-6f197fa 435->438 436->435 439 6f197e8 436->439 441 6f19818-6f1981c 437->441 442 6f1980a-6f1980e 437->442 438->437 440 6f197fc 438->440 439->435 440->437 444 6f1982e-6f19835 441->444 445 6f1981e-6f19824 441->445 442->441 443 6f19810 442->443 443->441 446 6f19837-6f19846 444->446 447 6f1984c 444->447 445->444 446->447 448 6f1984d 447->448 448->448
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F1973E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 52d34d9ec705b4c09a40cc7837147847f64edd95853589efac4f4af55ced4730
                  • Instruction ID: 6d6d9a2eda1f977c35099d5200d3adf81725a6dd5eb0ca8f3a361adfc009596f
                  • Opcode Fuzzy Hash: 52d34d9ec705b4c09a40cc7837147847f64edd95853589efac4f4af55ced4730
                  • Instruction Fuzzy Hash: F7A17D71D00219CFEB54CF68C8517EEBBF2BF45350F1485AAD809AB290DBB49985CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 450 6f19508-6f1959d 452 6f195d6-6f195f6 450->452 453 6f1959f-6f195a9 450->453 460 6f195f8-6f19602 452->460 461 6f1962f-6f1965e 452->461 453->452 454 6f195ab-6f195ad 453->454 455 6f195d0-6f195d3 454->455 456 6f195af-6f195b9 454->456 455->452 458 6f195bb 456->458 459 6f195bd-6f195cc 456->459 458->459 459->459 462 6f195ce 459->462 460->461 463 6f19604-6f19606 460->463 467 6f19660-6f1966a 461->467 468 6f19697-6f19751 CreateProcessA 461->468 462->455 465 6f19629-6f1962c 463->465 466 6f19608-6f19612 463->466 465->461 469 6f19614 466->469 470 6f19616-6f19625 466->470 467->468 472 6f1966c-6f1966e 467->472 481 6f19753-6f19759 468->481 482 6f1975a-6f197e0 468->482 469->470 470->470 471 6f19627 470->471 471->465 473 6f19691-6f19694 472->473 474 6f19670-6f1967a 472->474 473->468 476 6f1967c 474->476 477 6f1967e-6f1968d 474->477 476->477 477->477 479 6f1968f 477->479 479->473 481->482 492 6f197f0-6f197f4 482->492 493 6f197e2-6f197e6 482->493 494 6f19804-6f19808 492->494 495 6f197f6-6f197fa 492->495 493->492 496 6f197e8 493->496 498 6f19818-6f1981c 494->498 499 6f1980a-6f1980e 494->499 495->494 497 6f197fc 495->497 496->492 497->494 501 6f1982e-6f19835 498->501 502 6f1981e-6f19824 498->502 499->498 500 6f19810 499->500 500->498 503 6f19837-6f19846 501->503 504 6f1984c 501->504 502->501 503->504 505 6f1984d 504->505 505->505
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06F1973E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 1f802fd8ad1a97c2f3fb0e47e7f6715f519eba556d64c3d6c37d9bff0768e740
                  • Instruction ID: 1edb6265cb1f050a0579a2d7ec4ea90ef8e9b59d8c4599567faf2f2232b9356a
                  • Opcode Fuzzy Hash: 1f802fd8ad1a97c2f3fb0e47e7f6715f519eba556d64c3d6c37d9bff0768e740
                  • Instruction Fuzzy Hash: 97916D71D00219CFEB54CF68C8517EEBBF2BF49354F14856AD809AB280DBB49985CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 507 a0b0e8-a0b0f7 508 a0b123-a0b127 507->508 509 a0b0f9-a0b106 call a09b54 507->509 511 a0b129-a0b133 508->511 512 a0b13b-a0b17c 508->512 515 a0b108-a0b116 call a0b380 509->515 516 a0b11c 509->516 511->512 518 a0b189-a0b197 512->518 519 a0b17e-a0b186 512->519 515->516 525 a0b258-a0b276 515->525 516->508 520 a0b199-a0b19e 518->520 521 a0b1bb-a0b1bd 518->521 519->518 523 a0b1a0-a0b1a7 call a0ad50 520->523 524 a0b1a9 520->524 526 a0b1c0-a0b1c7 521->526 528 a0b1ab-a0b1b9 523->528 524->528 540 a0b279-a0b27f 525->540 529 a0b1d4-a0b1db 526->529 530 a0b1c9-a0b1d1 526->530 528->526 533 a0b1e8-a0b1f1 call a0ad60 529->533 534 a0b1dd-a0b1e5 529->534 530->529 538 a0b1f3-a0b1fb 533->538 539 a0b1fe-a0b203 533->539 534->533 538->539 541 a0b221-a0b225 539->541 542 a0b205-a0b20c 539->542 546 a0b280-a0b2d0 540->546 547 a0b2d1-a0b318 540->547 566 a0b228 call a0b680 541->566 567 a0b228 call a0b650 541->567 542->541 543 a0b20e-a0b21e call a0ad70 call a0ad80 542->543 543->541 546->540 546->547 553 a0b320-a0b34b GetModuleHandleW 547->553 554 a0b31a-a0b31d 547->554 548 a0b22b-a0b22e 551 a0b230-a0b24e 548->551 552 a0b251-a0b257 548->552 551->552 557 a0b354-a0b368 553->557 558 a0b34d-a0b353 553->558 554->553 558->557 566->548 567->548
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00A0B33E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 373e661a3198d7e45093ec015dbc1df723dc4202640b27088b36e4470d562835
                  • Instruction ID: 76a77c7c927993b29bd701c6e862f1a4fda46b462131d3b570afe1330d29c4a1
                  • Opcode Fuzzy Hash: 373e661a3198d7e45093ec015dbc1df723dc4202640b27088b36e4470d562835
                  • Instruction Fuzzy Hash: 15814670A10B098FD724DF69E65579ABBF1FF88300F108A2DD44AD7A90D734E949CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 569 a0590c-a05916 571 a05918-a059d9 CreateActCtxA 569->571 573 a059e2-a05a3c 571->573 574 a059db-a059e1 571->574 581 a05a4b-a05a4f 573->581 582 a05a3e-a05a41 573->582 574->573 583 a05a60 581->583 584 a05a51-a05a5d 581->584 582->581 586 a05a61 583->586 584->583 586->586
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00A059C9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 2db783f3749ad9a3faaa4e50cda0e7c76dfd9d9f00d80fa7e187571437498d4f
                  • Instruction ID: 453721661c587cd98a113d9b47a735e3411a07d10d9da4ead8d0172b94ad55a5
                  • Opcode Fuzzy Hash: 2db783f3749ad9a3faaa4e50cda0e7c76dfd9d9f00d80fa7e187571437498d4f
                  • Instruction Fuzzy Hash: 3741F4B0D0071DCBDB24DFA9C888B8EBBB5BF49304F20856AD408AB295D7756949CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 587 6f1927b-6f192ce 589 6f192d0-6f192dc 587->589 590 6f192de-6f1931d WriteProcessMemory 587->590 589->590 592 6f19326-6f19356 590->592 593 6f1931f-6f19325 590->593 593->592
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F19310
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 724472cfcfe024a82a5b4c3292a22c118a390c4ff8ac992cb49c64a2185b6158
                  • Instruction ID: b6ad26ddcabe5cac35cc39eb7759c36dd1b652a0c50b1ffbc905cf19557bdfda
                  • Opcode Fuzzy Hash: 724472cfcfe024a82a5b4c3292a22c118a390c4ff8ac992cb49c64a2185b6158
                  • Instruction Fuzzy Hash: C52126B5D003499FCB10DFA9C885BEEBBF5FF48310F10842AE959A7250C7789955DBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 597 6f19280-6f192ce 599 6f192d0-6f192dc 597->599 600 6f192de-6f1931d WriteProcessMemory 597->600 599->600 602 6f19326-6f19356 600->602 603 6f1931f-6f19325 600->603 603->602
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06F19310
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 47f2c374364fb8ccde90bac57b9770472944a4e9e82288925ea3c40a05bb2f20
                  • Instruction ID: 6967e46f8025df6cb1b31480789daf0af80eaabb3c6a05675d438970d042d53b
                  • Opcode Fuzzy Hash: 47f2c374364fb8ccde90bac57b9770472944a4e9e82288925ea3c40a05bb2f20
                  • Instruction Fuzzy Hash: D7212AB5D003499FCB10DFAAC885BEEBBF5FF48310F10842AE919A7250C7789955DBA4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 607 6f19368-6f193fd ReadProcessMemory 610 6f19406-6f19436 607->610 611 6f193ff-6f19405 607->611 611->610
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F193F0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 20c650a10cf96944b1c47cd5960fd52585910daa4ce69e6c9577ff021c5b3897
                  • Instruction ID: a7b70e21ad3c9d3cc0fb8e3a161ef3985b55b1ce88d098b59239a5cc210d121a
                  • Opcode Fuzzy Hash: 20c650a10cf96944b1c47cd5960fd52585910daa4ce69e6c9577ff021c5b3897
                  • Instruction Fuzzy Hash: C62148B1C002499FCB14DFAAC881AEEFBF5FF48350F10842AE519A7250C7789941DFA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 615 6f190e3-6f19133 617 6f19143-6f19173 Wow64SetThreadContext 615->617 618 6f19135-6f19141 615->618 620 6f19175-6f1917b 617->620 621 6f1917c-6f191ac 617->621 618->617 620->621
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F19166
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 8d72a5a569c7e87c031c8b27c570efbd1512080af3f7b275d3311f50c528a16b
                  • Instruction ID: 1adf4d97d666a86dfe99d93184bf83bf19a95f6418d29cfabe0eaa2d1478105c
                  • Opcode Fuzzy Hash: 8d72a5a569c7e87c031c8b27c570efbd1512080af3f7b275d3311f50c528a16b
                  • Instruction Fuzzy Hash: 022137B1D002098FDB14DFAAC8857EEBBF4EF89350F10842AD419A7241C7789985CFA1
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06F193F0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 439bc88912dbd5826eb6f6f3e3eb7f95ba50c519f0bc2abefee9ea58fba099c0
                  • Instruction ID: 315a78c13d4ae37087f44c8ebb8f3f79612e39a00fdff0b1bc9f0f2e01a37b6a
                  • Opcode Fuzzy Hash: 439bc88912dbd5826eb6f6f3e3eb7f95ba50c519f0bc2abefee9ea58fba099c0
                  • Instruction Fuzzy Hash: FB2118B1C003599FCB10DFAAC885AEEFBF5FF48310F50842AE519A7250C7799945CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 625 6f190e8-6f19133 627 6f19143-6f19173 Wow64SetThreadContext 625->627 628 6f19135-6f19141 625->628 630 6f19175-6f1917b 627->630 631 6f1917c-6f191ac 627->631 628->627 630->631
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06F19166
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 07ee3d32e0b8a5e088768ef680e7cbbde0caf9ec6530ff5cde1e26a47ecef8d4
                  • Instruction ID: 0a2ef53252ecbcf65e283a9d1e94e9644adf26482b5fd4f14301f2c3f0ad506a
                  • Opcode Fuzzy Hash: 07ee3d32e0b8a5e088768ef680e7cbbde0caf9ec6530ff5cde1e26a47ecef8d4
                  • Instruction Fuzzy Hash: 632149B1D003098FDB10DFAAC8857EEBBF4EF49350F108429D519A7240CB789985CFA1
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A0D64F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 8821d0134ec3e4e7ca53929f1605c3b9618b380ff1c9d1254a3670575fb9d675
                  • Instruction ID: 4e50125b9b696b1506a595e4c636b0b39ae5655ad9a28b72b4abe1b40cbe176a
                  • Opcode Fuzzy Hash: 8821d0134ec3e4e7ca53929f1605c3b9618b380ff1c9d1254a3670575fb9d675
                  • Instruction Fuzzy Hash: 6021E2B59002499FDB10CFAAD984AEEFBF4FB48310F14841AE918A3350D379A950CFA4
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00A0D64F
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 5c46e08735881fd4b55093570e16667c6bc12b127cbd71a7403d16ca3125143c
                  • Instruction ID: 336b5b4c487e4d4aa16ff811ad1036428fc34cc2fd907a8157254ee2d0320044
                  • Opcode Fuzzy Hash: 5c46e08735881fd4b55093570e16667c6bc12b127cbd71a7403d16ca3125143c
                  • Instruction Fuzzy Hash: 9F21C2B59002499FDB10CFAAD984ADEBBF9FB48310F14841AE918A3350D379A954CFA5
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F1922E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 679062a68d71d34ee6960c35b9a44cf8b91baa974c26bd98ba5f91f8e4cdfbcf
                  • Instruction ID: 7ec1ee882164cebefe35ca0410868046b8d33ac875da39c709037dd79c114c13
                  • Opcode Fuzzy Hash: 679062a68d71d34ee6960c35b9a44cf8b91baa974c26bd98ba5f91f8e4cdfbcf
                  • Instruction Fuzzy Hash: 581126B58002499FDB10DFAAD845AEFBFF5EF88310F248819E519A7250C7799945CFA0
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06F1922E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 83924112581393a090b09264814681744f1d5e7e98cefff1ccae227a0f973684
                  • Instruction ID: 6eda761d40276a76579ba9ef43fcabff8bceb4965246974ccc213e4c1be79284
                  • Opcode Fuzzy Hash: 83924112581393a090b09264814681744f1d5e7e98cefff1ccae227a0f973684
                  • Instruction Fuzzy Hash: 7F1137758002499FCB10DFAAC844AEFBFF5EF48310F108419E519A7250C779A940CFA0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 23808cece6948829458bcc1b75181b35db0c744fcff198a73698ecdd66c28699
                  • Instruction ID: d808719ae6a6ef7efb8f94a54e9ec718620b489c9a5bf5087bb57cef90dc06f5
                  • Opcode Fuzzy Hash: 23808cece6948829458bcc1b75181b35db0c744fcff198a73698ecdd66c28699
                  • Instruction Fuzzy Hash: 011137B1C002498ECB10DFA9C5456EFFBF5AF89314F24841AD419A7250C6399544CBA0
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 520772b135a8662ac55ec67c08cbb4b0150c052f7812d99007859ffd068a3913
                  • Instruction ID: f9b818fe55008b1e73952c473d3600b0a7513d67218c4eb87e0fd6bb6f721ea6
                  • Opcode Fuzzy Hash: 520772b135a8662ac55ec67c08cbb4b0150c052f7812d99007859ffd068a3913
                  • Instruction Fuzzy Hash: 431125B1D002498FCB20DFAAC9457AFFBF5EF88324F208419D519A7240CB79A944CBA4
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00A0B33E
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 4f0567580210471ff9ca64eb9985b443b279b88febcceaaf4cfe6bae870d0bd0
                  • Instruction ID: fe216d055a56a2c89d088b2f14d9797612e1cd624eb19de5742fbfdca9a372d0
                  • Opcode Fuzzy Hash: 4f0567580210471ff9ca64eb9985b443b279b88febcceaaf4cfe6bae870d0bd0
                  • Instruction Fuzzy Hash: E11110B6C002498FCB14DF9AD544ADEFBF4EF88310F20841AD529A7640C379A545CFA1
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F1B905
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 3c2fb0cdbf1ab70d8f0bb642bc5d79ce42b48aadaabadc8dabed7e4691c449e7
                  • Instruction ID: 441277d4236b256e7b94567cbc098a669ebdfb95edcbc0cb812a3331d26c6571
                  • Opcode Fuzzy Hash: 3c2fb0cdbf1ab70d8f0bb642bc5d79ce42b48aadaabadc8dabed7e4691c449e7
                  • Instruction Fuzzy Hash: 8111F5B5800349DFDB10DF9AC845BDEBBF8EB48724F108459E518A7210C379A944CFA1
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 06F1B905
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: f087e05bb1bdf9fdd335ace7ce01d05d1659961844590e3649deb928790404f7
                  • Instruction ID: cae2a11c8777c8ab6f4dc1caca455a3b393f3f452f0cea8c22df70c3ed026026
                  • Opcode Fuzzy Hash: f087e05bb1bdf9fdd335ace7ce01d05d1659961844590e3649deb928790404f7
                  • Instruction Fuzzy Hash: 7911F5B5800349DFCB10DF99D845BDEBFF8EB49324F10845AD559A7250C379A544CFA1
                  APIs
                  • CloseHandle.KERNELBASE(?), ref: 06F1E850
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID:
                  • API String ID: 2962429428-0
                  • Opcode ID: 8bb745cfe43dcff997bd0dc033865b55f3d155e0c68424bc8a1be8dfee5073e2
                  • Instruction ID: 3c59dfe89107e4728952cef2eb6013ef419839cff72b69862c0395df8dad15a8
                  • Opcode Fuzzy Hash: 8bb745cfe43dcff997bd0dc033865b55f3d155e0c68424bc8a1be8dfee5073e2
                  • Instruction Fuzzy Hash: C31103B5C002498FCB20DF9AC545BDEBBF4EF48320F10846AD958A7340D738AA44CFA5
                  Memory Dump Source
                  • Source File: 00000000.00000002.2056282581.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_9ad000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 72aa2850dbc2d7bf10ee45348999028f8df91b6c19af87faea0bfc9edec586e8
                  • Instruction ID: 7c7f7859851a0d983f187f23ac3dec9d57547cceb6a5bb005d91c03405458d4e
                  • Opcode Fuzzy Hash: 72aa2850dbc2d7bf10ee45348999028f8df91b6c19af87faea0bfc9edec586e8
                  • Instruction Fuzzy Hash: 84210671500204DFDB05DF14D9C4B26BFA9FB99314F20C569D90A0B6A6C33AE856D6E2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2056423298.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_9bd000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a527e53309e99778ca067d7fd32b338e345a6c7e5b7fdc2bc3cf0df585f4d164
                  • Instruction ID: b3e9a4c44126d6d6eb3b033f459660a5f8d638ed3fb7a299c299e706d4b1d511
                  • Opcode Fuzzy Hash: a527e53309e99778ca067d7fd32b338e345a6c7e5b7fdc2bc3cf0df585f4d164
                  • Instruction Fuzzy Hash: 94210775509204DFDB08DF18DAC4B56BF69FB84324F20C96DD9094B356D33BD846CA61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2056423298.00000000009BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009BD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_9bd000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8d77bd486632b0fe167bdf555e19d2213ac85900b2d04f533719396a9e803aa3
                  • Instruction ID: 3f78f5c2b02499afdd49c8c789308f3c7c456a06df20085cdf7c12a1c82bcbba
                  • Opcode Fuzzy Hash: 8d77bd486632b0fe167bdf555e19d2213ac85900b2d04f533719396a9e803aa3
                  • Instruction Fuzzy Hash: F721C2711083809FDB06CF14D984711BFB5FB45324F24C5AAD8498B266D33A980ACB61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2056282581.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_9ad000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                  • Instruction ID: 55138a505314da3b2524ae27c4a925fb40b7e580f9ee91a6443ae933b4f1517d
                  • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                  • Instruction Fuzzy Hash: 46112976404240CFDB02CF00D5C4B16BFB1FB99314F24C6A9D90A0B666C33AD456CBE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0077d157c200b16fe798f02ae8217d9fcf1ec532d14ca596ca088b23f6829084
                  • Instruction ID: 0a4a7e2c4020570890e23b8c89cf6393125de279a4d79b7c230ee983640571bc
                  • Opcode Fuzzy Hash: 0077d157c200b16fe798f02ae8217d9fcf1ec532d14ca596ca088b23f6829084
                  • Instruction Fuzzy Hash: 8FC1A931B007048FDB69DB75C960B6EB7FAAF89740F14446DE1569F2A0CB39E902CB52
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3fb0b2d2c46b6c59804c89b8c84247de573050ba65174dbc8a96de6fee5323d3
                  • Instruction ID: db8f1f813355f261537bb6c26e4602a91984b78edddb3eda5eceac54c332210b
                  • Opcode Fuzzy Hash: 3fb0b2d2c46b6c59804c89b8c84247de573050ba65174dbc8a96de6fee5323d3
                  • Instruction Fuzzy Hash: 8AE1F8B4E001598FCB14DFA9C580AAEFBB2FF89305F24C169D814AB35AD731A941CF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d8eacac43aa9610329bb1dee04e97ee4dc579b4fcc0a6dc1bcf9f16b36ca03cb
                  • Instruction ID: cdd8df8d8d470b7c9602913e744d1ab02941084793d5f8d81cd6775f44bc7ede
                  • Opcode Fuzzy Hash: d8eacac43aa9610329bb1dee04e97ee4dc579b4fcc0a6dc1bcf9f16b36ca03cb
                  • Instruction Fuzzy Hash: E7E118B4E001598FCB14DFA9C580AAEFBB2FF89345F24C169D815AB356D730A941CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e025df69e0bf7b743e3a527a86ee84ee0f8b2bc79e812632ca0ea61c40684a2f
                  • Instruction ID: bd04488050734a722530516d886d57dc8ee528705a1007c2db2672d38e64ed35
                  • Opcode Fuzzy Hash: e025df69e0bf7b743e3a527a86ee84ee0f8b2bc79e812632ca0ea61c40684a2f
                  • Instruction Fuzzy Hash: 76E12974E002598FCB14DFA9C5809AEFBB2FF89345F24C269D814AB356D731A941CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9604013ba7d31cf2b1dbc47e19237b507608220bf223fdc33142c320da9f9b0
                  • Instruction ID: 4aa6a85388ee62839675a5502127c40605eaaeed9ef898d2e4cebafa69b48626
                  • Opcode Fuzzy Hash: c9604013ba7d31cf2b1dbc47e19237b507608220bf223fdc33142c320da9f9b0
                  • Instruction Fuzzy Hash: F6E1FA74E002598FCB14DFA9C9809AEFBB2FF89305F24C269D418AB356D731A941CF61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2066950331.0000000006F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F10000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6f10000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 164650ca03dd00db2c0325dde739b298490051909c042818e152e329f100b692
                  • Instruction ID: 9e87528f89b3d4ff85ae2457833f53d23028cc4a98523b52a264715415c56b24
                  • Opcode Fuzzy Hash: 164650ca03dd00db2c0325dde739b298490051909c042818e152e329f100b692
                  • Instruction Fuzzy Hash: 60E1F8B4E001598FDB14DFA9C580AAEFBB2FF89305F24C169D814AB356D731A941CFA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2057133732.0000000000A00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A00000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_a00000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 60b50c609c42dd41e0f179289bd79f29022a99b27804f623daf697eea8e2e297
                  • Instruction ID: 7ee1bc13db8536be8b8c037c3f923b8b1d3447ca32c98fdcc1c4c3bbabd21b88
                  • Opcode Fuzzy Hash: 60b50c609c42dd41e0f179289bd79f29022a99b27804f623daf697eea8e2e297
                  • Instruction Fuzzy Hash: 1EA15C32E002198FCF19DFB5D94459EB7B2FF88300B25857AE806BB2A5DB35E955CB40
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID: (aq$Te]q
                  • API String ID: 0-2961548996
                  • Opcode ID: be52e8cb0672826a610552cf0f2f99b148c947f4853720850c23648f26f508fe
                  • Instruction ID: e8005ecd25d2f10f5f86b7c0c0cfb0e99e214dbdf0c248f95fad3a95bddcbcef
                  • Opcode Fuzzy Hash: be52e8cb0672826a610552cf0f2f99b148c947f4853720850c23648f26f508fe
                  • Instruction Fuzzy Hash: EB518D35B001149FCB54DF6DC458A9EBBF6FF89700F2581A9E806DB3A6CA75DC028B80
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID: Haq$dLcq
                  • API String ID: 0-1713614415
                  • Opcode ID: 54d55606955079237628ff7de1d2c7339409365908a040276c5f1b964f112d6b
                  • Instruction ID: 3d5009b6475b28d17431181591b2fdc74d7b056ce95f780181573e9384de7f1e
                  • Opcode Fuzzy Hash: 54d55606955079237628ff7de1d2c7339409365908a040276c5f1b964f112d6b
                  • Instruction Fuzzy Hash: 8041DF35A042448FDB19DF78D494A9EBFF6BF89300F1489AAE405DB3A2CA75DC05CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR]q
                  • API String ID: 0-3081347316
                  • Opcode ID: d900679b3c3f3b30a9cef5934cc8852f4385cb3e25c0f6ff66ff70c50aac5d3f
                  • Instruction ID: 922ddba7e9a2272ee632ba6104bc8a34c5197fd08851be4b0cf7fb6b3327a693
                  • Opcode Fuzzy Hash: d900679b3c3f3b30a9cef5934cc8852f4385cb3e25c0f6ff66ff70c50aac5d3f
                  • Instruction Fuzzy Hash: C031F334F002558FDB549B7894659AE7BF6EFC9310B14416DD50ADB396EE348C028792
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID: dLcq
                  • API String ID: 0-2236789282
                  • Opcode ID: 403e008b9e0133c91974ec925c4c7b2002e27e4d854aa6b6c7e225802b755f0a
                  • Instruction ID: c3924f53033fa5ab3d6a3f4fe8fe0634b01ecf6bb0e8df9fae95adc3c9bd7a67
                  • Opcode Fuzzy Hash: 403e008b9e0133c91974ec925c4c7b2002e27e4d854aa6b6c7e225802b755f0a
                  • Instruction Fuzzy Hash: B8317E35A002048FDB19DF69C598BAEBBF6BF88300F148569D402AB7A1CB75ED45CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID: Haq
                  • API String ID: 0-725504367
                  • Opcode ID: 819fc75fa7f5639d3ad74cc62482ccd258d65d23b4ac75ae1c4650f68cf0ada7
                  • Instruction ID: b9a7fa64490ef7eb7baff9bfa23203cec57fda3f9c62d6658cef921a4dd336dd
                  • Opcode Fuzzy Hash: 819fc75fa7f5639d3ad74cc62482ccd258d65d23b4ac75ae1c4650f68cf0ada7
                  • Instruction Fuzzy Hash: 4E01F42570C2900FC756973D586586E2FE7AFCA21031A48FAD549CB3A3CD288C0B8352
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bcce1b07dc7a131691580433d21906c4181fbd136dfaf857bd90832cddffea53
                  • Instruction ID: 9c40720514a3feb8ec59b2a94d19e632b7547b1693013b76554b679280db624a
                  • Opcode Fuzzy Hash: bcce1b07dc7a131691580433d21906c4181fbd136dfaf857bd90832cddffea53
                  • Instruction Fuzzy Hash: E7C12A347002048FCB48EF78D594AAD77F6EF88715F218569E8069B3A6CB75DC42CB51
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d284fc29fc01c6acefc0ff685f6edffd25d511e641af67ef6e62fba07622fca7
                  • Instruction ID: e5d0a58eaddebb8c424e6753c56c25b085bc3e3e51634e0de17fa650a3eb0553
                  • Opcode Fuzzy Hash: d284fc29fc01c6acefc0ff685f6edffd25d511e641af67ef6e62fba07622fca7
                  • Instruction Fuzzy Hash: 226129347002018FCB48EF68D594AAD77F6EF88715B218469E90ADB3B6CB75EC42CB51
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d0de95a6383da9f160027ba656c97742b022ae7d79385fde355ca6da6a65312c
                  • Instruction ID: a4e35b887a3ca573d6e96137eba3e35ccf583a7334843cbefbabfe593248c0c8
                  • Opcode Fuzzy Hash: d0de95a6383da9f160027ba656c97742b022ae7d79385fde355ca6da6a65312c
                  • Instruction Fuzzy Hash: 2051D738600201CFE72BEF78F9489497776FF8430A750C669D4068B26DEB79A946CF80
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0c18ac3c19df3a24ddce0ab4cf9de942bff7a79210b764470d3135fdb27ec6ed
                  • Instruction ID: 150afdcbdcef337c83c700229cbbba578a0cd045399b6d2fa70180335bf78b2c
                  • Opcode Fuzzy Hash: 0c18ac3c19df3a24ddce0ab4cf9de942bff7a79210b764470d3135fdb27ec6ed
                  • Instruction Fuzzy Hash: 6E418F71E00209AFCB04EFB995546AEFFFAEFC8300F248569D449D7346EA3499428B91
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70a3ad0a2f1bfc60c54448ee968bac66fb98d2b9d91712b1524a9fc27ad0e7d1
                  • Instruction ID: c58be350061c718bf6fd2eed15425212adbecee7ebbd09e9d300c39e2b220cee
                  • Opcode Fuzzy Hash: 70a3ad0a2f1bfc60c54448ee968bac66fb98d2b9d91712b1524a9fc27ad0e7d1
                  • Instruction Fuzzy Hash: FB212D35B001049FD714DFA8C5A5BAE7BF6BF88710F248554E505AB3A6DB719D41CB80
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a0cea9366778c70607e3eeff1b673d268b10b50a2fa73874d8dc63455a8655fc
                  • Instruction ID: fc5c92b24cef801c5d4b2e8bd91b6262cbe98dd10d3454093c0c1c771edf19cd
                  • Opcode Fuzzy Hash: a0cea9366778c70607e3eeff1b673d268b10b50a2fa73874d8dc63455a8655fc
                  • Instruction Fuzzy Hash: DA215030B043029FEB64ABB5D958AAF7BB9AF14382B15882DD407C2193EB70C941DB51
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6a78598ebf881939a9b9b6080ee888475c9d9768f82fe204d0559f37ad4198b2
                  • Instruction ID: 7aa9b0aea13c5ae6553d623772c467f772c3f279b86957ec26cd73fc46a2f068
                  • Opcode Fuzzy Hash: 6a78598ebf881939a9b9b6080ee888475c9d9768f82fe204d0559f37ad4198b2
                  • Instruction Fuzzy Hash: CF218130B003039FEB64ABB5E918AAF7ABCAF10781B10482DD407C6193EE70C942DB52
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c755babbf46440a62ce7a43943088bc01aaa514a289eba35af1347b02bb408df
                  • Instruction ID: 157a2c57cf2dd99af00aaad3f723012496a69255907476cb45193aedf9d90562
                  • Opcode Fuzzy Hash: c755babbf46440a62ce7a43943088bc01aaa514a289eba35af1347b02bb408df
                  • Instruction Fuzzy Hash: 4111ACB4A00245DFCB65EBB8D5145AA7FFABF8930531188B9D409CB355EA349C52CB81
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9118db646b8e49b5cf12a710a119bbbad93230573eb434340e1da1e8ce8ab441
                  • Instruction ID: 4a1e89a313a3a3459568ad2170385ef2150dffa0ba31ba0f729cf017fbf6c46e
                  • Opcode Fuzzy Hash: 9118db646b8e49b5cf12a710a119bbbad93230573eb434340e1da1e8ce8ab441
                  • Instruction Fuzzy Hash: 4E11ADB0B00205DFCB54EBB9D41466A7BFAFF8830676048B8D40ACB355EA34DC42CB90
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6d2750fdb3cb7ec4d70d2c85b8035a32665b012f6a2cbaccbbb46891a77f083b
                  • Instruction ID: b4d7c79bd8922d662c0730389921aae0e90a67d4e64dc18abfc1dd3ffac94e67
                  • Opcode Fuzzy Hash: 6d2750fdb3cb7ec4d70d2c85b8035a32665b012f6a2cbaccbbb46891a77f083b
                  • Instruction Fuzzy Hash: 45E0923570869A0FD7169678A911B5E3FD15FC7204F5500ADD841CF6E3CA658C054792
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c7790b546d89ed092fec611ae14a078de04742e6e529e6777ad38f94fae550dc
                  • Instruction ID: e5afb7107da15fe71a1f804b1567f7412c2badb1c71174bbe6eac472a3c25acf
                  • Opcode Fuzzy Hash: c7790b546d89ed092fec611ae14a078de04742e6e529e6777ad38f94fae550dc
                  • Instruction Fuzzy Hash: 22E08C313001005F83449A7EA88885AB7EBEBC822531544BAE10EC7321CE61DC024790
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5e6b5452852823a080bceb0568f15d946c81fbaf2d11e0c52946318f0ce3d482
                  • Instruction ID: 8e41c19fc624ba3ebb34cb003c7333f2aaa5dd405ed8745e3f4a54181a559bc5
                  • Opcode Fuzzy Hash: 5e6b5452852823a080bceb0568f15d946c81fbaf2d11e0c52946318f0ce3d482
                  • Instruction Fuzzy Hash: EBE09B306447918EDB35D278D0153DE7FE29F81314F00096DD18657582CBBBB50583A2
                  Memory Dump Source
                  • Source File: 00000005.00000002.2106140917.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_5_2_ab0000_rUAE_LPO.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fecb41ed4254af85df79de8e1c733a984600825731397d1edde63e832915f4cf
                  • Instruction ID: ac68c7b9052bd0d2513d985597f1e22929ab49ff9a7d24a49466f2968aec2b21
                  • Opcode Fuzzy Hash: fecb41ed4254af85df79de8e1c733a984600825731397d1edde63e832915f4cf
                  • Instruction Fuzzy Hash: CFD0A9327000249FCA04BAFDE4058AE37DAAFCAA107A000A9E109DF3A9CE25EC0113C6

                  Execution Graph

                  Execution Coverage:7.6%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:77
                  Total number of Limit Nodes:4
                  execution_graph 16332 aafe98 16333 aafec6 16332->16333 16336 aa5d58 16333->16336 16335 aafefc 16337 aa5d63 16336->16337 16339 aa890b 16337->16339 16342 aaabb0 16337->16342 16338 aa8949 16338->16335 16339->16338 16346 aacca0 16339->16346 16351 aaafe0 16342->16351 16355 aaaff0 16342->16355 16343 aaabc6 16343->16339 16347 aaccd1 16346->16347 16348 aaccf5 16347->16348 16363 aad268 16347->16363 16367 aad258 16347->16367 16348->16338 16352 aaaff0 16351->16352 16358 aab0e8 16352->16358 16353 aaafff 16353->16343 16357 aab0e8 GetModuleHandleW 16355->16357 16356 aaafff 16356->16343 16357->16356 16360 aab11c 16358->16360 16362 aab0f9 16358->16362 16359 aab320 GetModuleHandleW 16361 aab34d 16359->16361 16360->16353 16361->16353 16362->16359 16362->16360 16364 aad275 16363->16364 16365 aad2af 16364->16365 16371 aad030 16364->16371 16365->16348 16368 aad275 16367->16368 16369 aad2af 16368->16369 16370 aad030 GetModuleHandleW 16368->16370 16369->16348 16370->16369 16372 aad03b 16371->16372 16374 aadbc0 16372->16374 16375 aad15c 16372->16375 16374->16374 16376 aad167 16375->16376 16377 aa5d58 GetModuleHandleW 16376->16377 16378 aadc2f 16377->16378 16378->16374 16379 aa4668 16380 aa467a 16379->16380 16381 aa4686 16380->16381 16385 aa4778 16380->16385 16390 aa3e28 16381->16390 16383 aa46a5 16386 aa479d 16385->16386 16394 aa4888 16386->16394 16398 aa4878 16386->16398 16391 aa3e33 16390->16391 16406 aa5cc8 16391->16406 16393 aa705f 16393->16383 16395 aa48af 16394->16395 16396 aa498c 16395->16396 16402 aa44b0 16395->16402 16399 aa48af 16398->16399 16400 aa498c 16399->16400 16401 aa44b0 CreateActCtxA 16399->16401 16400->16400 16401->16400 16403 aa5918 CreateActCtxA 16402->16403 16405 aa59db 16403->16405 16407 aa5cd3 16406->16407 16410 aa5cf8 16407->16410 16409 aa71c5 16409->16393 16411 aa5d03 16410->16411 16414 aa5d28 16411->16414 16413 aa72a2 16413->16409 16415 aa5d33 16414->16415 16416 aa5d58 GetModuleHandleW 16415->16416 16417 aa73a5 16416->16417 16417->16413 16418 aad5c8 DuplicateHandle 16419 aad65e 16418->16419 16420 aad380 16421 aad3c6 GetCurrentProcess 16420->16421 16423 aad418 GetCurrentThread 16421->16423 16424 aad411 16421->16424 16425 aad44e 16423->16425 16426 aad455 GetCurrentProcess 16423->16426 16424->16423 16425->16426 16427 aad48b 16426->16427 16428 aad4b3 GetCurrentThreadId 16427->16428 16429 aad4e4 16428->16429

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 294 aad370-aad40f GetCurrentProcess 298 aad418-aad44c GetCurrentThread 294->298 299 aad411-aad417 294->299 300 aad44e-aad454 298->300 301 aad455-aad489 GetCurrentProcess 298->301 299->298 300->301 302 aad48b-aad491 301->302 303 aad492-aad4ad call aad553 301->303 302->303 307 aad4b3-aad4e2 GetCurrentThreadId 303->307 308 aad4eb-aad54d 307->308 309 aad4e4-aad4ea 307->309 309->308
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 00AAD3FE
                  • GetCurrentThread.KERNEL32 ref: 00AAD43B
                  • GetCurrentProcess.KERNEL32 ref: 00AAD478
                  • GetCurrentThreadId.KERNEL32 ref: 00AAD4D1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 5b19b5632d66fff13657aabf21766538e67f979dbe39684dc8122e6a562772c9
                  • Instruction ID: d030d351ab7a01ffa332952d25250dc60de635d28e1f37abb362a4f6b2f3a7c4
                  • Opcode Fuzzy Hash: 5b19b5632d66fff13657aabf21766538e67f979dbe39684dc8122e6a562772c9
                  • Instruction Fuzzy Hash: 135146B09003498FDB14DFA9D548BAEBBF1FF49304F208469D059A7391D778A984CF65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 316 aad380-aad40f GetCurrentProcess 320 aad418-aad44c GetCurrentThread 316->320 321 aad411-aad417 316->321 322 aad44e-aad454 320->322 323 aad455-aad489 GetCurrentProcess 320->323 321->320 322->323 324 aad48b-aad491 323->324 325 aad492-aad4ad call aad553 323->325 324->325 329 aad4b3-aad4e2 GetCurrentThreadId 325->329 330 aad4eb-aad54d 329->330 331 aad4e4-aad4ea 329->331 331->330
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 00AAD3FE
                  • GetCurrentThread.KERNEL32 ref: 00AAD43B
                  • GetCurrentProcess.KERNEL32 ref: 00AAD478
                  • GetCurrentThreadId.KERNEL32 ref: 00AAD4D1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: a39449cc1c170282a4995e3d7354ae61f46539302b6de9d5219ea244cdb94b14
                  • Instruction ID: c76e9d6a6acc9ec59b3a41f9d9ac9b4997bf56aebdd29ba0f08808a90f0a1b01
                  • Opcode Fuzzy Hash: a39449cc1c170282a4995e3d7354ae61f46539302b6de9d5219ea244cdb94b14
                  • Instruction Fuzzy Hash: 625145B09003098FDB14EFA9D548BAEBBF1EF49304F20846DE049A7390D779A944CB65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 360 aab0e8-aab0f7 361 aab0f9-aab106 call aa9b54 360->361 362 aab123-aab127 360->362 368 aab108 361->368 369 aab11c 361->369 364 aab13b-aab17c 362->364 365 aab129-aab133 362->365 371 aab189-aab197 364->371 372 aab17e-aab186 364->372 365->364 418 aab10e call aab380 368->418 419 aab10e call aab370 368->419 369->362 373 aab1bb-aab1bd 371->373 374 aab199-aab19e 371->374 372->371 379 aab1c0-aab1c7 373->379 376 aab1a9 374->376 377 aab1a0-aab1a7 call aaad50 374->377 375 aab114-aab116 375->369 378 aab258-aab276 375->378 381 aab1ab-aab1b9 376->381 377->381 393 aab279-aab27f 378->393 382 aab1c9-aab1d1 379->382 383 aab1d4-aab1db 379->383 381->379 382->383 386 aab1e8-aab1f1 call aaad60 383->386 387 aab1dd-aab1e5 383->387 391 aab1fe-aab203 386->391 392 aab1f3-aab1fb 386->392 387->386 394 aab221-aab225 391->394 395 aab205-aab20c 391->395 392->391 399 aab280-aab2d0 393->399 400 aab2d1-aab318 393->400 420 aab228 call aab680 394->420 421 aab228 call aab670 394->421 395->394 396 aab20e-aab21e call aaad70 call aaad80 395->396 396->394 399->393 399->400 402 aab31a-aab31d 400->402 403 aab320-aab34b GetModuleHandleW 400->403 401 aab22b-aab22e 405 aab230-aab24e 401->405 406 aab251-aab257 401->406 402->403 407 aab34d-aab353 403->407 408 aab354-aab368 403->408 405->406 407->408 418->375 419->375 420->401 421->401
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00AAB33E
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 143391e43f1498701e755614a3b315305f4d925e64d0842dcf45677599e04315
                  • Instruction ID: c5bf0776e61ae3f6f550293b7550d61e02f2f1b5e337cad15502df1a78186907
                  • Opcode Fuzzy Hash: 143391e43f1498701e755614a3b315305f4d925e64d0842dcf45677599e04315
                  • Instruction Fuzzy Hash: 3E815870A00B058FDB64DF69D55579ABBF1FF89300F008A2DD48AD7A91D735E849CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 422 aa590c-aa59d9 CreateActCtxA 424 aa59db-aa59e1 422->424 425 aa59e2-aa5a3c 422->425 424->425 432 aa5a4b-aa5a4f 425->432 433 aa5a3e-aa5a41 425->433 434 aa5a60 432->434 435 aa5a51-aa5a5d 432->435 433->432 437 aa5a61 434->437 435->434 437->437
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00AA59C9
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 59f519f99a1753696540a4a43933820723a275008ca66e81ca238b465eb237a2
                  • Instruction ID: fb5d8205cb99190546f98fb68915994ccea75ab0797a0fe6cc8ed9b55c1b2e85
                  • Opcode Fuzzy Hash: 59f519f99a1753696540a4a43933820723a275008ca66e81ca238b465eb237a2
                  • Instruction Fuzzy Hash: FF41E2B0D00719CBDB24DFA9C885BDEBBF1BF49304F20816AD408AB255DB75694ACF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 438 aa44b0-aa59d9 CreateActCtxA 441 aa59db-aa59e1 438->441 442 aa59e2-aa5a3c 438->442 441->442 449 aa5a4b-aa5a4f 442->449 450 aa5a3e-aa5a41 442->450 451 aa5a60 449->451 452 aa5a51-aa5a5d 449->452 450->449 454 aa5a61 451->454 452->451 454->454
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 00AA59C9
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 0f20a1cc8ae7c11964876af4c6e99b09822432f521f9024c107281a0845e5950
                  • Instruction ID: 136e2b99bf9561446b9f968dfc65bd9db9817e28a0c696935a863ea575023f80
                  • Opcode Fuzzy Hash: 0f20a1cc8ae7c11964876af4c6e99b09822432f521f9024c107281a0845e5950
                  • Instruction Fuzzy Hash: 8641F2B0C0071DCBDB24DFA9C888B9EBBF5BF49304F20806AD408AB251DB756946CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 455 aad5c2-aad65c DuplicateHandle 456 aad65e-aad664 455->456 457 aad665-aad682 455->457 456->457
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AAD64F
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 89fb99cc5c821655dc150defd4ccd3702c0c2bcb28a20de122f4a8ae948044bc
                  • Instruction ID: aa3fd6ef102eeceff54017647c9ce0798cd5a5c67b30a66cdba796a73a02ca0f
                  • Opcode Fuzzy Hash: 89fb99cc5c821655dc150defd4ccd3702c0c2bcb28a20de122f4a8ae948044bc
                  • Instruction Fuzzy Hash: 5F21E2B5900248AFDB10CFAAD584ADEFBF4FB48320F14841AE958A7350D378A940CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 460 aad5c8-aad65c DuplicateHandle 461 aad65e-aad664 460->461 462 aad665-aad682 460->462 461->462
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AAD64F
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 8ec5c8d75fdfeaec7768d8d1b27687e45c09186ef152d1b47f367e864fa0f5c5
                  • Instruction ID: e3c6df26eeebcc6381e84e201b6bcc30438f429573ed51b923b8b14fd954f46a
                  • Opcode Fuzzy Hash: 8ec5c8d75fdfeaec7768d8d1b27687e45c09186ef152d1b47f367e864fa0f5c5
                  • Instruction Fuzzy Hash: 7121D3B59002489FDB10CFAAD984ADEFFF9FB48310F14841AE959A3350D378A954CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 465 aab2d8-aab318 466 aab31a-aab31d 465->466 467 aab320-aab34b GetModuleHandleW 465->467 466->467 468 aab34d-aab353 467->468 469 aab354-aab368 467->469 468->469
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00AAB33E
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158769259.0000000000AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AA0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_aa0000_windowsBook.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: dd7fef8b078907ea562d501de8883435c2751442d65c1e3f7ccd79b20f9e2a78
                  • Instruction ID: 9ec76f22a3507b60fb79967a0f6573f2b15b13abbe5feccff74cd9313d4b5e26
                  • Opcode Fuzzy Hash: dd7fef8b078907ea562d501de8883435c2751442d65c1e3f7ccd79b20f9e2a78
                  • Instruction Fuzzy Hash: 26111DB6C002498FCB10CF9AC444BDEFBF8EF89320F10842AD929A7640C379A545CFA1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158526115.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_93d000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 909753e0ac574f38fbbdd04a873ab2259b9865737d98e5e9a9dbb830a0c83538
                  • Instruction ID: e57fce72f4f93dcf95c765e9eee3c68d621bfda1d645b4f387196bdce4b0dc8a
                  • Opcode Fuzzy Hash: 909753e0ac574f38fbbdd04a873ab2259b9865737d98e5e9a9dbb830a0c83538
                  • Instruction Fuzzy Hash: FB21FF72504200DFDB05DF54E9D0B2BBFA9FB88310F20C5A9E9190A256C33AD816DBA2
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158574972.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_94d000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f0fe5b98a8d824755a48390fac560fefdddec67dd16fcfb267a0c9e50af36513
                  • Instruction ID: 8e7178a6b893313ee3d33c05d4da5199711e65617ed51f06a9dc791dd38094b4
                  • Opcode Fuzzy Hash: f0fe5b98a8d824755a48390fac560fefdddec67dd16fcfb267a0c9e50af36513
                  • Instruction Fuzzy Hash: C9210479508204DFDB09DF24D9C4F26BB69FB88314F20C96DED094B396C33AD846CAA1
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158574972.000000000094D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_94d000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25405ef5bfa473fcd003cebc1a6624bb567b28c9a4be7a6028d39182d45d88cf
                  • Instruction ID: 4c86a0726b5a4d6ba937dc65a82416363b52fc12ea8a45340cf5758d0dbb80c9
                  • Opcode Fuzzy Hash: 25405ef5bfa473fcd003cebc1a6624bb567b28c9a4be7a6028d39182d45d88cf
                  • Instruction Fuzzy Hash: 3221B075408380DFDB06CF24D984B11BFB5FB4A314F24C5EAD8498F266C33A9816CB62
                  Memory Dump Source
                  • Source File: 0000000C.00000002.2158526115.000000000093D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0093D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_93d000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                  • Instruction ID: bb016b08e225314baf0323bf654d689597fceaceb199c3cfd70271817c70f2ab
                  • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                  • Instruction Fuzzy Hash: 81219D76504240DFDB06CF50D9C4B16BF72FB88314F24C5A9DD490A656C33AD82ACFA2

                  Execution Graph

                  Execution Coverage:8.3%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:170
                  Total number of Limit Nodes:12
                  execution_graph 26326 111d380 26327 111d3c6 GetCurrentProcess 26326->26327 26329 111d411 26327->26329 26330 111d418 GetCurrentThread 26327->26330 26329->26330 26331 111d455 GetCurrentProcess 26330->26331 26332 111d44e 26330->26332 26333 111d48b 26331->26333 26332->26331 26334 111d4b3 GetCurrentThreadId 26333->26334 26335 111d4e4 26334->26335 26345 111aff0 26349 111b0d8 26345->26349 26354 111b0e8 26345->26354 26346 111afff 26350 111b11c 26349->26350 26351 111b0f9 26349->26351 26350->26346 26351->26350 26352 111b320 GetModuleHandleW 26351->26352 26353 111b34d 26352->26353 26353->26346 26355 111b11c 26354->26355 26356 111b0f9 26354->26356 26355->26346 26356->26355 26357 111b320 GetModuleHandleW 26356->26357 26358 111b34d 26357->26358 26358->26346 26517 7329a46 26518 7329a2d 26517->26518 26519 7329a3d 26518->26519 26520 732a368 12 API calls 26518->26520 26521 732a358 12 API calls 26518->26521 26520->26519 26521->26519 26336 111d5c8 DuplicateHandle 26337 111d65e 26336->26337 26522 1114668 26523 111467a 26522->26523 26524 1114686 26523->26524 26526 1114778 26523->26526 26527 111479d 26526->26527 26531 1114878 26527->26531 26535 1114888 26527->26535 26533 11148af 26531->26533 26532 111498c 26532->26532 26533->26532 26539 11144b0 26533->26539 26537 11148af 26535->26537 26536 111498c 26536->26536 26537->26536 26538 11144b0 CreateActCtxA 26537->26538 26538->26536 26540 1115918 CreateActCtxA 26539->26540 26542 11159db 26540->26542 26338 732b528 26339 732b6b3 26338->26339 26341 732b54e 26338->26341 26341->26339 26342 7327988 26341->26342 26343 732b7a8 PostMessageW 26342->26343 26344 732b814 26343->26344 26344->26341 26543 732e288 CloseHandle 26544 732e2ef 26543->26544 26359 73299de 26360 73299e2 26359->26360 26361 7329924 26360->26361 26364 732a368 26360->26364 26381 732a358 26360->26381 26361->26361 26365 732a382 26364->26365 26366 732a3a6 26365->26366 26399 732b016 26365->26399 26405 732ab52 26365->26405 26409 732ae8d 26365->26409 26413 732aaed 26365->26413 26417 732a68f 26365->26417 26423 732a989 26365->26423 26427 732ace8 26365->26427 26432 732a804 26365->26432 26438 732a93e 26365->26438 26443 732b1d8 26365->26443 26448 732a698 26365->26448 26454 732ab7b 26365->26454 26459 732ad7a 26365->26459 26464 732aa17 26365->26464 26366->26361 26382 732a346 26381->26382 26383 732a362 26381->26383 26382->26361 26384 732a3a6 26383->26384 26385 732ab52 2 API calls 26383->26385 26386 732b016 2 API calls 26383->26386 26387 732aa17 2 API calls 26383->26387 26388 732ad7a 2 API calls 26383->26388 26389 732ab7b 2 API calls 26383->26389 26390 732a698 2 API calls 26383->26390 26391 732b1d8 2 API calls 26383->26391 26392 732a93e 2 API calls 26383->26392 26393 732a804 2 API calls 26383->26393 26394 732ace8 2 API calls 26383->26394 26395 732a989 2 API calls 26383->26395 26396 732a68f 2 API calls 26383->26396 26397 732aaed 2 API calls 26383->26397 26398 732ae8d 2 API calls 26383->26398 26384->26361 26385->26384 26386->26384 26387->26384 26388->26384 26389->26384 26390->26384 26391->26384 26392->26384 26393->26384 26394->26384 26395->26384 26396->26384 26397->26384 26398->26384 26400 732b023 26399->26400 26401 732aa2e 26399->26401 26401->26399 26402 732aabb 26401->26402 26469 7328c00 26401->26469 26473 7328bf8 26401->26473 26402->26366 26406 732aaf1 26405->26406 26406->26405 26477 7329280 26406->26477 26481 7329278 26406->26481 26485 73290e0 26409->26485 26489 73290e8 26409->26489 26410 732aea7 26410->26366 26414 732aaf1 26413->26414 26415 7329280 WriteProcessMemory 26414->26415 26416 7329278 WriteProcessMemory 26414->26416 26415->26414 26416->26414 26419 732a6cb 26417->26419 26418 732a80a 26418->26366 26419->26418 26493 7329508 26419->26493 26497 73294ff 26419->26497 26424 732af7b 26423->26424 26501 73291c0 26424->26501 26505 73291b8 26424->26505 26428 732acf5 26427->26428 26430 7329280 WriteProcessMemory 26428->26430 26431 7329278 WriteProcessMemory 26428->26431 26429 732af5c 26430->26429 26431->26429 26434 732a752 26432->26434 26433 732a80a 26433->26366 26434->26433 26436 7329508 CreateProcessA 26434->26436 26437 73294ff CreateProcessA 26434->26437 26435 732a869 26436->26435 26437->26435 26439 732a944 26438->26439 26509 7329370 26439->26509 26513 7329368 26439->26513 26440 732a96a 26440->26366 26444 732b1dc 26443->26444 26446 7329280 WriteProcessMemory 26444->26446 26447 7329278 WriteProcessMemory 26444->26447 26445 732b200 26446->26445 26447->26445 26450 732a6cb 26448->26450 26449 732a80a 26449->26366 26450->26449 26452 7329508 CreateProcessA 26450->26452 26453 73294ff CreateProcessA 26450->26453 26451 732a869 26452->26451 26453->26451 26455 732ab84 26454->26455 26457 7329280 WriteProcessMemory 26455->26457 26458 7329278 WriteProcessMemory 26455->26458 26456 732b200 26457->26456 26458->26456 26460 732ad7f 26459->26460 26462 73290e0 Wow64SetThreadContext 26460->26462 26463 73290e8 Wow64SetThreadContext 26460->26463 26461 732ae46 26462->26461 26463->26461 26466 732aa1d 26464->26466 26465 732aabb 26465->26366 26466->26465 26467 7328c00 ResumeThread 26466->26467 26468 7328bf8 ResumeThread 26466->26468 26467->26466 26468->26466 26470 7328c40 ResumeThread 26469->26470 26472 7328c71 26470->26472 26472->26401 26474 7328c40 ResumeThread 26473->26474 26476 7328c71 26474->26476 26476->26401 26478 73292c8 WriteProcessMemory 26477->26478 26480 732931f 26478->26480 26480->26406 26482 73292c8 WriteProcessMemory 26481->26482 26484 732931f 26482->26484 26484->26406 26486 732912d Wow64SetThreadContext 26485->26486 26488 7329175 26486->26488 26488->26410 26490 732912d Wow64SetThreadContext 26489->26490 26492 7329175 26490->26492 26492->26410 26494 7329591 26493->26494 26494->26494 26495 73296f6 CreateProcessA 26494->26495 26496 7329753 26495->26496 26498 7329591 26497->26498 26498->26498 26499 73296f6 CreateProcessA 26498->26499 26500 7329753 26499->26500 26502 7329200 VirtualAllocEx 26501->26502 26504 732923d 26502->26504 26504->26424 26506 7329200 VirtualAllocEx 26505->26506 26508 732923d 26506->26508 26508->26424 26510 73293bb ReadProcessMemory 26509->26510 26512 73293ff 26510->26512 26512->26440 26514 73293bb ReadProcessMemory 26513->26514 26516 73293ff 26514->26516 26516->26440

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 294 111d370-111d40f GetCurrentProcess 298 111d411-111d417 294->298 299 111d418-111d44c GetCurrentThread 294->299 298->299 300 111d455-111d489 GetCurrentProcess 299->300 301 111d44e-111d454 299->301 302 111d492-111d4ad call 111d552 300->302 303 111d48b-111d491 300->303 301->300 307 111d4b3-111d4e2 GetCurrentThreadId 302->307 303->302 308 111d4e4-111d4ea 307->308 309 111d4eb-111d54d 307->309 308->309
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 0111D3FE
                  • GetCurrentThread.KERNEL32 ref: 0111D43B
                  • GetCurrentProcess.KERNEL32 ref: 0111D478
                  • GetCurrentThreadId.KERNEL32 ref: 0111D4D1
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: cce8aa37b8519967a765e1f2ec4efbe6722b77830bd52d6612eb1f82268674ac
                  • Instruction ID: cfcffa13c3a33976c50e637df5a9e71732215e1d6e360843b7fb18ded4d4be82
                  • Opcode Fuzzy Hash: cce8aa37b8519967a765e1f2ec4efbe6722b77830bd52d6612eb1f82268674ac
                  • Instruction Fuzzy Hash: 0B5165B09006498FDB18DFA9D588BEEBBF1EF48304F20C569E019A7790D738A944CF65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 316 111d380-111d40f GetCurrentProcess 320 111d411-111d417 316->320 321 111d418-111d44c GetCurrentThread 316->321 320->321 322 111d455-111d489 GetCurrentProcess 321->322 323 111d44e-111d454 321->323 324 111d492-111d4ad call 111d552 322->324 325 111d48b-111d491 322->325 323->322 329 111d4b3-111d4e2 GetCurrentThreadId 324->329 325->324 330 111d4e4-111d4ea 329->330 331 111d4eb-111d54d 329->331 330->331
                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 0111D3FE
                  • GetCurrentThread.KERNEL32 ref: 0111D43B
                  • GetCurrentProcess.KERNEL32 ref: 0111D478
                  • GetCurrentThreadId.KERNEL32 ref: 0111D4D1
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 79396497bef45ad11b506c51ff8b856a6d9a23c110a6dd97a269905ef25e511a
                  • Instruction ID: 39058368311e058ba660c996461ea635b3a4045d5d2cd37bf683bb60957e9e37
                  • Opcode Fuzzy Hash: 79396497bef45ad11b506c51ff8b856a6d9a23c110a6dd97a269905ef25e511a
                  • Instruction Fuzzy Hash: 465167B09006498FDB18DFAAD588BEEBBF1EF48304F20C569D109A7794D738A944CF65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 361 73294ff-732959d 363 73295d6-73295f6 361->363 364 732959f-73295a9 361->364 371 73295f8-7329602 363->371 372 732962f-732965e 363->372 364->363 365 73295ab-73295ad 364->365 366 73295d0-73295d3 365->366 367 73295af-73295b9 365->367 366->363 369 73295bb 367->369 370 73295bd-73295cc 367->370 369->370 370->370 373 73295ce 370->373 371->372 374 7329604-7329606 371->374 378 7329660-732966a 372->378 379 7329697-7329751 CreateProcessA 372->379 373->366 376 7329608-7329612 374->376 377 7329629-732962c 374->377 380 7329616-7329625 376->380 381 7329614 376->381 377->372 378->379 382 732966c-732966e 378->382 392 7329753-7329759 379->392 393 732975a-73297e0 379->393 380->380 383 7329627 380->383 381->380 384 7329670-732967a 382->384 385 7329691-7329694 382->385 383->377 387 732967e-732968d 384->387 388 732967c 384->388 385->379 387->387 389 732968f 387->389 388->387 389->385 392->393 403 73297e2-73297e6 393->403 404 73297f0-73297f4 393->404 403->404 405 73297e8 403->405 406 73297f6-73297fa 404->406 407 7329804-7329808 404->407 405->404 406->407 408 73297fc 406->408 409 732980a-732980e 407->409 410 7329818-732981c 407->410 408->407 409->410 413 7329810 409->413 411 732982e-7329835 410->411 412 732981e-7329824 410->412 414 7329837-7329846 411->414 415 732984c 411->415 412->411 413->410 414->415 417 732984d 415->417 417->417
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0732973E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: b1e92dcdd7f216a23f9463b8e3a88b3d36c64a49d9425c00965f3ce659a2de32
                  • Instruction ID: 25334cfe76c3e6dafb5d8a55c8766d29ca472f96a62c76f8f617a7a7df748823
                  • Opcode Fuzzy Hash: b1e92dcdd7f216a23f9463b8e3a88b3d36c64a49d9425c00965f3ce659a2de32
                  • Instruction Fuzzy Hash: 99A129B1D0022ACFEB14DF68C8417EDBBB2BF44314F1485AAD819B7250DB74A986DF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 418 7329508-732959d 420 73295d6-73295f6 418->420 421 732959f-73295a9 418->421 428 73295f8-7329602 420->428 429 732962f-732965e 420->429 421->420 422 73295ab-73295ad 421->422 423 73295d0-73295d3 422->423 424 73295af-73295b9 422->424 423->420 426 73295bb 424->426 427 73295bd-73295cc 424->427 426->427 427->427 430 73295ce 427->430 428->429 431 7329604-7329606 428->431 435 7329660-732966a 429->435 436 7329697-7329751 CreateProcessA 429->436 430->423 433 7329608-7329612 431->433 434 7329629-732962c 431->434 437 7329616-7329625 433->437 438 7329614 433->438 434->429 435->436 439 732966c-732966e 435->439 449 7329753-7329759 436->449 450 732975a-73297e0 436->450 437->437 440 7329627 437->440 438->437 441 7329670-732967a 439->441 442 7329691-7329694 439->442 440->434 444 732967e-732968d 441->444 445 732967c 441->445 442->436 444->444 446 732968f 444->446 445->444 446->442 449->450 460 73297e2-73297e6 450->460 461 73297f0-73297f4 450->461 460->461 462 73297e8 460->462 463 73297f6-73297fa 461->463 464 7329804-7329808 461->464 462->461 463->464 465 73297fc 463->465 466 732980a-732980e 464->466 467 7329818-732981c 464->467 465->464 466->467 470 7329810 466->470 468 732982e-7329835 467->468 469 732981e-7329824 467->469 471 7329837-7329846 468->471 472 732984c 468->472 469->468 470->467 471->472 474 732984d 472->474 474->474
                  APIs
                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0732973E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 5b19ab28e95034a627f173c9f8a6616b728a52ddc74fa05d60ae71ed549970e6
                  • Instruction ID: 318ef98c5075313925dd1a7420f6c2f358f757531bdb699f6a3f9dcad22d938d
                  • Opcode Fuzzy Hash: 5b19ab28e95034a627f173c9f8a6616b728a52ddc74fa05d60ae71ed549970e6
                  • Instruction Fuzzy Hash: 0F912AB1D0022ACFEB14DF68C8417EDBBB2BF44314F1485A9D819B7250DB74A986DF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 475 111b0e8-111b0f7 476 111b123-111b127 475->476 477 111b0f9-111b106 call 1119b54 475->477 479 111b129-111b133 476->479 480 111b13b-111b17c 476->480 484 111b108 477->484 485 111b11c 477->485 479->480 486 111b189-111b197 480->486 487 111b17e-111b186 480->487 534 111b10e call 111b370 484->534 535 111b10e call 111b380 484->535 485->476 488 111b199-111b19e 486->488 489 111b1bb-111b1bd 486->489 487->486 491 111b1a0-111b1a7 call 111ad50 488->491 492 111b1a9 488->492 493 111b1c0-111b1c7 489->493 490 111b114-111b116 490->485 494 111b258-111b276 490->494 495 111b1ab-111b1b9 491->495 492->495 497 111b1d4-111b1db 493->497 498 111b1c9-111b1d1 493->498 506 111b279-111b2d0 494->506 495->493 499 111b1e8-111b1f1 call 111ad60 497->499 500 111b1dd-111b1e5 497->500 498->497 507 111b1f3-111b1fb 499->507 508 111b1fe-111b203 499->508 500->499 526 111b2d2-111b318 506->526 507->508 509 111b221-111b225 508->509 510 111b205-111b20c 508->510 532 111b228 call 111b650 509->532 533 111b228 call 111b680 509->533 510->509 512 111b20e-111b21e call 111ad70 call 111ad80 510->512 512->509 514 111b22b-111b22e 517 111b251-111b257 514->517 518 111b230-111b24e 514->518 518->517 527 111b320-111b34b GetModuleHandleW 526->527 528 111b31a-111b31d 526->528 529 111b354-111b368 527->529 530 111b34d-111b353 527->530 528->527 530->529 532->514 533->514 534->490 535->490
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0111B33E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 76ebe84f8045535849a87802772534f5759fc092f1a39f6c9407e624b3b364d9
                  • Instruction ID: 010e0b98eee034555033b49af2f69be7e7920d200aa4fe16fa3a9628df58b4ae
                  • Opcode Fuzzy Hash: 76ebe84f8045535849a87802772534f5759fc092f1a39f6c9407e624b3b364d9
                  • Instruction Fuzzy Hash: 22714570A04B458FDB28DF6AE44479ABBF1FF88304F008A2DD48AD7A54D734E849CB94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 646 1115a84-1115a8f 648 1115b09-1115b1b 646->648
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 234f2beb07767398775f80ca676e9c9c8afaca330d64ac7c13700453f6fc4b75
                  • Instruction ID: abe37c30a29aca45a6bfc4cce064ffc979ada6376e2941646e336c07d0f93100
                  • Opcode Fuzzy Hash: 234f2beb07767398775f80ca676e9c9c8afaca330d64ac7c13700453f6fc4b75
                  • Instruction Fuzzy Hash: A341227180474DCEDB5ACFA8C8446ADFFB2EF87314F14429AC055AB29AD7355846CB42

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 650 11144b0-11159d9 CreateActCtxA 654 11159e2-1115a3c 650->654 655 11159db-11159e1 650->655 662 1115a4b-1115a4f 654->662 663 1115a3e-1115a41 654->663 655->654 664 1115a51-1115a5d 662->664 665 1115a60 662->665 663->662 664->665 667 1115a61 665->667 667->667
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 011159C9
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: e7b3b3e09f3c5e776af9c0856113c0965c724a26a7c35452432748182b397ffe
                  • Instruction ID: 8172e3fc6fa92606e8a5360993795114d1f5079c8e0e63fb547c5274509b9b82
                  • Opcode Fuzzy Hash: e7b3b3e09f3c5e776af9c0856113c0965c724a26a7c35452432748182b397ffe
                  • Instruction Fuzzy Hash: 0F41D2B1C0071DCBDB28DFA9C884B9DBBB6BF89304F20806AD409AB255DB756945CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 668 111590c-111598c 669 111598f-11159d9 CreateActCtxA 668->669 671 11159e2-1115a3c 669->671 672 11159db-11159e1 669->672 679 1115a4b-1115a4f 671->679 680 1115a3e-1115a41 671->680 672->671 681 1115a51-1115a5d 679->681 682 1115a60 679->682 680->679 681->682 684 1115a61 682->684 684->684
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 011159C9
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: 94ca43973cef7a69eb4fc73bdfa12829195eb7567ac77895e86feba38abd64b4
                  • Instruction ID: b6c613366cceb847b4db496b453dd5d639185d1e825a2129ba9e732ad21303d7
                  • Opcode Fuzzy Hash: 94ca43973cef7a69eb4fc73bdfa12829195eb7567ac77895e86feba38abd64b4
                  • Instruction Fuzzy Hash: 9141F4B1C00719CBDB28CFA9C884B9DBBF6BF49304F24806AD409AB255D7756946CF91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 685 7329278-73292ce 687 73292d0-73292dc 685->687 688 73292de-732931d WriteProcessMemory 685->688 687->688 690 7329326-7329356 688->690 691 732931f-7329325 688->691 691->690
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07329310
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 649318e8a9de19ef44b4cc251667d6c170f602fd258e3eeed5357c668d713c2a
                  • Instruction ID: 2d5eeceecd602f49dc3c3636d217ba268998a18706575d1464d88537b0a3e59b
                  • Opcode Fuzzy Hash: 649318e8a9de19ef44b4cc251667d6c170f602fd258e3eeed5357c668d713c2a
                  • Instruction Fuzzy Hash: E02157B19003599FCB10CFA9C881BEEBFF1FF48310F10842AE959A7241C7789945CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 695 7329280-73292ce 697 73292d0-73292dc 695->697 698 73292de-732931d WriteProcessMemory 695->698 697->698 700 7329326-7329356 698->700 701 732931f-7329325 698->701 701->700
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07329310
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 4145c509f496156d679c83527ea9ae38ebf48e0eada7776fe48d7fc8a32760cb
                  • Instruction ID: d6e5c0d79c7b728f23d210fd053d001e150882eb2bb98f4adc3775cf84304ea8
                  • Opcode Fuzzy Hash: 4145c509f496156d679c83527ea9ae38ebf48e0eada7776fe48d7fc8a32760cb
                  • Instruction Fuzzy Hash: 2A213BB5D003599FDB10DFA9C885BDEBBF5FF48314F108429E919A7240C778A945DBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 705 7329368-73293fd ReadProcessMemory 708 7329406-7329436 705->708 709 73293ff-7329405 705->709 709->708
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073293F0
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 11ab15342bb2d6c7cefe101d37cf1eb1064352e91efd3801e69d507643cbc0eb
                  • Instruction ID: 46266a46e3f17397a9dea400f6c8a774ab25596dbd9807f7382b9d8ca88e9f19
                  • Opcode Fuzzy Hash: 11ab15342bb2d6c7cefe101d37cf1eb1064352e91efd3801e69d507643cbc0eb
                  • Instruction Fuzzy Hash: 012136B1C00259DFCB10DFAAC881AEEBBF5FF88310F10842AE959A7250C7399545DFA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 713 73290e0-7329133 715 7329143-7329173 Wow64SetThreadContext 713->715 716 7329135-7329141 713->716 718 7329175-732917b 715->718 719 732917c-73291ac 715->719 716->715 718->719
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07329166
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 0bbcf268055fb25c1aa84bfb971b70da476c2242abf7bd414120c4d1460aabaa
                  • Instruction ID: d4c466085aefcb3273271be9ffc40ae699f98cfe2b6eff33fa0691a4f27c345e
                  • Opcode Fuzzy Hash: 0bbcf268055fb25c1aa84bfb971b70da476c2242abf7bd414120c4d1460aabaa
                  • Instruction Fuzzy Hash: 5F2125B1D002198FDB10DFAAC8857EEBFF4EF89314F14842AD459A7241C778A945CFA0
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0111D64F
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 6a8ea402082a223e794a12bb9c42d9179a5c5643128da865372292622aa0702a
                  • Instruction ID: 68bea3f977d2ab2c3b6553c8ad152ca4d704fb781e156a5a0b3c7e454b34557c
                  • Opcode Fuzzy Hash: 6a8ea402082a223e794a12bb9c42d9179a5c5643128da865372292622aa0702a
                  • Instruction Fuzzy Hash: 8121E3B59002489FDB10CFAAD984AEEFFF5EB48310F14845AE918A3210D378A944CF60
                  APIs
                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 073293F0
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: d7cc07935ae7f047c9e5ef15382d7f6c5108e47f2e073d28f60666479ee87ff6
                  • Instruction ID: df9f556d7aa35935dfc38fdb9485b64e367f5169e374d2f047966c9c174d72df
                  • Opcode Fuzzy Hash: d7cc07935ae7f047c9e5ef15382d7f6c5108e47f2e073d28f60666479ee87ff6
                  • Instruction Fuzzy Hash: 9A2137B1C003599FDB10DFAAC884AEEFBF5FF48310F10842AE519A7240C738A945DBA0
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07329166
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: e66578b65c470808e78e1c8a8f98d23c02c73644ebee654aebd233e22bcadf02
                  • Instruction ID: 00b930a1b2b8425c5c4fa3370d97e8a98ac0f1c285441f377a2cdddf3c76329b
                  • Opcode Fuzzy Hash: e66578b65c470808e78e1c8a8f98d23c02c73644ebee654aebd233e22bcadf02
                  • Instruction Fuzzy Hash: 1F2115B1D002198FDB10DFAAC885BEEBBF4EF49314F14842AD519A7240DB78A945CFA1
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0111D64F
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 051911c6c543e4dfc72e7495b098a1def0525058bf55dbd2ee98a643a4dfae2c
                  • Instruction ID: 3c892471a7aa256bf392b426c07f8739ccb08ded5e4b0a0164eb984a6063b5e8
                  • Opcode Fuzzy Hash: 051911c6c543e4dfc72e7495b098a1def0525058bf55dbd2ee98a643a4dfae2c
                  • Instruction Fuzzy Hash: 7021F3B59002489FDB10CFAAD984ADEFFF8FB48310F14841AE918A3310D378A944CFA4
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0732922E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: ae60368dc52faa78f3e8d1c6a66729e957c92c3979d8fad0525cca37a050a606
                  • Instruction ID: 3d477f8fd78ed048ab029b467df476dc38392ab0b4fbc52d206fb7a3fa68f66f
                  • Opcode Fuzzy Hash: ae60368dc52faa78f3e8d1c6a66729e957c92c3979d8fad0525cca37a050a606
                  • Instruction Fuzzy Hash: 231159B18002499FDB10DFA9C844BEEBFF5EF88314F24881AE519A7250C779A545CFA0
                  APIs
                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0732922E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 023351364fb685bb798b6900119e222b05d989aa5dcfe333519d6aa8c84b3445
                  • Instruction ID: cbcd09c9d23468fb2295d2f443269acb11d0a26c428d495589869b90015c2fb8
                  • Opcode Fuzzy Hash: 023351364fb685bb798b6900119e222b05d989aa5dcfe333519d6aa8c84b3445
                  • Instruction Fuzzy Hash: 071137B58002499FDB10DFAAC844BEEBFF5EF48314F108819E519A7250C779A545CFA0
                  APIs
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: b976c36420356c25d8d69a68336dd07f3ffa6ad1e9daefd54bef8c3a189f7b4a
                  • Instruction ID: 5d403ada71d3e93761b84fd4ab0a71de504a013b8587bb6fca65c24eef1504fd
                  • Opcode Fuzzy Hash: b976c36420356c25d8d69a68336dd07f3ffa6ad1e9daefd54bef8c3a189f7b4a
                  • Instruction Fuzzy Hash: 671146B1C003598EDB20DFAAC4457EEFFF5EF89314F24845AC45AA7250CB39A945CBA0
                  APIs
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 61d5573539b68ab7bd253ae62d1f22521f42cc4aa5278b94d93612c1442694ab
                  • Instruction ID: f9d5f268a4dbc094919fe70ab15d7e247d1e2bec54ed66b25874b2143288c660
                  • Opcode Fuzzy Hash: 61d5573539b68ab7bd253ae62d1f22521f42cc4aa5278b94d93612c1442694ab
                  • Instruction Fuzzy Hash: 021128B19003598FDB10DFAAC4457EEFBF5EF88314F208419D519A7250CB79A545CBA4
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0111B33E
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187754155.0000000001110000.00000040.00000800.00020000.00000000.sdmp, Offset: 01110000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_1110000_windowsBook.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: d6798380d8fc951796d21a901a54ee1c3bae4318ec231d7ca791e1c813c3460e
                  • Instruction ID: 2cf5917a316a25bb26ed171d390f825b88e8b837373e9be4c5594bfa8436d308
                  • Opcode Fuzzy Hash: d6798380d8fc951796d21a901a54ee1c3bae4318ec231d7ca791e1c813c3460e
                  • Instruction Fuzzy Hash: 511110B6C042498FDB14CF9AD444ADEFBF4EF88314F10846AD919A7200C379A545CFA5
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0732B805
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 24a71b07f90e8a7fc7f068d7db52976c726e9a8422a77ea7332e9447f2b22cdd
                  • Instruction ID: c4db0e64ed606be47bc2aa71078fe2e2350db1f75a74dd8d01de5de786ce83bf
                  • Opcode Fuzzy Hash: 24a71b07f90e8a7fc7f068d7db52976c726e9a8422a77ea7332e9447f2b22cdd
                  • Instruction Fuzzy Hash: 7D1113B58003999FDB10CF99C884BDEFFF8EB49324F20845AD458A7250C379A544CFA1
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,?), ref: 0732B805
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: MessagePost
                  • String ID:
                  • API String ID: 410705778-0
                  • Opcode ID: 178e09da4d2278dc09c0e02ff327248e97fcf8e7f0f9b61531fa08637f956501
                  • Instruction ID: 9a23c65cb59685df22fa51fdfe451bd5cb9348c066c7025076b85c44c395e685
                  • Opcode Fuzzy Hash: 178e09da4d2278dc09c0e02ff327248e97fcf8e7f0f9b61531fa08637f956501
                  • Instruction Fuzzy Hash: 7011F2B58003599FDB10DF9AC888BDEFBF8EB48714F108859E518A7600D379A944CFA1
                  APIs
                  • CloseHandle.KERNELBASE(?), ref: 0732E2E0
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2195308593.0000000007320000.00000040.00000800.00020000.00000000.sdmp, Offset: 07320000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_7320000_windowsBook.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID:
                  • API String ID: 2962429428-0
                  • Opcode ID: 14029e5a9fb1fd800d136a7de262af1a6584b6bcbc636c7286c23947451b54e1
                  • Instruction ID: a4fcf4fa9e16382e4afbea78f39076f7e61cfe31f794f4dc8b7bd599179369b5
                  • Opcode Fuzzy Hash: 14029e5a9fb1fd800d136a7de262af1a6584b6bcbc636c7286c23947451b54e1
                  • Instruction Fuzzy Hash: 4E1133B68003598FDB20DF9AC449BDEBBF4EB48320F20845AD959A7240D738A544CFA5
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2186661774.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_fbd000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 242dad83448913a0f481b2f7f9314a13fc174f8823af3351ef68eccffdeea501
                  • Instruction ID: a3e0176586a03851d0ae218658fbdb654bd32e4aca24b0317244302c77bd57c1
                  • Opcode Fuzzy Hash: 242dad83448913a0f481b2f7f9314a13fc174f8823af3351ef68eccffdeea501
                  • Instruction Fuzzy Hash: BD210376904280DFCB05DF55D9C0B66BF65FB88320F20C569ED090B256D33AD816EFA2
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187538590.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_10cd000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 114b1c459b1329dfb2fb54c8a5f41fe3997ff320e0d4102c216a813e5876c132
                  • Instruction ID: 93be55e90ade7a471ed8106343fad9a09a465b7e984f56c48b00fe84052af0fa
                  • Opcode Fuzzy Hash: 114b1c459b1329dfb2fb54c8a5f41fe3997ff320e0d4102c216a813e5876c132
                  • Instruction Fuzzy Hash: 0521D371504204AFDB05DF58D980B1ABBA5EB84714F24C5BDED494B256C33AD446CBA1
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2187538590.00000000010CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010CD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_10cd000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25405ef5bfa473fcd003cebc1a6624bb567b28c9a4be7a6028d39182d45d88cf
                  • Instruction ID: b99bbd2fe6ba09eda623140ab464daeeae0b9306d262b22ae9b5c00be775a469
                  • Opcode Fuzzy Hash: 25405ef5bfa473fcd003cebc1a6624bb567b28c9a4be7a6028d39182d45d88cf
                  • Instruction Fuzzy Hash: FE21A1754083809FDB02CF54D984715BFB1FB86214F24C5EAD8498F267C33A9816CBA2
                  Memory Dump Source
                  • Source File: 0000000D.00000002.2186661774.0000000000FBD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FBD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_13_2_fbd000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                  • Instruction ID: db019bba9ca5ed0c1f483c84729dcbc0ea21a616db9d93fb605f0e5979fae70e
                  • Opcode Fuzzy Hash: d06fae078f3ccc2112caf8552f6b645ede566e603d6c7b0d9faf10800b04cc1c
                  • Instruction Fuzzy Hash: 20219076904280DFDB06CF50D9C4B56BF61FB84324F24C5A9DD490A656C336D416DFA2
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5c55236b6befd8aeacd49ecb0738e9011069437207ecea5ac42c3bc3de817f45
                  • Instruction ID: 484508507650fd179bc1150a716f283e2c8e1fbbe1ae6ad1fc144ba59bdf0f8f
                  • Opcode Fuzzy Hash: 5c55236b6befd8aeacd49ecb0738e9011069437207ecea5ac42c3bc3de817f45
                  • Instruction Fuzzy Hash: 10B16D70E00209CFDF50CFA9C98579DFBF2AF88314F548529E819A7294EBB49946CF91
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a0db2d47c7178568f63fa25e54fa1abb6aeeea61724534d808dfda3e8842e528
                  • Instruction ID: 94721ddf15413a588507442c8e5894c1c3d6f5232dcfe42f8219c45df9619f4b
                  • Opcode Fuzzy Hash: a0db2d47c7178568f63fa25e54fa1abb6aeeea61724534d808dfda3e8842e528
                  • Instruction Fuzzy Hash: 27B14D70E002098FDF50CFA9C98579DFBF2BF88714F548529E815AB294EBB49885CB81
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: a]q$ a]q$,$xaq
                  • API String ID: 0-452644037
                  • Opcode ID: bed9a008737f10a1ba0129b7d931439c833ede74825ad3398c5be2aacdb48f1b
                  • Instruction ID: 7966ac483a8ca3fef26b01c71b81ae755653ca3b090510f9b2caafdae19dea8c
                  • Opcode Fuzzy Hash: bed9a008737f10a1ba0129b7d931439c833ede74825ad3398c5be2aacdb48f1b
                  • Instruction Fuzzy Hash: 2D029C30700205DFC715DF29D594B29BBE2FF94314F108A68D8169B3A6DFB5AD86CB81
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: a]q$ a]q$xaq
                  • API String ID: 0-315583803
                  • Opcode ID: d02175c87dde71e5edd8e6ceb6950bbabaa7c97a224a2661b4bac27f02868714
                  • Instruction ID: 6922674b859bd113a179c5fbb75e7531bb72060c37cedcf2f801294535f9a44d
                  • Opcode Fuzzy Hash: d02175c87dde71e5edd8e6ceb6950bbabaa7c97a224a2661b4bac27f02868714
                  • Instruction Fuzzy Hash: C5619E707402049FC715EF29E448B6ABBE2FF94714F108A68D9069F3A5DFB5AD46CB80
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: (aq$Te]q
                  • API String ID: 0-2961548996
                  • Opcode ID: 62e79c8d53e1c35adb1a85fc6cf8dd6b65ba21ece1677784a6e82f428b2204ee
                  • Instruction ID: 82b3bdbaaabbe9c5049e47344e1c6ef5e02f43af410c4f7590d29be7c04e02b4
                  • Opcode Fuzzy Hash: 62e79c8d53e1c35adb1a85fc6cf8dd6b65ba21ece1677784a6e82f428b2204ee
                  • Instruction Fuzzy Hash: 5E516930B102148FCB54DF69C458A6EBBF2FF89710F2581A9E806DB3A5DA75DC028B90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Haq$dLcq
                  • API String ID: 0-1713614415
                  • Opcode ID: f9d4c54b1c5ed8bb2af355e56c0f0413fdd38a722fdd077493ffef60681b1ec0
                  • Instruction ID: 8bd38e3c6d74d3e327bfb83ceeb3888375888de7abe366e7345ce902b4df965e
                  • Opcode Fuzzy Hash: f9d4c54b1c5ed8bb2af355e56c0f0413fdd38a722fdd077493ffef60681b1ec0
                  • Instruction Fuzzy Hash: 4841BD317002048FDB19DF69D454AAEBBF6EF89300F2484AAE505DB3A1CB75DD05CB90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: $]q$$]q
                  • API String ID: 0-127220927
                  • Opcode ID: 69fd141c1f566c86d9995dd72113d5cb48afbcac211c31b7817bcfc9c73d6a47
                  • Instruction ID: bcfe7fb3b039de2e0fadd5ab6d90c7585a1469d4b28f98a540769074e9afac6a
                  • Opcode Fuzzy Hash: 69fd141c1f566c86d9995dd72113d5cb48afbcac211c31b7817bcfc9c73d6a47
                  • Instruction Fuzzy Hash: AE416B70708401DBDB986F699098429FBB7FFC47097388894F6468B359CF729D12CBA2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: xaq
                  • API String ID: 0-793007810
                  • Opcode ID: c07cc5a60580f3700e7f1b33747472c40876e9f7023e5ca757f0dfd4c5499c05
                  • Instruction ID: 97aa2e5fb97655846384979c31f876718bc2a122e541aab5b3c18ebc642420bb
                  • Opcode Fuzzy Hash: c07cc5a60580f3700e7f1b33747472c40876e9f7023e5ca757f0dfd4c5499c05
                  • Instruction Fuzzy Hash: 28917EB0A00281DFD765EF29F40CB147BA1F7B5B18F144639C8188BA99DFF49A45CB92
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Te]q
                  • API String ID: 0-52440209
                  • Opcode ID: 34f6f783b83c161d6eb1e5074cc2d236226b1419da77460f1f5b1a01d8016fd8
                  • Instruction ID: 251b2d557f64aef014a219598bf979beea9b1bf0b41cc3cedfe6f67688718a68
                  • Opcode Fuzzy Hash: 34f6f783b83c161d6eb1e5074cc2d236226b1419da77460f1f5b1a01d8016fd8
                  • Instruction Fuzzy Hash: 33516A70640605DFE754DF6AC858B69BBB1FF88714F204269E912AB3F1CBB5AC81CB40
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR]q
                  • API String ID: 0-3081347316
                  • Opcode ID: 0aaf0551df552735d5f0c134eed46fa7fd90393486b03c7e2ccf01b64759f30b
                  • Instruction ID: 4e4435f31ac7bd0274041bf13482cd0760ef5e4ae9fcd8df13dbc537bb3e0ba5
                  • Opcode Fuzzy Hash: 0aaf0551df552735d5f0c134eed46fa7fd90393486b03c7e2ccf01b64759f30b
                  • Instruction Fuzzy Hash: 3E412334F002068FCB45DB7C946066EBBF6EFC9215B1405A9D90ADB3A6DE74CC02C781
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: $]q
                  • API String ID: 0-1007455737
                  • Opcode ID: fa798d203f1c47b687a27e64d284eb8bc6c134df5db24e8adb1e2e0d2f83ae17
                  • Instruction ID: ab93a37e802c988eddfdb6cb629d7d2e6542adafe15b235de7fa08bf6a193f0c
                  • Opcode Fuzzy Hash: fa798d203f1c47b687a27e64d284eb8bc6c134df5db24e8adb1e2e0d2f83ae17
                  • Instruction Fuzzy Hash: 1241DD70608541DBCB895F699098029FB77FFC470973C8899E6428B35ACF729D13CBA2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: dLcq
                  • API String ID: 0-2236789282
                  • Opcode ID: 76d1a1ba5f4ff6725aa2f3dda1f8e2d654f58fc93440d35f24af4b5c5189a31a
                  • Instruction ID: 2eee704a4ecff60321af582a3bb664150b17c9a56b37d65c55132638fc51caa9
                  • Opcode Fuzzy Hash: 76d1a1ba5f4ff6725aa2f3dda1f8e2d654f58fc93440d35f24af4b5c5189a31a
                  • Instruction Fuzzy Hash: A4318F71A002058FDB15DF69C458BAEBBF6FF88300F1485A9E901AB361CBB5ED45CB90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Te]q
                  • API String ID: 0-52440209
                  • Opcode ID: 09e03a415573e5319fac0fdc1065dee5a88efc8a66233bebf995b8829d4e9608
                  • Instruction ID: 335435544d804a0f07438ef421c2a14c8fc2172343b27bc5330c74ed0c1cc521
                  • Opcode Fuzzy Hash: 09e03a415573e5319fac0fdc1065dee5a88efc8a66233bebf995b8829d4e9608
                  • Instruction Fuzzy Hash: F0216D30710115CFDB549F68D468BAEBBF6BF88B14F244159EA02EB3A5CFB19C018B91
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: |
                  • API String ID: 0-2343686810
                  • Opcode ID: 772b216732c8974372e01cb2c761094932d0720e157856bcbff456b29ff349c8
                  • Instruction ID: ead4e9d378c7a982cf35cacef4deba36be0c929e10635a1678f0abeef9600568
                  • Opcode Fuzzy Hash: 772b216732c8974372e01cb2c761094932d0720e157856bcbff456b29ff349c8
                  • Instruction Fuzzy Hash: 5B218C75F002159FCB54DF788814B6DBBF1BF48744F1088A9EA4AD73A0DA799901CB81
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Te]q
                  • API String ID: 0-52440209
                  • Opcode ID: 97c2b5722fc5de7c2d01120a799a0393ff997035c2c077ffc29b79f5bf0d2e42
                  • Instruction ID: 8af0cfe24e848a26e4175a88927f1b61f16fc44d372240b1899228810cb6115f
                  • Opcode Fuzzy Hash: 97c2b5722fc5de7c2d01120a799a0393ff997035c2c077ffc29b79f5bf0d2e42
                  • Instruction Fuzzy Hash: 6E117F70B54105DFDB149F29C899BAEBBE6AF88710F244459E902AB3E5CAB19C05CB90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Te]q
                  • API String ID: 0-52440209
                  • Opcode ID: 30549dd0b8cd6bc8931cda580eec25e02b851ea9c8adb08531995ad6906f046f
                  • Instruction ID: 1d1316f2402d627ffd452b8eed04718b0bae1a46b53c1e6c9b4f036f4b9de093
                  • Opcode Fuzzy Hash: 30549dd0b8cd6bc8931cda580eec25e02b851ea9c8adb08531995ad6906f046f
                  • Instruction Fuzzy Hash: 14118F70B40105DFDB149F69C899BAEBBE6AF8C710F144059EA02AB3A5CBB19C05CB90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Te]q
                  • API String ID: 0-52440209
                  • Opcode ID: 3de62ab69174f04782b2e6cd173a5cb4662e93447c298572dc8ef70f664043f5
                  • Instruction ID: 5a0ebd6c591167277a538ea1cef04c5ac82965331c4de094a4e5440911305042
                  • Opcode Fuzzy Hash: 3de62ab69174f04782b2e6cd173a5cb4662e93447c298572dc8ef70f664043f5
                  • Instruction Fuzzy Hash: 1611A3757101049FDB149F28C969BAEBBF6EF8C701F2400A8E502EB3A1CBB55C06CB91
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Haq
                  • API String ID: 0-725504367
                  • Opcode ID: 357ac325429e608d5d2f2bf94a2b5a14574e3264fd953b90f668bdd63ad5a221
                  • Instruction ID: 35d5c1276dd86045d22bc67d8e481a778edcb3eea99beab9dd049dab93cdda9b
                  • Opcode Fuzzy Hash: 357ac325429e608d5d2f2bf94a2b5a14574e3264fd953b90f668bdd63ad5a221
                  • Instruction Fuzzy Hash: 35F028303182401FC346AB3D681443E7FEBEFDA22132544FAE549CB396CE298C068391
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR]q
                  • API String ID: 0-3081347316
                  • Opcode ID: 623e4f0d520a370108e481581ea751ae2ac87592c16481a6e0bcd6e4a69d39fd
                  • Instruction ID: 00bb76acfc8aa9a9f466478df5edbf7ddac41952c23fddaf8128d95aa4311b66
                  • Opcode Fuzzy Hash: 623e4f0d520a370108e481581ea751ae2ac87592c16481a6e0bcd6e4a69d39fd
                  • Instruction Fuzzy Hash: 9B018470B102159FCB85DF7894526FF7BF1EF59604F10419DD946D7291E6B04D018782
                  Strings
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR]q
                  • API String ID: 0-3081347316
                  • Opcode ID: 7f1d13a9928da6518331d5a3819fdf6bf50ac16ac566382b23f027a642f01b90
                  • Instruction ID: 074a042ea0cf777dc270ac27950d2c8293f5c7b7d6347beb5f70f5899c9dd94b
                  • Opcode Fuzzy Hash: 7f1d13a9928da6518331d5a3819fdf6bf50ac16ac566382b23f027a642f01b90
                  • Instruction Fuzzy Hash: C9016271B00115DFCB84EB69D9416AEB7F5FB48604F1041A9EA0ADB295EBB19D0187C2
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fcef0bc848d0a9ad38c17bab251be36a4939aa946ff3b797b25671ef14fe930f
                  • Instruction ID: 4dc69ea4c6cf9fc9ac3d9596073dcf1bf8ae6f22a7abf978f8d4a241a0736fb6
                  • Opcode Fuzzy Hash: fcef0bc848d0a9ad38c17bab251be36a4939aa946ff3b797b25671ef14fe930f
                  • Instruction Fuzzy Hash: BBC1F72195E3E15FD7036B3859704A67FB5AE9326570A04EBC0D0CF1B7D99C888DC3AA
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a8d33b80e4f0c4704e739015befd4c56c4828b2c8f3c6b9fd2b52813efa84dbb
                  • Instruction ID: 83e007f80d6655f2974e44b78822740da3df5c8eebb93e9fd0fdaa153ceb0f14
                  • Opcode Fuzzy Hash: a8d33b80e4f0c4704e739015befd4c56c4828b2c8f3c6b9fd2b52813efa84dbb
                  • Instruction Fuzzy Hash: EAC13A74700205CFCB48DF79D598A6DB7F6EF88714B2144A8E8069B3A5CB76EC42CB51
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25e851152fac9b362e82ff97260d1822fd360bcffb7f0834c5de5ab3aead03b5
                  • Instruction ID: a8c16d445723416a6c2102d39cd65ab5d01b0ee8f09d783255a1362f9380ca06
                  • Opcode Fuzzy Hash: 25e851152fac9b362e82ff97260d1822fd360bcffb7f0834c5de5ab3aead03b5
                  • Instruction Fuzzy Hash: C1B16D70E002098FDB50CFA8C98579DFFF2FF88314F548529E819A7294EBB49946CB91
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: faeeaf9d21678a70eb539addaca2c2ea974f860761565016128353404309b8f9
                  • Instruction ID: 3cdf83a5ec71bd780045bf6aca1ea4f1e9d35f18014dc23cc1945f8cb0ed7b24
                  • Opcode Fuzzy Hash: faeeaf9d21678a70eb539addaca2c2ea974f860761565016128353404309b8f9
                  • Instruction Fuzzy Hash: ACB15C70E002098FDF50CFA8C98579DFFF2BF48714F948529E815AB294EBB49885CB91
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5c914eacab33956802ab06523972bb0ce161e738614c27d29643d5fd392f6c5c
                  • Instruction ID: b5774d211e5d572beeed3f98db6f122bc7adfb0bc8227e279633bcbaf084e0b0
                  • Opcode Fuzzy Hash: 5c914eacab33956802ab06523972bb0ce161e738614c27d29643d5fd392f6c5c
                  • Instruction Fuzzy Hash: 16A19070B002019FCB59EF35E05465DB7A2FF88304B148669D8069B359EFB5EC8BCB91
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ffe2e02c1fc936899182261f91515251c063a4cd2d3024106d60a8b6a7f44ee8
                  • Instruction ID: 87824e6be24559cf45ca202573f0a2eea8ac74a857c15b5fb65bd7c7eb897b35
                  • Opcode Fuzzy Hash: ffe2e02c1fc936899182261f91515251c063a4cd2d3024106d60a8b6a7f44ee8
                  • Instruction Fuzzy Hash: C9A17DB46002418FDB09DF31E558A5E7BB6FF88314B2086A9D4068B359DB799D8BCFC1
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 049dd801177a995120d2e6fa05f3a8a476a5eeacfc6eb93b04d6ddf2244bca41
                  • Instruction ID: a63581e66cc0f4f0fee4703a9250c04fc6f34020667b971030a167e828d6ff12
                  • Opcode Fuzzy Hash: 049dd801177a995120d2e6fa05f3a8a476a5eeacfc6eb93b04d6ddf2244bca41
                  • Instruction Fuzzy Hash: 17A17CB46002018FCB09EF31E55895E7BB6FF88314B208669D5068B359DB39AD8BCFC1
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c165ba03b2b94407e20da8520dfddb0c480cff53fb483335f715bf7c03d44a0b
                  • Instruction ID: c0eff1812758496ecac27deb615fcc1affd680e447dcfef713aaa050062c7522
                  • Opcode Fuzzy Hash: c165ba03b2b94407e20da8520dfddb0c480cff53fb483335f715bf7c03d44a0b
                  • Instruction Fuzzy Hash: CC61BA34600205DFDB05DF68C884A6AFBF2FF85315F5580A9E946AB3A6C771EC41CBA0
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9a72e597a98744ac9220a2806b0702f5feb042e246807cecc6219127bd06e092
                  • Instruction ID: 2539e732490f259d1a683deae2fcf92d5f7a159de2c8033036372b0e3020c26a
                  • Opcode Fuzzy Hash: 9a72e597a98744ac9220a2806b0702f5feb042e246807cecc6219127bd06e092
                  • Instruction Fuzzy Hash: 30511134A00208CFDB55DF68D8587EDFBB2EF59318F108469DA05AB361DBB59C4ACB60
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c9c6a92c049f3f05e22e47831e9c40c9ea68b4570d4c821d784f5f6ccd0ac490
                  • Instruction ID: 3a4360863028a8ed33fe2fdf689a5ccce230e4032d8aeec951dac90d7bfbcf67
                  • Opcode Fuzzy Hash: c9c6a92c049f3f05e22e47831e9c40c9ea68b4570d4c821d784f5f6ccd0ac490
                  • Instruction Fuzzy Hash: 5351D370211209DFCB19EF29F5889597766FFC530575086A8D812CB279EB39AD8BCF80
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0e8c7e637d6a6d9079aa4396daa253051fd73046cf8b3b963d72c02dd6e05017
                  • Instruction ID: 387c22ce8dd71b9c5d0e8f4b87c8cc509250e68dcf7eb047481902f1c4180bee
                  • Opcode Fuzzy Hash: 0e8c7e637d6a6d9079aa4396daa253051fd73046cf8b3b963d72c02dd6e05017
                  • Instruction Fuzzy Hash: 7341A0B0B00209AFCB44EFB9C55466EFBFAFF89301F208569D849D7346DA349D428B91
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7e53c31f1a37a014ed77a7cafb7e31ae4a95d990cf34bd1b771fd11cb979f0e7
                  • Instruction ID: 70b3a7b7540e680e44f684f8260b51987d45ceb91650489ddb33fee91ff565ab
                  • Opcode Fuzzy Hash: 7e53c31f1a37a014ed77a7cafb7e31ae4a95d990cf34bd1b771fd11cb979f0e7
                  • Instruction Fuzzy Hash: C641F1B0D0034C9FDB14DFA9C485ADEBFF5EF48304F248429E80AAB254DB75A985CB90
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 18e2aef490145264999b133c43c13844f868aedf63fce6d9c38e4c38422ba90b
                  • Instruction ID: 984d54cdb311483dcdf516eda6bec3fac2d8a709ebe34c93e1f646c46e185e77
                  • Opcode Fuzzy Hash: 18e2aef490145264999b133c43c13844f868aedf63fce6d9c38e4c38422ba90b
                  • Instruction Fuzzy Hash: 9841E1B0D003499FDB14DF99C484ADEBFF5FF48314F148029E81AAB254DB75A985CB90
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 614e674514007637a8959f35b68cb28e1bad10ffa0d916956adea625b360c574
                  • Instruction ID: c5be90886e39b49fa2ca860d9992509b2670c857856ae904c5825b1295ffdf3d
                  • Opcode Fuzzy Hash: 614e674514007637a8959f35b68cb28e1bad10ffa0d916956adea625b360c574
                  • Instruction Fuzzy Hash: 542177307002009BCB06EB79E5505AEB7AAEB84214B104669CC098B34AEF76AD4BC7D2
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25cec362422c3b2e9fa3579728b996966d6216ae5b87de30e8bfbe9f9980d36b
                  • Instruction ID: caf9333e9dc3f45113b56017ddd8fa17cbab5f3fc09d5bf1e86d41b0362e3fbf
                  • Opcode Fuzzy Hash: 25cec362422c3b2e9fa3579728b996966d6216ae5b87de30e8bfbe9f9980d36b
                  • Instruction Fuzzy Hash: 3221B0306102069FDBA89B79E40866ABBA4EF55301B0046ADFC07C2155EFB49A41CB51
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3250762196.000000000120D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0120D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_120d000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4cd52c49110704279d20e00c7b196e4714ebb6ca948c5c16fc57c7b5dcae4a8d
                  • Instruction ID: 5971dd2d59ba7ccaf608efcec7f912eafdec442fede18d392596ab98b4d19c90
                  • Opcode Fuzzy Hash: 4cd52c49110704279d20e00c7b196e4714ebb6ca948c5c16fc57c7b5dcae4a8d
                  • Instruction Fuzzy Hash: BD210671514209DFDB16DF98E9C0B26BF65FB88318F20C669EE090A297C37AD415C7A2
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7883a844aa767dc320aaf26ea9d9f5e3002e000bdb7bd1c32c541f8e01e79267
                  • Instruction ID: d2e2814d11fe4525e93d8e868846d0d34dbcfcd7a85f2707db0b883239097188
                  • Opcode Fuzzy Hash: 7883a844aa767dc320aaf26ea9d9f5e3002e000bdb7bd1c32c541f8e01e79267
                  • Instruction Fuzzy Hash: 5B2181307002079FDFE8AB79F55C66EBAA4AF55301B04467DBD07C2145EFB49641CB92
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 00643d87401b693ae4c806ed19356c48c7503b5261a35bb9e59cd01f1fa232ee
                  • Instruction ID: 7c28620c9e18d04761e2bb03aec34fa27a08f7bb02398f6160febd497985d11f
                  • Opcode Fuzzy Hash: 00643d87401b693ae4c806ed19356c48c7503b5261a35bb9e59cd01f1fa232ee
                  • Instruction Fuzzy Hash: 9F1124705002428FCB45EF78D4006AEBBF2EF80354B20466DC8058B295EBB6994BCBC1
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3250762196.000000000120D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0120D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_120d000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                  • Instruction ID: 5131023f52ab4768012f03872b8816eb71fc540d7a3ce1a9b6a4b3ad56d5f8e3
                  • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                  • Instruction Fuzzy Hash: C611CD72404244CFDB12CF88E5C4B16BF61FB84324F2486A9DE090A257C336D45ACBA2
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1b0ac83a1734faa915ca5a1fb0727e8cc90a8c09ac78ada114537ea54d6007ed
                  • Instruction ID: 1509a0edcf4c25e0f2e3b4575f2b85d3faeab1040a507dfeed16d1c037e12d42
                  • Opcode Fuzzy Hash: 1b0ac83a1734faa915ca5a1fb0727e8cc90a8c09ac78ada114537ea54d6007ed
                  • Instruction Fuzzy Hash: 50117070A01205DFCB94EBB9D40466A7BF6EF8931671004B9D909DB361EB359D42CB91
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f554dd6b5c1d1a69fd8f1136551faa822ae4d6a2eb1b45a825d4613e2e3c84e4
                  • Instruction ID: e065df8252a8cf13da9e9e5932370492193af93430f90f27b3cc6a1d09f052e2
                  • Opcode Fuzzy Hash: f554dd6b5c1d1a69fd8f1136551faa822ae4d6a2eb1b45a825d4613e2e3c84e4
                  • Instruction Fuzzy Hash: 0101F5313042408FC726AB3899A457DB7E7EFD6255308487DD44ACB752CE75CC0AC790
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ebcc47bfec561e450677a83e27e4b3f1d60b48f783bcc784183045f7aa387292
                  • Instruction ID: 81d39a8b226110d6a7e87550e8b97673792a746e42f19cb9c6d605c59980aecd
                  • Opcode Fuzzy Hash: ebcc47bfec561e450677a83e27e4b3f1d60b48f783bcc784183045f7aa387292
                  • Instruction Fuzzy Hash: 1311C4706002068FCB45EF78E404A5EBBB6EF94354F108769C5058B295EBB6994BCBD1
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab26c232967c1b512ce5dea0fddb9a5df37e43229b38a15620eac0b43174a4e4
                  • Instruction ID: 6ecfb9f49dbb401e8cbddf113f379e14bf74e72073e41a9d727d9b07e669e46d
                  • Opcode Fuzzy Hash: ab26c232967c1b512ce5dea0fddb9a5df37e43229b38a15620eac0b43174a4e4
                  • Instruction Fuzzy Hash: 0B11AD70B00209DFCB94EBBED40466ABBE6FF8820575008B8D90ADB354EA35DC42CB90
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e04c58e0feb484dfe3682060aa6ff24f277ca7dbc0f303cf42d0459d0caffc2d
                  • Instruction ID: 53f7f976e4ad1ab2f21780c6c45c5202d8b2de6d5c7d057e450efee1f64d3cb4
                  • Opcode Fuzzy Hash: e04c58e0feb484dfe3682060aa6ff24f277ca7dbc0f303cf42d0459d0caffc2d
                  • Instruction Fuzzy Hash: DCF08CB06052848FDF06CF25F4685897F36EB8522973085DAC4418B266DB398A8BCB95
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 76e77963f82d02653f4f58563f4599a476c1007c26020acbfe4ee01c50da31be
                  • Instruction ID: c38154c75a02032a95c884aebc15d205c37292b2b9bf013197a81cc9e0c11805
                  • Opcode Fuzzy Hash: 76e77963f82d02653f4f58563f4599a476c1007c26020acbfe4ee01c50da31be
                  • Instruction Fuzzy Hash: 0FF02771604242DBCB01BB70E40858DF7229BA13A4F104367C9050B196EBF5990BC382
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7412f640730fc30293febe056b29fdd360642be1d8e87bf10b14f42418ca4a2f
                  • Instruction ID: d41950e64ad9ee4c06c27f3e02f81b63569e7c72c45750931f4345f676191c9d
                  • Opcode Fuzzy Hash: 7412f640730fc30293febe056b29fdd360642be1d8e87bf10b14f42418ca4a2f
                  • Instruction Fuzzy Hash: A9E026323162516FC302ABF898148BA3FEEEF8B10435400DAE180CF3A7CE29CC064395
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54a6cf5e10bc68b2321335ada7a4f0c6d75d84420660e54eeba5d92b664f6344
                  • Instruction ID: 423e527175ebb2cef38557ba7b36ae4a07e70b93b7fb4af6694c981e8c701c21
                  • Opcode Fuzzy Hash: 54a6cf5e10bc68b2321335ada7a4f0c6d75d84420660e54eeba5d92b664f6344
                  • Instruction Fuzzy Hash: 38F0A7B5E542459FDB919F11C454AADBBB0BF15244F0402B6DC1ADB162E6F58941CB10
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08359ede49ee6b0d726f8a293e2f0127a399af38ea30783a77d210f0c09d5969
                  • Instruction ID: 2cef5cffd89aa8a3eee13c99ae8462807fcb2b46127015659504602793879959
                  • Opcode Fuzzy Hash: 08359ede49ee6b0d726f8a293e2f0127a399af38ea30783a77d210f0c09d5969
                  • Instruction Fuzzy Hash: 46F0F4B5900609CFDB10DF99D44479EFBF0FF49328F208459D619A7250C379A844CFA1
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ef7d78a9264331af891ffe2f207a130acc8a29e40fb3d441467ddd93fbb69769
                  • Instruction ID: 59a720962499413c9aef856a6dc3f80a28032eb776d5c6c4265a16399a173496
                  • Opcode Fuzzy Hash: ef7d78a9264331af891ffe2f207a130acc8a29e40fb3d441467ddd93fbb69769
                  • Instruction Fuzzy Hash: F1E0EC71C5430A9FC781EFF844013B9B7F9FB09205F5041ADC80CD6204FA7546128B92
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b9363df2b12d159360bfe6f2d885979e7cea619237d1ca6bb2c713c2034c8b74
                  • Instruction ID: 75fc0c2dfa53a91ecdc0f4969fcacd0664f1b8175c78fb770671d77e1b6ce527
                  • Opcode Fuzzy Hash: b9363df2b12d159360bfe6f2d885979e7cea619237d1ca6bb2c713c2034c8b74
                  • Instruction Fuzzy Hash: 4FD0C9715147098FE3429A6AD564A6277ACEF6AA0570100AAE841CB772EB65FC01CA21
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ebc7112cb58d2fda5183eb63d81209e38aefe6dd6b9a5181e1dafaddc29df3f
                  • Instruction ID: 165fd2b1571029fdf5cb5132689a7b0d5ec070fbf56fb0ea2ceb16dfcc3dc19d
                  • Opcode Fuzzy Hash: 2ebc7112cb58d2fda5183eb63d81209e38aefe6dd6b9a5181e1dafaddc29df3f
                  • Instruction Fuzzy Hash: 5BC08C2110428ACED7B0A374F90CAACBE20ABA2301F0006E6BC03040AACEF80600871B
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 08c144c793ba3fc06906b8c40004fe26497268c5e49e87a91843fb1fa62cc91a
                  • Instruction ID: 255a5655b087eb39804cdf6b0ce2c0634b82c75966557b183bcd9d33819c0d8b
                  • Opcode Fuzzy Hash: 08c144c793ba3fc06906b8c40004fe26497268c5e49e87a91843fb1fa62cc91a
                  • Instruction Fuzzy Hash: 43C08C2110424BCED3B0A3B4F90CAACBD20ABA2301F0006E2BC03040AACEF80600831B
                  Memory Dump Source
                  • Source File: 0000000F.00000002.3252391904.0000000001750000.00000040.00000800.00020000.00000000.sdmp, Offset: 01750000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_15_2_1750000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee677d758531af410ffeb48d545b286b1719ac5ff66bb5ddf3e28f20308cf1dd
                  • Instruction ID: 896b213b150aef14d648bd48042cbf125e017ad09b5ca972915d7c632156c8f7
                  • Opcode Fuzzy Hash: ee677d758531af410ffeb48d545b286b1719ac5ff66bb5ddf3e28f20308cf1dd
                  • Instruction Fuzzy Hash: DAC09235260208CFC344EF9AE588C12B7ECFF98B003410099E9018B732CB21FC11DB61
                  Strings
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: (aq$Te]q
                  • API String ID: 0-2961548996
                  • Opcode ID: 0f51c2c47409b98e683fe2c09056390c8a761f96bb08ee97f7389b2782e9834a
                  • Instruction ID: 773cf0bf4bfceaf366706af6520a5a0e8a65e38806b62f0edca0446204c653b8
                  • Opcode Fuzzy Hash: 0f51c2c47409b98e683fe2c09056390c8a761f96bb08ee97f7389b2782e9834a
                  • Instruction Fuzzy Hash: 3351AF30B001049FCB48DF69C458AADBBF2FF89710F2581A9E902EB3A5CB75DD418B90
                  Strings
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Haq$dLcq
                  • API String ID: 0-1713614415
                  • Opcode ID: 718adc1ac2c0949cf8d1e286c72212e3eab47db49164ad80c17b601823b7b81c
                  • Instruction ID: 4f01d1d118eefec2714a92748d36cc11f2c21fd67efc571ba68565e2f4d2df00
                  • Opcode Fuzzy Hash: 718adc1ac2c0949cf8d1e286c72212e3eab47db49164ad80c17b601823b7b81c
                  • Instruction Fuzzy Hash: FF41F4307042448FCB09DF69C458AAEBFF6AF89304F1444AAE505EB3A2CB75DC05CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: LR]q
                  • API String ID: 0-3081347316
                  • Opcode ID: bf6dd2b98df127f257539216c5766dd03e615f49f9220196a0514c8c83e62089
                  • Instruction ID: 45b6e992a703344124dba4418fc53ca9f5fc54f404c4c183e92ec8c85541cf59
                  • Opcode Fuzzy Hash: bf6dd2b98df127f257539216c5766dd03e615f49f9220196a0514c8c83e62089
                  • Instruction Fuzzy Hash: A1414334F042169FCB09AB7C845466E7BF6EFC5224B1405A9D51ADB395EB30CD42C782
                  Strings
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: dLcq
                  • API String ID: 0-2236789282
                  • Opcode ID: b6b306dd8c7dfdcdbd927e1d589f607ea4ccc44dac948cefe331f4ff8077337d
                  • Instruction ID: 817d5f72fc84a91024b10f3246bf38d1b375b55c6a391840661c80fa43f92645
                  • Opcode Fuzzy Hash: b6b306dd8c7dfdcdbd927e1d589f607ea4ccc44dac948cefe331f4ff8077337d
                  • Instruction Fuzzy Hash: 4B318F31A002048FDB19DF69C448BAEBBF6BF4C304F1985AAE511AB361CB75ED44CB91
                  Strings
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID: Haq
                  • API String ID: 0-725504367
                  • Opcode ID: 6998ae248c8f6df26a907054c26972ce86aaa956121f8bde069c04170b1bf8bc
                  • Instruction ID: be1e0931c640353895efad37dbf6b126fb5136404b06a57469a1a682482c14c7
                  • Opcode Fuzzy Hash: 6998ae248c8f6df26a907054c26972ce86aaa956121f8bde069c04170b1bf8bc
                  • Instruction Fuzzy Hash: B7F0C8307093901FC34B973D586446E7FEBAFCB11431944EAE549DB397DD258D068391
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3df592a527ac2846f471b9af4d1b83185a237ec28d5deed397d88f7af8206b85
                  • Instruction ID: a81946fcf62858c7b768526f5841a3261d08af126fa011ddfcb4c3b42d17263b
                  • Opcode Fuzzy Hash: 3df592a527ac2846f471b9af4d1b83185a237ec28d5deed397d88f7af8206b85
                  • Instruction Fuzzy Hash: CF51C1385002818FC75BFF24E598B497767FF84389790A568D401EB26DEB75AD86CF80
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee4a4a04b0b4101cf387151167e9665543c8adf197d3b0f70cde14fb1d6e588c
                  • Instruction ID: 3be78c19e7fce410f29f79c999231b7c974aa13ff5783fb45beeee80ff9e24de
                  • Opcode Fuzzy Hash: ee4a4a04b0b4101cf387151167e9665543c8adf197d3b0f70cde14fb1d6e588c
                  • Instruction Fuzzy Hash: 0941B470E00209AFCB48EFB9854466EBFFAEF89310F208569D459D7345DB3499428B91
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 34fc827d0e61abd91fff31be1848d9614960f35a6b3e5e6a68850d855168af09
                  • Instruction ID: 585b2dfd4475af13bc1f2384d18d249d1ebd719c4b3442d56764f5c75f5654a3
                  • Opcode Fuzzy Hash: 34fc827d0e61abd91fff31be1848d9614960f35a6b3e5e6a68850d855168af09
                  • Instruction Fuzzy Hash: 2A21A430A00342DFDFAEAB78D45872E3BA9AF09245705463DF527D6155EB788980CBD2
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230364352.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_fed000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 15dbd9fbfaa71b9655adce801e85dd9a07bdaafc057d4a8cd6f2e2a7ed91aebe
                  • Instruction ID: a7dd322758130cc01c65c4bd643134be184a893a2fb5584e52d0b29125d402cf
                  • Opcode Fuzzy Hash: 15dbd9fbfaa71b9655adce801e85dd9a07bdaafc057d4a8cd6f2e2a7ed91aebe
                  • Instruction Fuzzy Hash: A9214872900384DFDB05DF14D9C0F26BF65FB98324F24C569D9090B656C33AD815EBA2
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4129451d32270ead6157f84f25911af315a66863db93aa4036833498105819f
                  • Instruction ID: 45fd1d4cbebb4655ad942d0da1f79f0dcf5c0302b43f58d5678fc129ce221c46
                  • Opcode Fuzzy Hash: a4129451d32270ead6157f84f25911af315a66863db93aa4036833498105819f
                  • Instruction Fuzzy Hash: 56216230B002038FDFAEBB79A55872E7BADAF08245B01463DB527D1145EB748980CBD2
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 522e398530caf4cd47699f84ceba8b5d127df9c5e7242587043f760a77692c82
                  • Instruction ID: 1c52443af57ca3b1e601a2ff089e9f663515569dbe787a4169a4262dee76428a
                  • Opcode Fuzzy Hash: 522e398530caf4cd47699f84ceba8b5d127df9c5e7242587043f760a77692c82
                  • Instruction Fuzzy Hash: 8211A070A01386DFCB5AEF78D40466A7BF6EF8921971408BDD405DB316EB318D92CB81
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230364352.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_fed000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                  • Instruction ID: 3769eaf2ffa00e4069d1a8640a9938893308298a36df5e53b6195357c98474c3
                  • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                  • Instruction Fuzzy Hash: D3110376804380CFCB02CF04D5C4B16BF71FB94324F28C5A9D9090B656C336D85ADBA2
                  Memory Dump Source
                  • Source File: 00000011.00000002.2230813385.0000000001190000.00000040.00000800.00020000.00000000.sdmp, Offset: 01190000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_17_2_1190000_windowsBook.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a987693d1317f163445aab0819546a80f5ea360509be1791b27f37398bdc0d64
                  • Instruction ID: 2ae39c4f1ec1ba0c4fae32e96d939ecfc25d8ce42d1e7de87fe279c79093e405
                  • Opcode Fuzzy Hash: a987693d1317f163445aab0819546a80f5ea360509be1791b27f37398bdc0d64
                  • Instruction Fuzzy Hash: 5D118B74B00206DFCB59EFB9D40462A7BEAFF8821575008B8D50ADB354EB30DC81CB91