Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rwzBBMVxUb.exe

Overview

General Information

Sample name:rwzBBMVxUb.exe
renamed because original name is a hash value
Original sample name:4f28687d01e29f37854b840c3f5f0fe2cd506c87d4f7b036bdddcd147dc2cbc3.exe
Analysis ID:1559434
MD5:5b65abb4776d7bae7624c3085a5a227a
SHA1:7eedb005b4e3a79aa4482f8fe04c16ee4490bfb6
SHA256:4f28687d01e29f37854b840c3f5f0fe2cd506c87d4f7b036bdddcd147dc2cbc3
Tags:exeuser-JAMESWT_MHT
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rwzBBMVxUb.exe (PID: 6256 cmdline: "C:\Users\user\Desktop\rwzBBMVxUb.exe" MD5: 5B65ABB4776D7BAE7624C3085A5A227A)
    • rwzBBMVxUb.exe (PID: 7080 cmdline: "C:\Users\user\Desktop\rwzBBMVxUb.exe" MD5: 5B65ABB4776D7BAE7624C3085A5A227A)
  • qXLPL.exe (PID: 5228 cmdline: "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe" MD5: 5B65ABB4776D7BAE7624C3085A5A227A)
    • qXLPL.exe (PID: 3052 cmdline: "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe" MD5: 5B65ABB4776D7BAE7624C3085A5A227A)
  • qXLPL.exe (PID: 2056 cmdline: "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe" MD5: 5B65ABB4776D7BAE7624C3085A5A227A)
    • qXLPL.exe (PID: 6548 cmdline: "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe" MD5: 5B65ABB4776D7BAE7624C3085A5A227A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Username": "chimaobi@alruomigroup.com", "Password": "LtURz%y7", "Host": "smtp.alruomigroup.com"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.4139303062.0000000000403000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_f2a90d14unknownunknown
  • 0x2d42:$a: 0B FE 01 2C 0B 07 16 7E 08 00 00 04 A2 1F 0C 0C 00 08 1F 09 FE 01
00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000002.00000002.4139303062.0000000000433000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
    • 0x71a:$a13: get_DnsResolver
    • 0xcd9:$a18: get_advancedParameters
    • 0xf1:$a19: get_disabledByRestriction
    • 0xdf0:$a22: get_signaturePresets
    • 0xdb6:$a29: set_IdnAddress
    • 0x284:$a35: get_ShiftKeyDown
    • 0x295:$a36: get_AltKeyDown
    • 0xb51:$a39: get_DefaultCredentials
    00000009.00000002.4139300989.0000000000432000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
    • 0xfd7:$a3: MailAccountConfiguration
    • 0xfb7:$a8: set_BindingAccountConfiguration
    • 0x1d8:$a14: get_archivingScope
    • 0x0:$a15: get_providerName
    • 0x272:$a21: get_avatarType
    • 0x896:$a23: get_enableLog
    • 0x7d:$a26: set_accountName
    • 0xd8:$a31: set_username
    • 0xefd:$a32: set_version
    • 0x8e7:$a38: get_PasswordHash
    00000009.00000002.4156381468.00000000031F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Click to see the 42 entries
      SourceRuleDescriptionAuthorStrings
      9.2.qXLPL.exe.400000.0.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x311d7:$a3: MailAccountConfiguration
      • 0x311b7:$a8: set_BindingAccountConfiguration
      • 0x303d8:$a14: get_archivingScope
      • 0x30200:$a15: get_providerName
      • 0x30472:$a21: get_avatarType
      • 0x30a96:$a23: get_enableLog
      • 0x3027d:$a26: set_accountName
      • 0x302d8:$a31: set_username
      • 0x310fd:$a32: set_version
      • 0x30ae7:$a38: get_PasswordHash
      0.2.rwzBBMVxUb.exe.97f7148.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
        0.2.rwzBBMVxUb.exe.97f7148.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          0.2.rwzBBMVxUb.exe.97f7148.6.unpackWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
          • 0x2f3d7:$a3: MailAccountConfiguration
          • 0x2f3f0:$a5: SmtpAccountConfiguration
          • 0x2f3b7:$a8: set_BindingAccountConfiguration
          • 0x2e328:$a11: get_securityProfile
          • 0x2e1c9:$a12: get_useSeparateFolderTree
          • 0x2fb1a:$a13: get_DnsResolver
          • 0x2e5d8:$a14: get_archivingScope
          • 0x2e400:$a15: get_providerName
          • 0x30b18:$a17: get_priority
          • 0x300d9:$a18: get_advancedParameters
          • 0x2f4f1:$a19: get_disabledByRestriction
          • 0x2dfa2:$a20: get_LastAccessed
          • 0x2e672:$a21: get_avatarType
          • 0x301f0:$a22: get_signaturePresets
          • 0x2ec96:$a23: get_enableLog
          • 0x2e47d:$a26: set_accountName
          • 0x3063b:$a27: set_InternalServerPort
          • 0x2d92d:$a28: set_bindingConfigurationUID
          • 0x301b6:$a29: set_IdnAddress
          • 0x309cc:$a30: set_GuidMasterKey
          • 0x2e4d8:$a31: set_username
          0.2.rwzBBMVxUb.exe.97f7148.6.unpackWindows_Trojan_AgentTesla_f2a90d14unknownunknown
          • 0x2142:$a: 0B FE 01 2C 0B 07 16 7E 08 00 00 04 A2 1F 0C 0C 00 08 1F 09 FE 01
          Click to see the 57 entries

          System Summary

          barindex
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\rwzBBMVxUb.exe, ProcessId: 7080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qXLPL
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: rwzBBMVxUb.exeAvira: detected
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeAvira: detection malicious, Label: HEUR/AGEN.1306098
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Username": "chimaobi@alruomigroup.com", "Password": "LtURz%y7", "Host": "smtp.alruomigroup.com"}
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeReversingLabs: Detection: 89%
          Source: rwzBBMVxUb.exeReversingLabs: Detection: 89%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeJoe Sandbox ML: detected
          Source: rwzBBMVxUb.exeJoe Sandbox ML: detected
          Source: rwzBBMVxUb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: rwzBBMVxUb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_086A9D28
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then cmp dword ptr [04AFE44Ch], 04h0_2_086A7FD0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_086AAB78
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_086AAB74
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_086AAC28
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_086AAC38
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h0_2_086A9D18
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 4x nop then cmp dword ptr [04AFE44Ch], 04h0_2_086A7FC0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h6_2_08349D28
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then cmp dword ptr [04E2E44Ch], 04h6_2_08347FD0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h6_2_0834AB74
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h6_2_0834AB78
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h6_2_0834AC38
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h6_2_0834AC28
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h6_2_08349D18
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then cmp dword ptr [04E2E44Ch], 04h6_2_08347FC0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h8_2_09CD9D28
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then cmp dword ptr [0596E44Ch], 04h8_2_09CD7FD0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h8_2_09CDAB6D
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h8_2_09CDAB78
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h8_2_09CD9D18
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h8_2_09CDAC28
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then mov dword ptr [ebp-18h], 00000000h8_2_09CDAC38
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 4x nop then cmp dword ptr [0596E44Ch], 04h8_2_09CD7FCF

          Networking

          barindex
          Source: Yara matchFile source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPE
          Source: unknownDNS traffic detected: query: smtp.alruomigroup.com replaycode: Name error (3)
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: smtp.alruomigroup.com
          Source: rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.00000000031E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
          Source: qXLPL.exe, 00000009.00000002.4156381468.00000000031E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DhvEkZ.com
          Source: qXLPL.exe, 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
          Source: rwzBBMVxUb.exe, 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000006.00000002.2061546845.0000000002611000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000008.00000002.2151775959.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761494966.0000000004F80000.00000004.00000020.00020000.00000000.sdmp, rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
          Source: rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
          Source: qXLPL.exe, 00000009.00000002.4156381468.0000000003567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://409Yv1c1gFV6m.com
          Source: rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000003135000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://409Yv1c1gFV6m.comL:
          Source: rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000003135000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.0000000003567000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://409Yv1c1gFV6m.comt-
          Source: rwzBBMVxUb.exe, 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4139305912.0000000000434000.00000040.00000400.00020000.00000000.sdmp, qXLPL.exe, 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
          Source: rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.00000000031E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

          System Summary

          barindex
          Source: 9.2.qXLPL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 6.2.qXLPL.exe.2a1a5a0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 00000002.00000002.4139303062.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 00000002.00000002.4139303062.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 00000009.00000002.4139300989.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 00000009.00000002.4156381468.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 Author: unknown
          Source: Process Memory Space: rwzBBMVxUb.exe PID: 6256, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: Process Memory Space: qXLPL.exe PID: 5228, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: Process Memory Space: qXLPL.exe PID: 2056, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
          Source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_023228380_2_02322838
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_02321AC00_2_02321AC0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_0236AF080_2_0236AF08
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_0236C1B80_2_0236C1B8
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_0236DBD00_2_0236DBD0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A9E980_2_086A9E98
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A00400_2_086A0040
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A60280_2_086A6028
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A003B0_2_086A003B
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A601A0_2_086A601A
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A56A90_2_086A56A9
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 0_2_086A67400_2_086A6740
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_0121A0582_2_0121A058
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_01215F202_2_01215F20
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_0121CBE02_2_0121CBE0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012172072_2_01217207
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012144F82_2_012144F8
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012133302_2_01213330
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012200402_2_01220040
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_0122CF102_2_0122CF10
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012283E02_2_012283E0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012216702_2_01221670
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_0122D9702_2_0122D970
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_0122D8702_2_0122D870
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_01225A472_2_01225A47
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_01224AE32_2_01224AE3
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_01225AC02_2_01225AC0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_02C747B42_2_02C747B4
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_02C75D082_2_02C75D08
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_02C769F12_2_02C769F1
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_02C75CF82_2_02C75CF8
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_064F23B02_2_064F23B0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_064F00402_2_064F0040
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_064F19582_2_064F1958
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_064F0DA82_2_064F0DA8
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_065E2AF02_2_065E2AF0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_065E3E042_2_065E3E04
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_065EA2392_2_065EA239
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_0248AF086_2_0248AF08
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_0248C1B86_2_0248C1B8
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_0248DE286_2_0248DE28
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_025020706_2_02502070
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_025028386_2_02502838
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_025020616_2_02502061
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_02501AC06_2_02501AC0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_02501AAF6_2_02501AAF
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_025028286_2_02502828
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_025068F06_2_025068F0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_025068EC6_2_025068EC
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_08349E986_2_08349E98
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_083460286_2_08346028
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_0834601A6_2_0834601A
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_083400066_2_08340006
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_083400406_2_08340040
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_08344B376_2_08344B37
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 6_2_083456A96_2_083456A9
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EFAEE07_2_00EFAEE0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EFF6707_2_00EFF670
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EFCA587_2_00EFCA58
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EF45687_2_00EF4568
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EF55607_2_00EF5560
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EF7F117_2_00EF7F11
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EF00407_2_00EF0040
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EFD3B87_2_00EFD3B8
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F0A0587_2_00F0A058
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F060307_2_00F06030
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F0CD917_2_00F0CD91
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F0D14F7_2_00F0D14F
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F072077_2_00F07207
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F033307_2_00F03330
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_010F47B47_2_010F47B4
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_010F5D087_2_010F5D08
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_010F69F17_2_010F69F1
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_010F5C207_2_010F5C20
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_0565BDC17_2_0565BDC1
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_0565C3F87_2_0565C3F8
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_05653D507_2_05653D50
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_056549687_2_05654968
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_056540987_2_05654098
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_05F317D87_2_05F317D8
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_05F30D807_2_05F30D80
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_05F300407_2_05F30040
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_0154C1B88_2_0154C1B8
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F420708_2_04F42070
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F428388_2_04F42838
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F420618_2_04F42061
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F468F08_2_04F468F0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F468E08_2_04F468E0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F428288_2_04F42828
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F41AC08_2_04F41AC0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_04F41AAF8_2_04F41AAF
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_09CD9E988_2_09CD9E98
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_09CD00408_2_09CD0040
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_09CD601B8_2_09CD601B
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_09CD60288_2_09CD6028
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_09CD003F8_2_09CD003F
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 8_2_09CD56A98_2_09CD56A9
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_014647B49_2_014647B4
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_01465D089_2_01465D08
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_014669F19_2_014669F1
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_01465CC19_2_01465CC1
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B80119_2_015B8011
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B45689_2_015B4568
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015BF6709_2_015BF670
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015BCC6A9_2_015BCC6A
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B7F289_2_015B7F28
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B00409_2_015B0040
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015BD3C89_2_015BD3C8
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B55609_2_015B5560
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B46669_2_015B4666
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015C60309_2_015C6030
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015C72079_2_015C7207
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015C9F789_2_015C9F78
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015CCEE09_2_015CCEE0
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015C33309_2_015C3330
          Source: rwzBBMVxUb.exeBinary or memory string: OriginalFilename vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1750084173.00000000029B0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTimeSpan.dll2 vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000000.1672709866.00000000000D2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTokeniz.exeF vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1748666635.000000000076E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTimeSpan.dll2 vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1762903949.0000000007020000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSinkProvider.dllB vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCIBEOIBROQOECByykQuGv.exe4 vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCIBEOIBROQOECByykQuGv.exe4 vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSinkProvider.dllB vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000002.00000002.4140278542.0000000000EF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exe, 00000002.00000002.4139303062.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCIBEOIBROQOECByykQuGv.exe4 vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exeBinary or memory string: OriginalFilenameTokeniz.exeF vs rwzBBMVxUb.exe
          Source: rwzBBMVxUb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 9.2.qXLPL.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 6.2.qXLPL.exe.2a1a5a0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 00000002.00000002.4139303062.0000000000403000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 00000002.00000002.4139303062.0000000000433000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 00000009.00000002.4139300989.0000000000432000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 00000009.00000002.4156381468.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_f2a90d14 reference_sample = ed43ddb536e6c3f8513213cd6eb2e890b73e26d5543c0ba1deb2690b5c0385b6, os = windows, severity = x86, creation_date = 2022-03-11, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = 829c827069846ba1e1378aba8ee6cdc801631d769dc3dce15ccaacd4068a88a6, id = f2a90d14-7212-41a5-a2cd-a6a6dedce96e, last_modified = 2022-04-12
          Source: Process Memory Space: rwzBBMVxUb.exe PID: 6256, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: Process Memory Space: qXLPL.exe PID: 5228, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: Process Memory Space: qXLPL.exe PID: 2056, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
          Source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
          Source: rwzBBMVxUb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: qXLPL.exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, Q6j.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, Q6j.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.csCryptographic APIs: 'TransformFinalBlock'
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, hU.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, hU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, hU.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, hU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, YF.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, YF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, YF.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, YF.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, YF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, YF.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, YF.csSecurity API names: System.IO.DirectoryInfo.SetAccessControl(System.Security.AccessControl.DirectorySecurity)
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, YF.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, YF.csSecurity API names: System.Security.AccessControl.FileSystemSecurity.AddAccessRule(System.Security.AccessControl.FileSystemAccessRule)
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, hU.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, hU.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/7@3/0
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rwzBBMVxUb.exe.logJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMutant created: NULL
          Source: rwzBBMVxUb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: rwzBBMVxUb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: rwzBBMVxUb.exe, 00000002.00000002.4151129136.00000000030EA000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002EDB000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.000000000351B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: rwzBBMVxUb.exeReversingLabs: Detection: 89%
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile read: C:\Users\user\Desktop\rwzBBMVxUb.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\rwzBBMVxUb.exe "C:\Users\user\Desktop\rwzBBMVxUb.exe"
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess created: C:\Users\user\Desktop\rwzBBMVxUb.exe "C:\Users\user\Desktop\rwzBBMVxUb.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
          Source: unknownProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess created: C:\Users\user\Desktop\rwzBBMVxUb.exe "C:\Users\user\Desktop\rwzBBMVxUb.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: rwzBBMVxUb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: rwzBBMVxUb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, Q6j.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, Q6j.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, Q6j.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
          Source: 0.2.rwzBBMVxUb.exe.7020000.2.raw.unpack, YF.cs.Net Code: M4V System.Reflection.Assembly.Load(byte[])
          Source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, B.cs.Net Code: A System.Reflection.Assembly.Load(byte[])
          Source: 0.2.rwzBBMVxUb.exe.2310000.0.raw.unpack, EO.cs.Net Code: hF System.AppDomain.Load(byte[])
          Source: 0.2.rwzBBMVxUb.exe.29b1258.1.raw.unpack, EO.cs.Net Code: hF System.AppDomain.Load(byte[])
          Source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, YF.cs.Net Code: M4V System.Reflection.Assembly.Load(byte[])
          Source: 6.2.qXLPL.exe.2a1a5a0.0.raw.unpack, EO.cs.Net Code: hF System.AppDomain.Load(byte[])
          Source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, YF.cs.Net Code: M4V System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_0121C14E push es; ret 2_2_0121C150
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_01213735 pushfd ; retf 2_2_01213741
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_012210C2 push esp; ret 2_2_01221111
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_064F4228 push esp; ret 2_2_064F4271
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EFC8FA push eax; iretd 7_2_00EFC8FD
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00EF0C12 push esp; ret 7_2_00EF0C61
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F02177 push edi; retn 0000h7_2_00F02179
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_00F0373D pushfd ; retf 7_2_00F03741
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 7_2_05F3364A push esp; ret 7_2_05F33699
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015BC8FA push eax; iretd 9_2_015BC8FD
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015B0C12 push esp; ret 9_2_015B0C61
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeCode function: 9_2_015C2177 push edi; retn 0000h9_2_015C2179
          Source: rwzBBMVxUb.exeStatic PE information: section name: .text entropy: 7.429122512994657
          Source: qXLPL.exe.2.drStatic PE information: section name: .text entropy: 7.429122512994657
          Source: 0.2.rwzBBMVxUb.exe.2310000.0.raw.unpack, EO.csHigh entropy of concatenated method names: 'Dispose', 'R6', 'hF', 'op', 'cI', 'pW', 'oE', 'Sx', 'BM', 'kq'
          Source: 0.2.rwzBBMVxUb.exe.29b1258.1.raw.unpack, EO.csHigh entropy of concatenated method names: 'Dispose', 'R6', 'hF', 'op', 'cI', 'pW', 'oE', 'Sx', 'BM', 'kq'
          Source: 6.2.qXLPL.exe.2a1a5a0.0.raw.unpack, EO.csHigh entropy of concatenated method names: 'Dispose', 'R6', 'hF', 'op', 'cI', 'pW', 'oE', 'Sx', 'BM', 'kq'
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeJump to dropped file
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run qXLPLJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run qXLPLJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: icon (126).png
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile opened: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe:Zone.Identifier read attributes | deleteJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 6.2.qXLPL.exe.2a1a5a0.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2061546845.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rwzBBMVxUb.exe PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 5228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 2056, type: MEMORYSTR
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: rwzBBMVxUb.exe, 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000006.00000002.2061546845.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: rwzBBMVxUb.exe, 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000006.00000002.2061546845.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 22C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 2580000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 22C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 8640000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 6C00000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 9640000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: A640000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: AA40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: BA40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 2DB0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: 4DB0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 980000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 2610000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 7FD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 6970000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 8FD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 9FD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: A390000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: B390000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: A390000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 10B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 2BA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 12A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 2EE0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 4EE0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 8BF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 7390000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 9BF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: ABF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: AFD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: BFD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 1420000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory allocated: 1680000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWindow / User API: threadDelayed 1517Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWindow / User API: threadDelayed 8340Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWindow / User API: threadDelayed 3178Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWindow / User API: threadDelayed 6655Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWindow / User API: threadDelayed 3088Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWindow / User API: threadDelayed 6748Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exe TID: 6520Thread sleep time: -48805s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exe TID: 6456Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exe TID: 6652Thread sleep time: -26747778906878833s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exe TID: 6424Thread sleep count: 1517 > 30Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exe TID: 6424Thread sleep count: 8340 > 30Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 2208Thread sleep time: -59082s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 7100Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6364Thread sleep count: 39 > 30Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6364Thread sleep time: -35971150943733603s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6376Thread sleep count: 3178 > 30Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6376Thread sleep count: 6655 > 30Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 1880Thread sleep time: -53376s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 3552Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6956Thread sleep count: 39 > 30Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6956Thread sleep time: -35971150943733603s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6988Thread sleep count: 3088 > 30Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe TID: 6988Thread sleep count: 6748 > 30Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeThread delayed: delay time: 48805Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 59082Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 53376Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: qXLPL.exe, 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: qXLPL.exe, 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: qXLPL.exe, 00000009.00000002.4198958338.00000000069C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllr
          Source: rwzBBMVxUb.exe, qXLPL.exe.2.drBinary or memory string: 385eGEzfv<pf385eG<IgogJD3Y6e8IJWo4Zg}YpXDTKhoU4[3Y5fDj[]n8ZVlIJYiU[]}ET]9o5XiU[]}Ez]xo5gkMKUx3Z]3Q[hWET]9o5XDXZek83[3Y5fDXJelI5fyE6fsUXVDL[]xoZ\385eGoHD}gpesUKgoQIDtYIDdsJD}gpesUKgoQ4[3Y5]DTKe4Ip]oUHD[UIDOMID}jIDnYphs85e|k5\xo6XDX5fkM3fq8Zd3U[]WETU}EDgvY[\pYJUiU[]qET]m8Z\3QqeMUKe4Ip]oUJD]gKD}{Z\4I[UoQpeoM[]pYpXDXI]DnKel4Z]}Q[TDnKel4Z]}Q[TiU[]qEjeyoJgks[dvIp\y{5Ux3Z]3Q[hWEzep8ZVoM[g3{ZgGEzfoQpf4<5foMoOwYJg}o6XDL[]qIpek4X]mM[gyQ[]VEz\xEDdP<HD7{XgDXZgvIpYiU[]}ET]4{
          Source: qXLPL.exe, 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: rwzBBMVxUb.exe, 00000002.00000002.4196267618.00000000065F0000.00000004.00000020.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4140934304.0000000000DFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: qXLPL.exe, 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeCode function: 2_2_01227B30 LdrInitializeThunk,2_2_01227B30
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeMemory written: C:\Users\user\Desktop\rwzBBMVxUb.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory written: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeMemory written: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeProcess created: C:\Users\user\Desktop\rwzBBMVxUb.exe "C:\Users\user\Desktop\rwzBBMVxUb.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeProcess created: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe "C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Users\user\Desktop\rwzBBMVxUb.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Users\user\Desktop\rwzBBMVxUb.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rwzBBMVxUb.exe PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 5228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 2056, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTR
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: C:\Users\user\Desktop\rwzBBMVxUb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: Yara matchFile source: 00000009.00000002.4156381468.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.97f7148.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3f8a5b0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3fe65d0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a6af208.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a60e5c8.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.qXLPL.exe.3ee9970.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.qXLPL.exe.a56d9a8.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.97f7148.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.96f9098.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.rwzBBMVxUb.exe.969d078.5.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: rwzBBMVxUb.exe PID: 6256, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: rwzBBMVxUb.exe PID: 7080, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 5228, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 3052, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 2056, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: qXLPL.exe PID: 6548, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          Registry Run Keys / Startup Folder
          111
          Process Injection
          11
          Masquerading
          2
          OS Credential Dumping
          311
          Security Software Discovery
          Remote Services1
          Email Collection
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Registry Run Keys / Startup Folder
          1
          Disable or Modify Tools
          1
          Credentials in Registry
          1
          Process Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          1
          Non-Application Layer Protocol
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          141
          Virtualization/Sandbox Evasion
          Security Account Manager141
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares2
          Data from Local System
          1
          Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          File and Directory Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Hidden Files and Directories
          Cached Domain Credentials24
          System Information Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
          Obfuscated Files or Information
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job22
          Software Packing
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          DLL Side-Loading
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559434 Sample: rwzBBMVxUb.exe Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 29 smtp.alruomigroup.com 2->29 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Antivirus / Scanner detection for submitted sample 2->45 47 9 other signatures 2->47 7 rwzBBMVxUb.exe 3 2->7         started        11 qXLPL.exe 3 2->11         started        13 qXLPL.exe 2 2->13         started        signatures3 process4 file5 23 C:\Users\user\AppData\...\rwzBBMVxUb.exe.log, ASCII 7->23 dropped 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->49 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->51 53 Injects a PE file into a foreign processes 7->53 15 rwzBBMVxUb.exe 1 10 7->15         started        55 Antivirus detection for dropped file 11->55 57 Multi AV Scanner detection for dropped file 11->57 59 Machine Learning detection for dropped file 11->59 19 qXLPL.exe 7 11->19         started        21 qXLPL.exe 7 13->21         started        signatures6 process7 file8 25 C:\Users\user\AppData\Roaming\...\qXLPL.exe, PE32 15->25 dropped 27 C:\Users\user\...\qXLPL.exe:Zone.Identifier, ASCII 15->27 dropped 31 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->31 33 Tries to steal Mail credentials (via file / registry access) 15->33 35 Hides that the sample has been downloaded from the Internet (zone.identifier) 15->35 37 Tries to harvest and steal ftp login credentials 21->37 39 Tries to harvest and steal browser information (history, passwords, etc) 21->39 signatures9

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          rwzBBMVxUb.exe89%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          rwzBBMVxUb.exe100%AviraHEUR/AGEN.1306098
          rwzBBMVxUb.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe100%AviraHEUR/AGEN.1306098
          C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe89%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
          http://DynDns.comDynDNS0%Avira URL Cloudsafe
          https://409Yv1c1gFV6m.comL:0%Avira URL Cloudsafe
          http://DhvEkZ.com0%Avira URL Cloudsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%Avira URL Cloudsafe
          https://409Yv1c1gFV6m.com0%Avira URL Cloudsafe
          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%Avira URL Cloudsafe
          https://409Yv1c1gFV6m.comt-0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          smtp.alruomigroup.com
          unknown
          unknowntrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://127.0.0.1:HTTP/1.1rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.00000000031E5000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.comrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designersGrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://DynDns.comDynDNSqXLPL.exe, 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.fontbureau.com/designers/?rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://DhvEkZ.comqXLPL.exe, 00000009.00000002.4156381468.00000000031E1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.founder.com.cn/cn/bTherwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%harwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.00000000031E5000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers?rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.tiro.comrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designersrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.goodfont.co.krrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://409Yv1c1gFV6m.comt-rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000003135000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4153154447.0000000002F27000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000009.00000002.4156381468.0000000003567000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.carterandcone.comlrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sajatypeworks.comrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.typography.netDrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers/cabarga.htmlNrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.founder.com.cn/cn/cTherwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.galapagosdesign.com/staff/dennis.htmrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.founder.com.cn/cnrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers/frere-user.htmlrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://409Yv1c1gFV6m.comL:rwzBBMVxUb.exe, 00000002.00000002.4151129136.0000000003135000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://409Yv1c1gFV6m.comqXLPL.exe, 00000009.00000002.4156381468.0000000003567000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.jiyu-kobo.co.jp/rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.galapagosdesign.com/DPleaserwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.fontbureau.com/designers8rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fonts.comrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.sandoll.co.krrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.urwpp.deDPleaserwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.zhongyicts.com.cnrwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namerwzBBMVxUb.exe, 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000006.00000002.2061546845.0000000002611000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000008.00000002.2151775959.0000000002EE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sakkal.comrwzBBMVxUb.exe, 00000000.00000002.1761494966.0000000004F80000.00000004.00000020.00020000.00000000.sdmp, rwzBBMVxUb.exe, 00000000.00000002.1761567154.0000000006722000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziprwzBBMVxUb.exe, 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, qXLPL.exe, 00000007.00000002.4139305912.0000000000434000.00000040.00000400.00020000.00000000.sdmp, qXLPL.exe, 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                No contacted IP infos
                                                                Joe Sandbox version:41.0.0 Charoite
                                                                Analysis ID:1559434
                                                                Start date and time:2024-11-20 14:46:07 +01:00
                                                                Joe Sandbox product:CloudBasic
                                                                Overall analysis duration:0h 10m 50s
                                                                Hypervisor based Inspection enabled:false
                                                                Report type:full
                                                                Cookbook file name:default.jbs
                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                Number of analysed new started processes analysed:11
                                                                Number of new started drivers analysed:0
                                                                Number of existing processes analysed:0
                                                                Number of existing drivers analysed:0
                                                                Number of injected processes analysed:0
                                                                Technologies:
                                                                • HCA enabled
                                                                • EGA enabled
                                                                • AMSI enabled
                                                                Analysis Mode:default
                                                                Analysis stop reason:Timeout
                                                                Sample name:rwzBBMVxUb.exe
                                                                renamed because original name is a hash value
                                                                Original Sample Name:4f28687d01e29f37854b840c3f5f0fe2cd506c87d4f7b036bdddcd147dc2cbc3.exe
                                                                Detection:MAL
                                                                Classification:mal100.troj.spyw.evad.winEXE@9/7@3/0
                                                                EGA Information:
                                                                • Successful, ratio: 100%
                                                                HCA Information:
                                                                • Successful, ratio: 97%
                                                                • Number of executed functions: 345
                                                                • Number of non-executed functions: 16
                                                                Cookbook Comments:
                                                                • Found application associated with file extension: .exe
                                                                • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                • Not all processes where analyzed, report is missing behavior information
                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                • VT rate limit hit for: rwzBBMVxUb.exe
                                                                TimeTypeDescription
                                                                08:47:05API Interceptor5338802x Sleep call for process: rwzBBMVxUb.exe modified
                                                                08:47:36API Interceptor6350514x Sleep call for process: qXLPL.exe modified
                                                                13:47:23AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run qXLPL C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                13:47:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run qXLPL C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                No context
                                                                Process:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1314
                                                                Entropy (8bit):5.3387892510515025
                                                                Encrypted:false
                                                                SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4sAmE4Ks:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzeL
                                                                MD5:8C61F9E2B19E0315722C135D70192939
                                                                SHA1:BFC216104805B4183FD0A9153EE0B39076AECCBC
                                                                SHA-256:AFA04F5408E6285A7B01334D40EA524ADB37116790061849F4D6B48D880D93A0
                                                                SHA-512:55CC4879F5AC9C5BDB659D0DC915102B39BC2035CF1C3CADBF3BE6A4447B5613A9D665FC06AD3F461803D04495AAD5EAB0758C02B8F110090FF6F791B80B270D
                                                                Malicious:false
                                                                Reputation:moderate, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                Process:C:\Users\user\Desktop\rwzBBMVxUb.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1314
                                                                Entropy (8bit):5.3387892510515025
                                                                Encrypted:false
                                                                SSDEEP:24:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4sAmE4Ks:MgvjHK5HKH1qHiYHKh3oPtHo6hAHKzeL
                                                                MD5:8C61F9E2B19E0315722C135D70192939
                                                                SHA1:BFC216104805B4183FD0A9153EE0B39076AECCBC
                                                                SHA-256:AFA04F5408E6285A7B01334D40EA524ADB37116790061849F4D6B48D880D93A0
                                                                SHA-512:55CC4879F5AC9C5BDB659D0DC915102B39BC2035CF1C3CADBF3BE6A4447B5613A9D665FC06AD3F461803D04495AAD5EAB0758C02B8F110090FF6F791B80B270D
                                                                Malicious:true
                                                                Reputation:moderate, very likely benign file
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                                                Process:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                Category:modified
                                                                Size (bytes):98304
                                                                Entropy (8bit):0.08235737944063153
                                                                Encrypted:false
                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\rwzBBMVxUb.exe
                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                Category:modified
                                                                Size (bytes):98304
                                                                Entropy (8bit):0.08235737944063153
                                                                Encrypted:false
                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                Malicious:false
                                                                Reputation:high, very likely benign file
                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                Process:C:\Users\user\Desktop\rwzBBMVxUb.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):944128
                                                                Entropy (8bit):7.436151130326397
                                                                Encrypted:false
                                                                SSDEEP:12288:rXN5GnTOdU+CHpZgWWGTULgUGDc1B7YxdSI53JBQnKoWq1RAazOVKYe/+YfiLHks:ePUsVWZYQKoh1OKffi4nO8F8z
                                                                MD5:5B65ABB4776D7BAE7624C3085A5A227A
                                                                SHA1:7EEDB005B4E3A79AA4482F8FE04C16EE4490BFB6
                                                                SHA-256:4F28687D01E29F37854B840C3F5F0FE2CD506C87D4F7B036BDDDCD147DC2CBC3
                                                                SHA-512:0950B2D6597EDC91CA41F54C368DC2CEF78827A5BE23D056A90D2459639763929365CF926FF219A4884925E3AE79B360F55C98B8F909C34236890AC26F60FBA6
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 89%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v.`..............P..\...........{... ........@.. ....................................@..................................z..O.................................................................................... ............... ..H............text....[... ...\.................. ..`.rsrc................^..............@..@.reloc...............f..............@..B.................z......H...........D2...........................................................0............(....(..........(.....o.....*.....................( ......(!......("......(#......($....*N..(....o....(%....*&..(&....*.s'........s(........s)........s*........s+........*....0...........~....o,....+..*.0...........~....o-....+..*.0...........~....o.....+..*.0...........~....o/....+..*.0...........~....o0....+..*.0..<........~.....(1.....,!r...p.....(2...o3...s4............~.....+..*.0......
                                                                Process:C:\Users\user\Desktop\rwzBBMVxUb.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):26
                                                                Entropy (8bit):3.95006375643621
                                                                Encrypted:false
                                                                SSDEEP:3:ggPYV:rPYV
                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                Malicious:true
                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                Process:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                                Category:modified
                                                                Size (bytes):98304
                                                                Entropy (8bit):0.08235737944063153
                                                                Encrypted:false
                                                                SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                                MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                                SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                                SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                                SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                                Malicious:false
                                                                Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Entropy (8bit):7.436151130326397
                                                                TrID:
                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                File name:rwzBBMVxUb.exe
                                                                File size:944'128 bytes
                                                                MD5:5b65abb4776d7bae7624c3085a5a227a
                                                                SHA1:7eedb005b4e3a79aa4482f8fe04c16ee4490bfb6
                                                                SHA256:4f28687d01e29f37854b840c3f5f0fe2cd506c87d4f7b036bdddcd147dc2cbc3
                                                                SHA512:0950b2d6597edc91ca41f54c368dc2cef78827a5be23d056a90d2459639763929365cf926ff219a4884925e3ae79b360f55c98b8f909c34236890ac26f60fba6
                                                                SSDEEP:12288:rXN5GnTOdU+CHpZgWWGTULgUGDc1B7YxdSI53JBQnKoWq1RAazOVKYe/+YfiLHks:ePUsVWZYQKoh1OKffi4nO8F8z
                                                                TLSH:02159C6C23FEA109F237FE709FA1F3449E667A769225914D59C4120B5832D80FEB7932
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....v.`..............P..\...........{... ........@.. ....................................@................................
                                                                Icon Hash:2567a3a3aeb7bdbf
                                                                Entrypoint:0x4d7b12
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x60ED76D8 [Tue Jul 13 11:19:52 2021 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:4
                                                                OS Version Minor:0
                                                                File Version Major:4
                                                                File Version Minor:0
                                                                Subsystem Version Major:4
                                                                Subsystem Version Minor:0
                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                Instruction
                                                                jmp dword ptr [00402000h]
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                add byte ptr [eax], al
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd7ac00x4f.text
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd80000x107ac.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000xc.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x20000xd5b180xd5c004da0b4d6facee6e668c52da1d101ea88False0.8046543768274854data7.429122512994657IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rsrc0xd80000x107ac0x108006e3030b5a9ce7c6d06ec1a43cfc2db5eFalse0.7963275331439394data7.311313120676684IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0xea0000xc0x20056794fc9c25eb99063ac63bbded59953False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                RT_ICON0xd82680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.30913978494623656
                                                                RT_ICON0xd85500x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5168918918918919
                                                                RT_ICON0xd86780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.542910447761194
                                                                RT_ICON0xd95200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.6728339350180506
                                                                RT_ICON0xd9dc80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.4718208092485549
                                                                RT_ICON0xda3300xa5e1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9953608854350642
                                                                RT_ICON0xe49140x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.3887966804979253
                                                                RT_ICON0xe6ebc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.4575515947467167
                                                                RT_ICON0xe7f640x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6108156028368794
                                                                RT_GROUP_ICON0xe83cc0x84data0.6136363636363636
                                                                RT_VERSION0xe84500x35cdata0.436046511627907
                                                                DLLImport
                                                                mscoree.dll_CorExeMain
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Nov 20, 2024 14:48:30.759108067 CET6489053192.168.2.41.1.1.1
                                                                Nov 20, 2024 14:48:30.990767956 CET53648901.1.1.1192.168.2.4
                                                                Nov 20, 2024 14:49:03.152272940 CET6088353192.168.2.41.1.1.1
                                                                Nov 20, 2024 14:49:03.297022104 CET53608831.1.1.1192.168.2.4
                                                                Nov 20, 2024 14:49:11.266334057 CET6070353192.168.2.41.1.1.1
                                                                Nov 20, 2024 14:49:11.408420086 CET53607031.1.1.1192.168.2.4
                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                Nov 20, 2024 14:48:30.759108067 CET192.168.2.41.1.1.10xae46Standard query (0)smtp.alruomigroup.comA (IP address)IN (0x0001)false
                                                                Nov 20, 2024 14:49:03.152272940 CET192.168.2.41.1.1.10x4167Standard query (0)smtp.alruomigroup.comA (IP address)IN (0x0001)false
                                                                Nov 20, 2024 14:49:11.266334057 CET192.168.2.41.1.1.10xe84fStandard query (0)smtp.alruomigroup.comA (IP address)IN (0x0001)false
                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                Nov 20, 2024 14:48:30.990767956 CET1.1.1.1192.168.2.40xae46Name error (3)smtp.alruomigroup.comnonenoneA (IP address)IN (0x0001)false
                                                                Nov 20, 2024 14:49:03.297022104 CET1.1.1.1192.168.2.40x4167Name error (3)smtp.alruomigroup.comnonenoneA (IP address)IN (0x0001)false
                                                                Nov 20, 2024 14:49:11.408420086 CET1.1.1.1192.168.2.40xe84fName error (3)smtp.alruomigroup.comnonenoneA (IP address)IN (0x0001)false

                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:08:46:57
                                                                Start date:20/11/2024
                                                                Path:C:\Users\user\Desktop\rwzBBMVxUb.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\rwzBBMVxUb.exe"
                                                                Imagebase:0xd0000
                                                                File size:944'128 bytes
                                                                MD5 hash:5B65ABB4776D7BAE7624C3085A5A227A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000000.00000002.1764563340.0000000009641000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.1750084173.0000000002581000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:08:47:05
                                                                Start date:20/11/2024
                                                                Path:C:\Users\user\Desktop\rwzBBMVxUb.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\rwzBBMVxUb.exe"
                                                                Imagebase:0xa30000
                                                                File size:944'128 bytes
                                                                MD5 hash:5B65ABB4776D7BAE7624C3085A5A227A
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000002.00000002.4139303062.0000000000403000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000002.00000002.4139303062.0000000000433000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000002.00000002.4151129136.0000000002DB1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:6
                                                                Start time:08:47:31
                                                                Start date:20/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
                                                                Imagebase:0x130000
                                                                File size:944'128 bytes
                                                                MD5 hash:5B65ABB4776D7BAE7624C3085A5A227A
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000006.00000002.2083524321.000000000A391000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000006.00000002.2061546845.00000000028EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                • Detection: 89%, ReversingLabs
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:08:47:36
                                                                Start date:20/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
                                                                Imagebase:0x760000
                                                                File size:944'128 bytes
                                                                MD5 hash:5B65ABB4776D7BAE7624C3085A5A227A
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000007.00000002.4153154447.0000000002BA1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:low
                                                                Has exited:false

                                                                Target ID:8
                                                                Start time:08:47:39
                                                                Start date:20/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
                                                                Imagebase:0xbf0000
                                                                File size:944'128 bytes
                                                                MD5 hash:5B65ABB4776D7BAE7624C3085A5A227A
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.2151775959.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: Windows_Trojan_AgentTesla_f2a90d14, Description: unknown, Source: 00000008.00000002.2165298001.0000000003EE9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:08:47:45
                                                                Start date:20/11/2024
                                                                Path:C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\AppData\Roaming\qXLPL\qXLPL.exe"
                                                                Imagebase:0xcc0000
                                                                File size:944'128 bytes
                                                                MD5 hash:5B65ABB4776D7BAE7624C3085A5A227A
                                                                Has elevated privileges:false
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000009.00000002.4139300989.0000000000432000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.4156381468.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000009.00000002.4156381468.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                Reputation:low
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:11.7%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:1.6%
                                                                  Total number of Nodes:187
                                                                  Total number of Limit Nodes:12
                                                                  execution_graph 31892 86a9488 31893 86a9613 31892->31893 31894 86a94ae 31892->31894 31894->31893 31897 86a9708 PostMessageW 31894->31897 31899 86a9700 PostMessageW 31894->31899 31898 86a9774 31897->31898 31898->31894 31900 86a9774 31899->31900 31900->31894 31960 86a7c18 31961 86a7ca1 31960->31961 31961->31961 31962 86a7e06 CreateProcessA 31961->31962 31963 86a7e63 31962->31963 31841 4a35460 31843 4a35487 31841->31843 31842 4a35564 31842->31842 31843->31842 31845 4a3476c 31843->31845 31846 4a358e0 CreateActCtxA 31845->31846 31848 4a359a3 31846->31848 31901 236fad0 31902 236fb38 CreateWindowExW 31901->31902 31904 236fbf4 31902->31904 31964 2367540 31965 2367586 GetCurrentProcess 31964->31965 31967 23675d1 31965->31967 31968 23675d8 GetCurrentThread 31965->31968 31967->31968 31969 2367615 GetCurrentProcess 31968->31969 31970 236760e 31968->31970 31971 236764b 31969->31971 31970->31969 31972 2367673 GetCurrentThreadId 31971->31972 31973 23676a4 31972->31973 31974 86a7fd0 31976 86a7ff2 31974->31976 31975 86a84b6 31976->31975 31978 86a8516 31976->31978 31979 86a8532 31978->31979 31987 86a8d80 31979->31987 32001 86a8d53 31979->32001 32006 86a90e2 31979->32006 32014 86a8a7f 31979->32014 32019 86a8a54 31979->32019 32024 86a8b91 31979->32024 31980 86a8559 31980->31976 31989 86a8d91 31987->31989 31988 86a8e37 31990 86a8af6 31988->31990 31993 86a78f8 WriteProcessMemory 31988->31993 31994 86a7900 WriteProcessMemory 31988->31994 31989->31988 32046 86a7900 31989->32046 32050 86a78f8 31989->32050 31990->31980 31990->31990 31991 86a8eeb 31991->31990 31992 86a8a7a 31991->31992 32054 86a7670 31991->32054 32058 86a7678 31991->32058 31992->31990 32038 86a7598 31992->32038 32042 86a7590 31992->32042 31993->31991 31994->31991 32002 86a8d70 32001->32002 32003 86a9258 32002->32003 32004 86a78f8 WriteProcessMemory 32002->32004 32005 86a7900 WriteProcessMemory 32002->32005 32004->32003 32005->32003 32007 86a90ec 32006->32007 32062 86a7808 32007->32062 32066 86a7810 32007->32066 32008 86a91e2 32009 86a9258 32008->32009 32012 86a78f8 WriteProcessMemory 32008->32012 32013 86a7900 WriteProcessMemory 32008->32013 32012->32009 32013->32009 32015 86a8a99 32014->32015 32017 86a7598 ResumeThread 32015->32017 32018 86a7590 ResumeThread 32015->32018 32016 86a8af6 32016->31980 32016->32016 32017->32016 32018->32016 32020 86a8a5e 32019->32020 32022 86a7598 ResumeThread 32020->32022 32023 86a7590 ResumeThread 32020->32023 32021 86a8af6 32021->31980 32021->32021 32022->32021 32023->32021 32025 86a8ba2 32024->32025 32026 86a8c2c 32025->32026 32034 86a7678 Wow64SetThreadContext 32025->32034 32035 86a7670 Wow64SetThreadContext 32025->32035 32070 86a7a20 32026->32070 32074 86a7a18 32026->32074 32027 86a8d1d 32029 86a8d43 32027->32029 32030 86a7808 VirtualAllocEx 32027->32030 32031 86a7810 VirtualAllocEx 32027->32031 32028 86a91e2 32028->32029 32036 86a78f8 WriteProcessMemory 32028->32036 32037 86a7900 WriteProcessMemory 32028->32037 32030->32028 32031->32028 32034->32026 32035->32026 32036->32029 32037->32029 32039 86a75d8 ResumeThread 32038->32039 32041 86a7609 32039->32041 32041->31990 32043 86a75d8 ResumeThread 32042->32043 32045 86a7609 32043->32045 32045->31990 32047 86a7948 WriteProcessMemory 32046->32047 32049 86a799f 32047->32049 32049->31988 32051 86a7948 WriteProcessMemory 32050->32051 32053 86a799f 32051->32053 32053->31988 32055 86a76bd Wow64SetThreadContext 32054->32055 32057 86a7705 32055->32057 32057->31992 32059 86a76bd Wow64SetThreadContext 32058->32059 32061 86a7705 32059->32061 32061->31992 32063 86a7850 VirtualAllocEx 32062->32063 32065 86a788d 32063->32065 32065->32008 32067 86a7850 VirtualAllocEx 32066->32067 32069 86a788d 32067->32069 32069->32008 32071 86a7a6b ReadProcessMemory 32070->32071 32073 86a7aaf 32071->32073 32073->32027 32075 86a7a6b ReadProcessMemory 32074->32075 32077 86a7aaf 32075->32077 32077->32027 31849 97d01c 31850 97d034 31849->31850 31851 97d08e 31850->31851 31854 4a30c4a 31850->31854 31859 4a30c58 31850->31859 31855 4a30c85 31854->31855 31856 4a30cb7 31855->31856 31864 4a30dd2 31855->31864 31869 4a30de0 31855->31869 31856->31856 31860 4a30c85 31859->31860 31861 4a30cb7 31860->31861 31862 4a30dd2 2 API calls 31860->31862 31863 4a30de0 2 API calls 31860->31863 31861->31861 31862->31861 31863->31861 31866 4a30de0 31864->31866 31865 4a30e80 31865->31856 31874 4a30e88 31866->31874 31877 4a30e98 31866->31877 31871 4a30df4 31869->31871 31870 4a30e80 31870->31856 31872 4a30e88 2 API calls 31871->31872 31873 4a30e98 2 API calls 31871->31873 31872->31870 31873->31870 31875 4a30ea9 31874->31875 31880 4a322d0 31874->31880 31875->31865 31878 4a30ea9 31877->31878 31879 4a322d0 2 API calls 31877->31879 31878->31865 31879->31878 31884 4a322f0 31880->31884 31888 4a32300 31880->31888 31881 4a322ea 31881->31875 31885 4a322ff 31884->31885 31886 4a3239a CallWindowProcW 31885->31886 31887 4a32349 31885->31887 31886->31887 31887->31881 31889 4a32342 31888->31889 31891 4a32349 31888->31891 31890 4a3239a CallWindowProcW 31889->31890 31889->31891 31890->31891 31891->31881 31905 2366d58 31906 2366d68 31905->31906 31907 2366d79 31906->31907 31910 2366db7 31906->31910 31915 2366e7f 31906->31915 31911 2366df2 31910->31911 31912 2366ee9 31911->31912 31920 2367020 31911->31920 31924 2367011 31911->31924 31912->31907 31916 2366e84 31915->31916 31917 2366ee9 31916->31917 31918 2367020 GetModuleHandleW 31916->31918 31919 2367011 GetModuleHandleW 31916->31919 31917->31907 31918->31917 31919->31917 31921 236702d 31920->31921 31922 2367067 31921->31922 31928 2366ab0 31921->31928 31922->31912 31925 236702d 31924->31925 31926 2367067 31925->31926 31927 2366ab0 GetModuleHandleW 31925->31927 31926->31912 31927->31926 31929 2366ab5 31928->31929 31931 2367d80 31929->31931 31932 236721c 31929->31932 31931->31931 31933 2367227 31932->31933 31937 236d108 31933->31937 31943 236d120 31933->31943 31934 2367e29 31934->31931 31939 236d151 31937->31939 31940 236d19e 31937->31940 31938 236d15d 31938->31934 31939->31938 31949 236d488 31939->31949 31952 236d479 31939->31952 31940->31934 31945 236d151 31943->31945 31946 236d19e 31943->31946 31944 236d15d 31944->31934 31945->31944 31947 236d488 GetModuleHandleW 31945->31947 31948 236d479 GetModuleHandleW 31945->31948 31946->31934 31947->31946 31948->31946 31950 236d492 31949->31950 31955 236d4c8 31949->31955 31950->31940 31954 236d4c8 GetModuleHandleW 31952->31954 31953 236d492 31953->31940 31954->31953 31956 236d50c 31955->31956 31957 236d4e9 31955->31957 31956->31950 31957->31956 31958 236d710 GetModuleHandleW 31957->31958 31959 236d73d 31958->31959 31959->31950 32078 2367788 32079 23677df DuplicateHandle 32078->32079 32080 236781e 32079->32080
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e167823e209c97225378b0540c245c1b0e1e0939c0bd1f38f19f89b2401ceda1
                                                                  • Instruction ID: f715a294c1fff004cb31ac0a5d3e4be2f1be929ab2de9fcfb83a22c805f4b407
                                                                  • Opcode Fuzzy Hash: e167823e209c97225378b0540c245c1b0e1e0939c0bd1f38f19f89b2401ceda1
                                                                  • Instruction Fuzzy Hash: CE526C31A006198FCB25CF64C884BAEB7BAFF44308F5584A9E915BB265D770ED85CF90
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 655cdc002a5d92abcc7a1e3cfa6cc62be18b02e285b5dc0c718d1e5b1503ff42
                                                                  • Instruction ID: 8a7f927547546e1365bd7717f5048692cf55e414614acd4bda8c7c4da3b9b602
                                                                  • Opcode Fuzzy Hash: 655cdc002a5d92abcc7a1e3cfa6cc62be18b02e285b5dc0c718d1e5b1503ff42
                                                                  • Instruction Fuzzy Hash: 49C199317006108FDB29DBB5C860B6AB7EBAF89706F14846ED146DB7A4DB35E802CF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6c8b710ba3e2e9f1d4c36e4948a46fd27d0b16b5fd54a820257be9eb9380acaa
                                                                  • Instruction ID: 7ab4c9ced5956d8dbe8d4f7806e6f42b216b5c7c60ee7fc48a599f9002567703
                                                                  • Opcode Fuzzy Hash: 6c8b710ba3e2e9f1d4c36e4948a46fd27d0b16b5fd54a820257be9eb9380acaa
                                                                  • Instruction Fuzzy Hash: 27D11574D05368CFDB14DFA4D5987AEBBB1FB0A306F1094A9D009A32A1DB394E89CF15
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 361a0e52d2a9cd356f57a415811cfb4e7f85b83db301fd8aef2a7e30045339a1
                                                                  • Instruction ID: 705e8335b5547b21273c09226693b05637763f19753216016634683c941738b1
                                                                  • Opcode Fuzzy Hash: 361a0e52d2a9cd356f57a415811cfb4e7f85b83db301fd8aef2a7e30045339a1
                                                                  • Instruction Fuzzy Hash: 27D10474D01368CFDB14DFA5D5987AEBBB1FB0A306F1094A9D009A3291DB394E89CF15
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f573cdfe3e996e2229e21d64f4a059010e6e836a044a5f75a209840c943294b8
                                                                  • Instruction ID: 39129c2b97b9b9e9891f126f66469718c89ed0dfd2bf5863afd64fd54f6b00f5
                                                                  • Opcode Fuzzy Hash: f573cdfe3e996e2229e21d64f4a059010e6e836a044a5f75a209840c943294b8
                                                                  • Instruction Fuzzy Hash: 57911670E012198BDB04DFA9D8547AEBBB2BF88300F14D129E814F7759DB74998ACF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f48ce6250be0e6036e30127812cd0a2695f8e5a464d361b749a6bfe43209019e
                                                                  • Instruction ID: 5c2f638789ddf97ac2e4e2013b2c8ed4782a7a09e1d71444072effdb02ef377f
                                                                  • Opcode Fuzzy Hash: f48ce6250be0e6036e30127812cd0a2695f8e5a464d361b749a6bfe43209019e
                                                                  • Instruction Fuzzy Hash: AF210670D05228DFDB049FA5D848BEDBEF1AB4A302F615029E425B7292CBB85D85CF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f61dea176ae78f8ceb592535fb28ff0bcc273db0e84621c3b976b417005e7dba
                                                                  • Instruction ID: 9c26ebca1ea18480ad8746ecd03c4a95db3d18f6d1f517c7f4b6a1fa1959b1e1
                                                                  • Opcode Fuzzy Hash: f61dea176ae78f8ceb592535fb28ff0bcc273db0e84621c3b976b417005e7dba
                                                                  • Instruction Fuzzy Hash: 47215A70909228DFDB149FA4D448BFDBFF1AB0A302F211069E426B7292CB785D86CF14

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 263 2367507-23675cf GetCurrentProcess 267 23675d1-23675d7 263->267 268 23675d8-236760c GetCurrentThread 263->268 267->268 269 2367615-2367649 GetCurrentProcess 268->269 270 236760e-2367614 268->270 271 2367652-236766d call 236770f 269->271 272 236764b-2367651 269->272 270->269 276 2367673-23676a2 GetCurrentThreadId 271->276 272->271 277 23676a4-23676aa 276->277 278 23676ab-236770d 276->278 277->278
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 023675BE
                                                                  • GetCurrentThread.KERNEL32 ref: 023675FB
                                                                  • GetCurrentProcess.KERNEL32 ref: 02367638
                                                                  • GetCurrentThreadId.KERNEL32 ref: 02367691
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 2d64ed5c08394ff95d9fe5c013f243d7ba85ffd00853047dfb79683278719956
                                                                  • Instruction ID: afb306eee78b457f964d66218be0f8844fafda28b60893c9aae74a7a642cf13e
                                                                  • Opcode Fuzzy Hash: 2d64ed5c08394ff95d9fe5c013f243d7ba85ffd00853047dfb79683278719956
                                                                  • Instruction Fuzzy Hash: DA5156B09002498FDB04CFA9D588BEEBFF1EF49318F248499D049A7265D7349949CF66

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 285 2367540-23675cf GetCurrentProcess 289 23675d1-23675d7 285->289 290 23675d8-236760c GetCurrentThread 285->290 289->290 291 2367615-2367649 GetCurrentProcess 290->291 292 236760e-2367614 290->292 293 2367652-236766d call 236770f 291->293 294 236764b-2367651 291->294 292->291 298 2367673-23676a2 GetCurrentThreadId 293->298 294->293 299 23676a4-23676aa 298->299 300 23676ab-236770d 298->300 299->300
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 023675BE
                                                                  • GetCurrentThread.KERNEL32 ref: 023675FB
                                                                  • GetCurrentProcess.KERNEL32 ref: 02367638
                                                                  • GetCurrentThreadId.KERNEL32 ref: 02367691
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: e2e1610616f0898c9df93e7dd7e03f146ba25f791be1105a7533b4b5ac9cf0fa
                                                                  • Instruction ID: 97746ad1cf3d33736397909fbb09a405b033ad310274fe0d02cd03567dcf727a
                                                                  • Opcode Fuzzy Hash: e2e1610616f0898c9df93e7dd7e03f146ba25f791be1105a7533b4b5ac9cf0fa
                                                                  • Instruction Fuzzy Hash: 485137B0A00249CFDB14DFA9D648BAEFBF5EB48318F20C459D059A7364D7349984CF66

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 429 86a7c0d-86a7cad 431 86a7caf-86a7cb9 429->431 432 86a7ce6-86a7d06 429->432 431->432 433 86a7cbb-86a7cbd 431->433 437 86a7d08-86a7d12 432->437 438 86a7d3f-86a7d6e 432->438 435 86a7cbf-86a7cc9 433->435 436 86a7ce0-86a7ce3 433->436 439 86a7ccb 435->439 440 86a7ccd-86a7cdc 435->440 436->432 437->438 441 86a7d14-86a7d16 437->441 448 86a7d70-86a7d7a 438->448 449 86a7da7-86a7e61 CreateProcessA 438->449 439->440 440->440 442 86a7cde 440->442 443 86a7d18-86a7d22 441->443 444 86a7d39-86a7d3c 441->444 442->436 446 86a7d26-86a7d35 443->446 447 86a7d24 443->447 444->438 446->446 450 86a7d37 446->450 447->446 448->449 451 86a7d7c-86a7d7e 448->451 460 86a7e6a-86a7ef0 449->460 461 86a7e63-86a7e69 449->461 450->444 453 86a7d80-86a7d8a 451->453 454 86a7da1-86a7da4 451->454 455 86a7d8e-86a7d9d 453->455 456 86a7d8c 453->456 454->449 455->455 457 86a7d9f 455->457 456->455 457->454 471 86a7ef2-86a7ef6 460->471 472 86a7f00-86a7f04 460->472 461->460 471->472 475 86a7ef8 471->475 473 86a7f06-86a7f0a 472->473 474 86a7f14-86a7f18 472->474 473->474 476 86a7f0c 473->476 477 86a7f1a-86a7f1e 474->477 478 86a7f28-86a7f2c 474->478 475->472 476->474 477->478 479 86a7f20 477->479 480 86a7f3e-86a7f45 478->480 481 86a7f2e-86a7f34 478->481 479->478 482 86a7f5c 480->482 483 86a7f47-86a7f56 480->483 481->480 484 86a7f5d 482->484 483->482 484->484
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 086A7E4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: f787084533ec3c7124bce4c866eba6054750d5b3b54cc85488c4bfc1071528d0
                                                                  • Instruction ID: 56f51d5edce3d2315b0f37aa05ae52ef8f1bca8d1ed2ec2cd6238e959d203ddf
                                                                  • Opcode Fuzzy Hash: f787084533ec3c7124bce4c866eba6054750d5b3b54cc85488c4bfc1071528d0
                                                                  • Instruction Fuzzy Hash: 22A17B71D00219CFDB24DFA8C840BEEBBB2BF48315F1585AAE849A7344DB749985CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 486 86a7c18-86a7cad 488 86a7caf-86a7cb9 486->488 489 86a7ce6-86a7d06 486->489 488->489 490 86a7cbb-86a7cbd 488->490 494 86a7d08-86a7d12 489->494 495 86a7d3f-86a7d6e 489->495 492 86a7cbf-86a7cc9 490->492 493 86a7ce0-86a7ce3 490->493 496 86a7ccb 492->496 497 86a7ccd-86a7cdc 492->497 493->489 494->495 498 86a7d14-86a7d16 494->498 505 86a7d70-86a7d7a 495->505 506 86a7da7-86a7e61 CreateProcessA 495->506 496->497 497->497 499 86a7cde 497->499 500 86a7d18-86a7d22 498->500 501 86a7d39-86a7d3c 498->501 499->493 503 86a7d26-86a7d35 500->503 504 86a7d24 500->504 501->495 503->503 507 86a7d37 503->507 504->503 505->506 508 86a7d7c-86a7d7e 505->508 517 86a7e6a-86a7ef0 506->517 518 86a7e63-86a7e69 506->518 507->501 510 86a7d80-86a7d8a 508->510 511 86a7da1-86a7da4 508->511 512 86a7d8e-86a7d9d 510->512 513 86a7d8c 510->513 511->506 512->512 514 86a7d9f 512->514 513->512 514->511 528 86a7ef2-86a7ef6 517->528 529 86a7f00-86a7f04 517->529 518->517 528->529 532 86a7ef8 528->532 530 86a7f06-86a7f0a 529->530 531 86a7f14-86a7f18 529->531 530->531 533 86a7f0c 530->533 534 86a7f1a-86a7f1e 531->534 535 86a7f28-86a7f2c 531->535 532->529 533->531 534->535 536 86a7f20 534->536 537 86a7f3e-86a7f45 535->537 538 86a7f2e-86a7f34 535->538 536->535 539 86a7f5c 537->539 540 86a7f47-86a7f56 537->540 538->537 541 86a7f5d 539->541 540->539 541->541
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 086A7E4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: e89a78aaaa3e7cbef1e041509af2a872e2bf89b1a9663248510f4de3f709e0c7
                                                                  • Instruction ID: 3cce40d298872c82aa4f57113614e10930bbf628335df7319ab7a0179266e5f6
                                                                  • Opcode Fuzzy Hash: e89a78aaaa3e7cbef1e041509af2a872e2bf89b1a9663248510f4de3f709e0c7
                                                                  • Instruction Fuzzy Hash: 29917B71D00219CFDB20DFA8C840BEEBBB2BF48315F1585AAE849A7344DB749985CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 875 236d4c8-236d4e7 876 236d513-236d517 875->876 877 236d4e9-236d4f6 call 236c374 875->877 878 236d52b-236d56c 876->878 879 236d519-236d523 876->879 882 236d50c 877->882 883 236d4f8 877->883 886 236d56e-236d576 878->886 887 236d579-236d587 878->887 879->878 882->876 932 236d4fe call 236d770 883->932 933 236d4fe call 236d761 883->933 886->887 889 236d5ab-236d5ad 887->889 890 236d589-236d58e 887->890 888 236d504-236d506 888->882 891 236d648-236d708 888->891 892 236d5b0-236d5b7 889->892 893 236d590-236d597 call 236c380 890->893 894 236d599 890->894 925 236d710-236d73b GetModuleHandleW 891->925 926 236d70a-236d70d 891->926 897 236d5c4-236d5cb 892->897 898 236d5b9-236d5c1 892->898 896 236d59b-236d5a9 893->896 894->896 896->892 900 236d5cd-236d5d5 897->900 901 236d5d8-236d5e1 call 236c390 897->901 898->897 900->901 906 236d5e3-236d5eb 901->906 907 236d5ee-236d5f3 901->907 906->907 908 236d5f5-236d5fc 907->908 909 236d611-236d615 907->909 908->909 911 236d5fe-236d60e call 236c148 call 236c3a0 908->911 930 236d618 call 236da50 909->930 931 236d618 call 236da40 909->931 911->909 914 236d61b-236d61e 916 236d620-236d63e 914->916 917 236d641-236d647 914->917 916->917 927 236d744-236d758 925->927 928 236d73d-236d743 925->928 926->925 928->927 930->914 931->914 932->888 933->888
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0236D72E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 36904a1167fb5d69e75110102e59fcae7f53ec1c15fc76e40d8fecdfbd32bd90
                                                                  • Instruction ID: 55e5f28a8a3ee4b4363d8f526a855bb0bbc4da952f3c70e65fefec614bdc6892
                                                                  • Opcode Fuzzy Hash: 36904a1167fb5d69e75110102e59fcae7f53ec1c15fc76e40d8fecdfbd32bd90
                                                                  • Instruction Fuzzy Hash: EA813570A00B058FD724DF29C4497AABBF5FF88304F10892AD48AD7A54D775E849CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1597 236fad0-236fb36 1598 236fb41-236fb48 1597->1598 1599 236fb38-236fb3e 1597->1599 1600 236fb53-236fbf2 CreateWindowExW 1598->1600 1601 236fb4a-236fb50 1598->1601 1599->1598 1603 236fbf4-236fbfa 1600->1603 1604 236fbfb-236fc33 1600->1604 1601->1600 1603->1604 1608 236fc35-236fc38 1604->1608 1609 236fc40 1604->1609 1608->1609
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0236FBE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 60d7e71675b31d9a2ed650a0cba9f89f8ac8875990559f83b226aa500ab53d46
                                                                  • Instruction ID: 7daece694bcfa66f0a004a7f2ff5f9bc1510d16c4a8337b476e0c9d3e4aa7bf0
                                                                  • Opcode Fuzzy Hash: 60d7e71675b31d9a2ed650a0cba9f89f8ac8875990559f83b226aa500ab53d46
                                                                  • Instruction Fuzzy Hash: 6141CEB1D003499FDB14CFA9D984ADEBBB5FF48314F24852AE819AB214D7709885CF91
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0236780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: c91e0d89a92a1a5a885ef0d89b4fc1a8157f8c453e7567ce88ebab48c543279c
                                                                  • Instruction ID: 8869022eea4cee4f984db99e3fac5dffa41ec8bd4e9dbd5a984bdaea7cb07cca
                                                                  • Opcode Fuzzy Hash: c91e0d89a92a1a5a885ef0d89b4fc1a8157f8c453e7567ce88ebab48c543279c
                                                                  • Instruction Fuzzy Hash: D6419F78E803448FEB08DFA0E458BB97FBAF749304F108829E941AB399DB754816DF11
                                                                  APIs
                                                                  • CreateActCtxA.KERNEL32(?), ref: 04A35991
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1760462005.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_4a30000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: ba9cb6dfd78d21a7786a1f3637eb716abe7bc5e37e372ddd3032f31991374ad4
                                                                  • Instruction ID: 001bc2c1e8c86fb3e3207d34b636b6c27b022a3f7d4811fef55dd1f742a965ee
                                                                  • Opcode Fuzzy Hash: ba9cb6dfd78d21a7786a1f3637eb716abe7bc5e37e372ddd3032f31991374ad4
                                                                  • Instruction Fuzzy Hash: 9141E2B0C00619DFDB24CFA9C8847DEBBF5BF49305F24806AE408AB255EB756946CF91
                                                                  APIs
                                                                  • CreateActCtxA.KERNEL32(?), ref: 04A35991
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1760462005.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_4a30000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: 15130b88f065a0bc4194df80eb91c619beafd3655687eb124df49dea1ba6b68b
                                                                  • Instruction ID: 054cf9ad59a3588080abcb4432d3db2df074d909b3ea3c005d5f72e7389ca78d
                                                                  • Opcode Fuzzy Hash: 15130b88f065a0bc4194df80eb91c619beafd3655687eb124df49dea1ba6b68b
                                                                  • Instruction Fuzzy Hash: 8841DFB0C0061DDFDB24CFA9C844B9EBBF5BF48305F20806AE408AB255EB756949CF91
                                                                  APIs
                                                                  • CreateActCtxA.KERNEL32(?), ref: 04A35991
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1760462005.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_4a30000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Create
                                                                  • String ID:
                                                                  • API String ID: 2289755597-0
                                                                  • Opcode ID: 14174326546f325b89211e33870ead8923661322c8535c1521ac0fa9d0bdd9b0
                                                                  • Instruction ID: a6610093e2d817d07086d1d276e59b5df9a937d9ecda3783060e0db1bae1d3eb
                                                                  • Opcode Fuzzy Hash: 14174326546f325b89211e33870ead8923661322c8535c1521ac0fa9d0bdd9b0
                                                                  • Instruction Fuzzy Hash: 7141D2B0C00619DFDB24CFA9C9447CDBBF5BF49305F24806AE408AB255EB756949CF91
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 04A323C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1760462005.0000000004A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_4a30000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: caa897f6fdfe9668f4ce046e444027156791285b32207866b5b3676e141d4a33
                                                                  • Instruction ID: 09b198f32afe42f6313926aca2b85ea284311ce0eeabf367d8648fd4ce2655fe
                                                                  • Opcode Fuzzy Hash: caa897f6fdfe9668f4ce046e444027156791285b32207866b5b3676e141d4a33
                                                                  • Instruction Fuzzy Hash: 8E4126B5A003098FDB14CF99C448BAAFBF5FB88314F25C499E519AB321D734A845CFA1
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 086A7990
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: cae6e9dd264e129578e87592926f463f39f8e8e399a1b90d615d0a5b562803c9
                                                                  • Instruction ID: f43b675549b89cbc6e913a49618039a69548d62d5ef47832dcf885f72880ce9b
                                                                  • Opcode Fuzzy Hash: cae6e9dd264e129578e87592926f463f39f8e8e399a1b90d615d0a5b562803c9
                                                                  • Instruction Fuzzy Hash: C72157B19003598FDB10CFA9C985BDEBBF1FF48310F10882AE559A7250C7789955CFA4
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 086A7990
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: af0c994b4a64226ae05d51c2ef6e2e474cb552154d91c505da8eef6529c5d96c
                                                                  • Instruction ID: 2f538e618767bb92e24dbecbae0b710799fb0aa0ae87eb6e1cbb12fee9cea567
                                                                  • Opcode Fuzzy Hash: af0c994b4a64226ae05d51c2ef6e2e474cb552154d91c505da8eef6529c5d96c
                                                                  • Instruction Fuzzy Hash: 9B2136B19003599FDB10CFA9C885BDEBBF5FF48310F10842AE958A7250D7789954CFA5
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0236780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 47b6672b8b6da89989dfab6427d1a5b55e98a33576e1e61af0cab1a1adb84208
                                                                  • Instruction ID: b779b131244394c31dac810154086aa1ea583e590ebd0a315ba610e617020014
                                                                  • Opcode Fuzzy Hash: 47b6672b8b6da89989dfab6427d1a5b55e98a33576e1e61af0cab1a1adb84208
                                                                  • Instruction Fuzzy Hash: CF2103B59002089FDB10CFA9D985AEEFFF4FB48324F10841AE918A3310D374A944CFA4
                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 086A7AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: 68d89e74efdfde9d481835159d0ea7a08f09008e2f3396b8a65a21492044dcbf
                                                                  • Instruction ID: 07650477bf367f71b5dc71701d2bfe2006c4119c3d0cc36367135a04a325c62c
                                                                  • Opcode Fuzzy Hash: 68d89e74efdfde9d481835159d0ea7a08f09008e2f3396b8a65a21492044dcbf
                                                                  • Instruction Fuzzy Hash: 1E2148B1D002499FCB10DFA9C980ADEFBF5FF88310F10842AE959A7250C7389954CFA4
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 086A76F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: d92d045179bdd2d7a8ee60ea3eec07e1ad5864dbc82cb2a38144f7200356d077
                                                                  • Instruction ID: 290e8af5849c39397f8ff6a3474089e76a7ca63ad2002c1ad61a08e4895395c2
                                                                  • Opcode Fuzzy Hash: d92d045179bdd2d7a8ee60ea3eec07e1ad5864dbc82cb2a38144f7200356d077
                                                                  • Instruction Fuzzy Hash: CF2138B2D002098FDB10DFAAC5857EEBBF5AF48324F14842ED559A7240C7789945CFA4
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 086A76F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: 06ced9518264b09a5042c99af66dde1504eb564abbf497dd7b22eab463fd79fc
                                                                  • Instruction ID: d933c7735e94f45b94ace755f0db2a9b24453820176da7620ea2e3744ef75666
                                                                  • Opcode Fuzzy Hash: 06ced9518264b09a5042c99af66dde1504eb564abbf497dd7b22eab463fd79fc
                                                                  • Instruction Fuzzy Hash: CB2138B19002098FDB10DFAAC485BEEBBF4EF48324F14842AD459A7241C7789944CFA5
                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 086A7AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: 8622722e7ce6662df222e63d1bab31394ebc5412f2b82c9f7211acf7259233eb
                                                                  • Instruction ID: c4dbe10b108b36dccc374d4160af2f7bd560caa1dfff9173ca3013c4af8bdb50
                                                                  • Opcode Fuzzy Hash: 8622722e7ce6662df222e63d1bab31394ebc5412f2b82c9f7211acf7259233eb
                                                                  • Instruction Fuzzy Hash: 702128B19002599FCB10DFAAC840ADEFBF5FF88310F10842AE559A7250D7349954CFA5
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0236780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 71257a62aaa298c8b8dff12e25072392822b59308a35d6bb1d31328c2d90aba6
                                                                  • Instruction ID: 18bb3b70676987fcfd119a69e3a95a0260e6e90ed3e509ce279767127ddbda61
                                                                  • Opcode Fuzzy Hash: 71257a62aaa298c8b8dff12e25072392822b59308a35d6bb1d31328c2d90aba6
                                                                  • Instruction Fuzzy Hash: 9921E3B59002489FDB10CFAAD984AEEFBF8EB48324F14841AE914A3210D374A940CFA5
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 086A787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 42d44b3ee8c19257e9851bf7004b1526ad460714bac64e52d00769b1835771b1
                                                                  • Instruction ID: d234be5a3220fec56bbf350fc615c23466758d87f08275132cf43e4fcb53ba15
                                                                  • Opcode Fuzzy Hash: 42d44b3ee8c19257e9851bf7004b1526ad460714bac64e52d00769b1835771b1
                                                                  • Instruction Fuzzy Hash: 881156B19002489FCB10DFA9C844ADFBFF5EF88324F20842AE559A7250CB759944CFA4
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 086A787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 152e07726db3c4b3f0ccec09daad577e714155940e250fa94b87994621bfa879
                                                                  • Instruction ID: 1732d482d9ceb6464513b096ed6fb1a9c5a5d1cbf500cb785e903509ee9d38ca
                                                                  • Opcode Fuzzy Hash: 152e07726db3c4b3f0ccec09daad577e714155940e250fa94b87994621bfa879
                                                                  • Instruction Fuzzy Hash: BA1137719002499FCB10DFAAC844BDFBFF5EF88324F108429E559A7250C775A954CFA5
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 81fd944aacc6365887c44c872c31f20794e4c1090be48c877fce78d98f9f70ab
                                                                  • Instruction ID: 201819378e039960d3d0c65311e66d9696e3a62c1a8c5cd15808dd8fe8e0ce7e
                                                                  • Opcode Fuzzy Hash: 81fd944aacc6365887c44c872c31f20794e4c1090be48c877fce78d98f9f70ab
                                                                  • Instruction Fuzzy Hash: AE116DB19002488FDB20DFA9C5457DFFBF5AF88324F10882AD059A7250CB759944CF98
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 8168fcf6bbc846966d4fbdaceb956afaefee0fd6fa7c15b004cfcfa63341e29e
                                                                  • Instruction ID: 9df1a615a0e2bf6ac124627573f5d390e8da658db968ff8bbbdec139c8a91a19
                                                                  • Opcode Fuzzy Hash: 8168fcf6bbc846966d4fbdaceb956afaefee0fd6fa7c15b004cfcfa63341e29e
                                                                  • Instruction Fuzzy Hash: 52113AB19002488FDB10DFAAC4457DEFBF4EF88324F208829D459A7250CB75A944CFA5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0236D72E
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: d5e4d6d62a624e996edc6355a925fa7a8575aafbd5378666beb9887ac16f8d6d
                                                                  • Instruction ID: e37e592c8a337487f8cc2c6f443f7d3d2baf9257edf0b3f0b14194115bd6dec6
                                                                  • Opcode Fuzzy Hash: d5e4d6d62a624e996edc6355a925fa7a8575aafbd5378666beb9887ac16f8d6d
                                                                  • Instruction Fuzzy Hash: 9F1110B5D002498FCB10CF9AC448ADEFBF8AB88324F10C42AD458A7610C375A545CFA5
                                                                  APIs
                                                                  • PostMessageW.USER32(?,?,?,?), ref: 086A9765
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 3484d035c43e4f32c343aa12b59c079f5b473bb3e1c7350f14839db9ae60bdc0
                                                                  • Instruction ID: f42288cda4f5e808a9f833adef54450e96ea50c987baffa26b088c5f1a662416
                                                                  • Opcode Fuzzy Hash: 3484d035c43e4f32c343aa12b59c079f5b473bb3e1c7350f14839db9ae60bdc0
                                                                  • Instruction Fuzzy Hash: 4C11F2B58007489FDB10CF99C585BDEBBF8EB48324F20841AE558A7650C375A944CFA5
                                                                  APIs
                                                                  • PostMessageW.USER32(?,?,?,?), ref: 086A9765
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 2e515b3312216564b00ec658aaf99b11ec81911a88a7ad012693f89f2accd6a9
                                                                  • Instruction ID: 290582edc0f0408b908cc88981a3fe70a54a02f344d83d6867456cb01f1f3ad9
                                                                  • Opcode Fuzzy Hash: 2e515b3312216564b00ec658aaf99b11ec81911a88a7ad012693f89f2accd6a9
                                                                  • Instruction Fuzzy Hash: 7511D0B58003499FDB10DF9AC985BDEBFF8EB48324F20845AE558A7610C375A984CFA5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8bq
                                                                  • API String ID: 0-187764589
                                                                  • Opcode ID: bffc61c584996e5c0b5f0349bdd2c47e96487510044369037e79b528cf04ff84
                                                                  • Instruction ID: 62db55ae2edd2909df95889b1af3585893fc127eaf84b541e3a0d48a7085a405
                                                                  • Opcode Fuzzy Hash: bffc61c584996e5c0b5f0349bdd2c47e96487510044369037e79b528cf04ff84
                                                                  • Instruction Fuzzy Hash: C5B1B274E04228CFDB58DFA9D844B9DBBB6FF59300F20816AD409AB351DB34A989CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Te^q
                                                                  • API String ID: 0-671973202
                                                                  • Opcode ID: 68f1406533d36ec3397085ed2652a40be609b8751e6d4a303c9b25cdd4ecd381
                                                                  • Instruction ID: b371fc910e23af96558a20fa096752675f9fe6637d1094ec8f7aafeb3ec0d9c6
                                                                  • Opcode Fuzzy Hash: 68f1406533d36ec3397085ed2652a40be609b8751e6d4a303c9b25cdd4ecd381
                                                                  • Instruction Fuzzy Hash: 7A112171F002198BCB58EBB999506EFB6F7ABD4314B50406AC505E7244EB35DD09CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1c5ff781e15cdbc412497f6c64d0b2ba8c93c0b237c63c17bae2561a9afee634
                                                                  • Instruction ID: 7ac6c74e4eb8f055dfb65aa94713dddf69e16aca64b3a1213805ccfa65d63470
                                                                  • Opcode Fuzzy Hash: 1c5ff781e15cdbc412497f6c64d0b2ba8c93c0b237c63c17bae2561a9afee634
                                                                  • Instruction Fuzzy Hash: 16614A31A00619DFDB14DFA9C584A9DBBF2FF88314F208159E909AB361DB71ED85CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 57c7665b901291c5fc970a838e694db46c8dbd7028560a354bd73704eda57c70
                                                                  • Instruction ID: 500e8fe4b401c5dfaad67a5edcc60ebbaf16bda18ed29929e798f6e14354f49e
                                                                  • Opcode Fuzzy Hash: 57c7665b901291c5fc970a838e694db46c8dbd7028560a354bd73704eda57c70
                                                                  • Instruction Fuzzy Hash: 5C21DC71A003154FCB29EFB9885857FBBB7EFD82203154829E806DB281EF349C0A8760
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749071604.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_96d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b889be084854251c91ecbec40627c01838e90fc75741779df3227425dfc9973c
                                                                  • Instruction ID: ba51977a8c13b3d79e70e8864972fff25647a5346342e3ecb992538158c4954e
                                                                  • Opcode Fuzzy Hash: b889be084854251c91ecbec40627c01838e90fc75741779df3227425dfc9973c
                                                                  • Instruction Fuzzy Hash: EA213A71A00244DFDB05DF14D9C0F17BF65FB98318F24C569E90A4B65AC33AD856C7A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749071604.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_96d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dc9453f1e4f9a10c59e693c5abe20218ea7a10644cac3b8878cb8c61489b30fe
                                                                  • Instruction ID: bb9cc45d2e88ce9bfd4c17b0491e0cd141d3e9074f66c1011d5fd66e9a1b784b
                                                                  • Opcode Fuzzy Hash: dc9453f1e4f9a10c59e693c5abe20218ea7a10644cac3b8878cb8c61489b30fe
                                                                  • Instruction Fuzzy Hash: 9E213771A05200DFDB05DF14D9C0B27BF66FB98324F24C569E9094B2A6C73AEC56C7A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749136033.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_97d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 93d7a5e11201edb2478f8e9487874a90f232ba2bda39689c567bae6de586e6f2
                                                                  • Instruction ID: 14364d5e1f4d44e3c81f5eafdd67e15d66d5769a37ffbb4759639097fc24fe84
                                                                  • Opcode Fuzzy Hash: 93d7a5e11201edb2478f8e9487874a90f232ba2bda39689c567bae6de586e6f2
                                                                  • Instruction Fuzzy Hash: 5F21D072604200EFDB05DF14D980B26BBB5FF84314F24CAA9E94D4B296C33AD846CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749136033.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_97d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 42171a2efb3e049ce3313e3e1c35e7da89d88561b03eaeb2c9928226d860c9ae
                                                                  • Instruction ID: 9a1b9d3bf3cf337cda72bcd1dc12bfc386be7a7f015601f8a430254f19a462f9
                                                                  • Opcode Fuzzy Hash: 42171a2efb3e049ce3313e3e1c35e7da89d88561b03eaeb2c9928226d860c9ae
                                                                  • Instruction Fuzzy Hash: AF21FF76604200DFDB14DF24D984B26BBB9FF88314F24C96DE80E4B296C33AD847CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a0d537619f45840592d9b3de2c5017a1b5e01749fc89da80dbe5f8d83d8a920a
                                                                  • Instruction ID: f636cddb112bf0e48a97cddb892cd10b9ef542fc01e2dbe2268de50f30ca02bd
                                                                  • Opcode Fuzzy Hash: a0d537619f45840592d9b3de2c5017a1b5e01749fc89da80dbe5f8d83d8a920a
                                                                  • Instruction Fuzzy Hash: 4331F5B0D00228DFEB20CF99CA48B8EBFF4AB48314F14805AE448BB255C7B56949CF94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749136033.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_97d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b54e55c25a7c7661bce2c3eddae9e85dadeb86d27ef8b72457f84c4df04ee5e1
                                                                  • Instruction ID: d5d832f248483e62033791b520cc62f2fe62e3ce6f2e8e02e3236ea6404464c9
                                                                  • Opcode Fuzzy Hash: b54e55c25a7c7661bce2c3eddae9e85dadeb86d27ef8b72457f84c4df04ee5e1
                                                                  • Instruction Fuzzy Hash: 88215E765093808FDB12CF24D994715BF71EF46314F29C5EAD8498F6A7C33A980ACB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749071604.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_96d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction ID: 046c70062615fe4c4a2aac34a520bc8a731979bd972d6559ac2f499e52a18f86
                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction Fuzzy Hash: 3211D676904240CFDB15CF14D5C4B16BF71FB94314F24C5A9E90A4B65AC336D856CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749071604.000000000096D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0096D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_96d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction ID: b4a23ea6a573994bea35210db5758322daf7fd86a7ac57b60e8ce02215487c82
                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction Fuzzy Hash: F0110376905280CFCB02CF00D5C4B16BF72FB94324F24C5A9D8090B666C33AE85ACBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749136033.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_97d000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: e48895c9595ec40132838d2eedde596afaab760d95634e57064f5d4673ff7a58
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 12117976504280DFDB16CF14D5C4B15BBB1FB84314F28C6AAD8494B696C33AD84ACB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f37a8d4dd677edf47fc411bc36e36c165c9f1aec2abd54ed75f7b16371c8616
                                                                  • Instruction ID: 704b95c1e214acad99b9dcd610234b45276087a556ac517db37e2d9ab9c7046f
                                                                  • Opcode Fuzzy Hash: 1f37a8d4dd677edf47fc411bc36e36c165c9f1aec2abd54ed75f7b16371c8616
                                                                  • Instruction Fuzzy Hash: E1E04834945218DBC708DFA4E4446BDBB79FB6A311F109154E84513791CB307F5ADB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cb6078cc2390ba3394401e68bd8020b41ada4ce309411ac392aee3c4f3c07a28
                                                                  • Instruction ID: 982ad5245065604e18f701c6010eacb57d05ad5d656148cf1d89d4d64e8651ee
                                                                  • Opcode Fuzzy Hash: cb6078cc2390ba3394401e68bd8020b41ada4ce309411ac392aee3c4f3c07a28
                                                                  • Instruction Fuzzy Hash: 27E0AE74D05218EFCB54DFA8E84469CBBB9AB48310F10C1A9A808A2210D7355B55DF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 055b14a93b52c6ed9c66873ff7a8bb17495f45a01c873848adf0453d023ab8f6
                                                                  • Instruction ID: f366a60ca4b5f94e1fc6c61bd824c3c092cdf37b0b98554f6cbbac42df1e4a24
                                                                  • Opcode Fuzzy Hash: 055b14a93b52c6ed9c66873ff7a8bb17495f45a01c873848adf0453d023ab8f6
                                                                  • Instruction Fuzzy Hash: 64D0223048F12CEBC748CAE4D400AB973FCD782208F001098940813632CF742E08C695
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: U
                                                                  • API String ID: 0-3372436214
                                                                  • Opcode ID: e54bf8c329219c6a4fb348aec84ec277c86c456c9a7ef3a6cb56d9fdbb7f3889
                                                                  • Instruction ID: e3a0b009c8543ccdbbc9cc2d8c904bf74883a4eee65dab88edf5de0c960efeb1
                                                                  • Opcode Fuzzy Hash: e54bf8c329219c6a4fb348aec84ec277c86c456c9a7ef3a6cb56d9fdbb7f3889
                                                                  • Instruction Fuzzy Hash: 075249F8940B068FDB18CF18E88C2997BF1FF61318FD08A19D1619B2A5D7B4656ACF44
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID: 0-3916222277
                                                                  • Opcode ID: 32ee8c1ecc0a013acb99380afc84fe4e065a274381571653823ffd819cf64a1f
                                                                  • Instruction ID: 71e0420993f6d3bce842f25ac160e67e23b274f2cbdbc808456ee790d42db56d
                                                                  • Opcode Fuzzy Hash: 32ee8c1ecc0a013acb99380afc84fe4e065a274381571653823ffd819cf64a1f
                                                                  • Instruction Fuzzy Hash: 4412BDB4E01218CFDB14CFA9D984ADDBBB2BF88305F1581AAE50AA7355D7349D82CF50
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q
                                                                  • API String ID: 0-1614139903
                                                                  • Opcode ID: 07a731c407df72c01f2902f763f51d7df358ca443e47fa96b49adb75f31406ac
                                                                  • Instruction ID: 4f71c831de09a2684e7038fb16e22bf2c8527f3f0a95635d67e929c5b1bec2f6
                                                                  • Opcode Fuzzy Hash: 07a731c407df72c01f2902f763f51d7df358ca443e47fa96b49adb75f31406ac
                                                                  • Instruction Fuzzy Hash: 78E13D34A00209DFDB05DFA8C594AAEBBB6FB88300F158469D805B7364DB35ED8ACF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749666567.0000000002360000.00000040.00000800.00020000.00000000.sdmp, Offset: 02360000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2360000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4166e04d567f5d72ce118de8d123e109430ad1ddba050bf5d85d022fb0926385
                                                                  • Instruction ID: a9e1bb822dc9ed81af9f1e789219524d499f50e28ff31ed4bd638fc47d272904
                                                                  • Opcode Fuzzy Hash: 4166e04d567f5d72ce118de8d123e109430ad1ddba050bf5d85d022fb0926385
                                                                  • Instruction Fuzzy Hash: 19A17F32E102158FCF15DFB4C8885AEB7B6FF85704B15896BE845AB229DB31D916CF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1749477744.0000000002320000.00000040.00000800.00020000.00000000.sdmp, Offset: 02310000, based on PE: true
                                                                  • Associated: 00000000.00000002.1749447768.0000000002310000.00000004.08000000.00040000.00000000.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_2310000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: af280484c245ba87445d4f3ff972537ce3163d455e53a7aa326240dcb41199e0
                                                                  • Instruction ID: e3867063a1403802a67a20f510726e01ee0a2d0d265ff6f83b0dfa5ad04e8f65
                                                                  • Opcode Fuzzy Hash: af280484c245ba87445d4f3ff972537ce3163d455e53a7aa326240dcb41199e0
                                                                  • Instruction Fuzzy Hash: A9D1F63192065ACADB11EFA4D950A9DF771FF95300F11C79AE50A37221EB70AAC9CF81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4e8ba3b84be096d49a58806b80b3501fce6133265f83af5c507987445a5963d8
                                                                  • Instruction ID: 69933a726b20782de5b55ac544d638d14a4cfd3818e0aea60d87dd8956a24bf9
                                                                  • Opcode Fuzzy Hash: 4e8ba3b84be096d49a58806b80b3501fce6133265f83af5c507987445a5963d8
                                                                  • Instruction Fuzzy Hash: 658103B4E012098FCB04DFE9D5806AEBBF2AF98301F19D069E418AB355DB349D86CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79773e96e3b49b002cb88ea0b944db66f073d6b23a82e1c4c053beb7de8fc303
                                                                  • Instruction ID: f2173c3920018a1d964e3f089a4cbe5821186318f0940ea5569600bcd0068216
                                                                  • Opcode Fuzzy Hash: 79773e96e3b49b002cb88ea0b944db66f073d6b23a82e1c4c053beb7de8fc303
                                                                  • Instruction Fuzzy Hash: 43610374E012488FCB04DFE9D5846AEBBF2AF99301F19D069E409AB355DB349E86CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 75d6323d96155f92553c8ab1af1260c4b91504976efd698d5a30a5462ed86803
                                                                  • Instruction ID: ec869463051e5a2a2d0d766255af48a1fcd96bafce783e01e59c7c3d21959e24
                                                                  • Opcode Fuzzy Hash: 75d6323d96155f92553c8ab1af1260c4b91504976efd698d5a30a5462ed86803
                                                                  • Instruction Fuzzy Hash: 45411D71E056188BEB1DCF6B8D5069EFAF7BFC8200F14C1BAD90CAA254DB701A428F15
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 16889cf9ce60bb99b3af381463c6e5498245400af1aa139ba729b634141d3ed2
                                                                  • Instruction ID: b9aea5819e224bdcebd31087e3f937197c67b56fdccd31278cb232c9afdbdc4e
                                                                  • Opcode Fuzzy Hash: 16889cf9ce60bb99b3af381463c6e5498245400af1aa139ba729b634141d3ed2
                                                                  • Instruction Fuzzy Hash: B7312371E056588BEB1DCF6B9D4069EFAF7BFC8200F14D1B9D90CAA265DB7006428F11
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6927c5e409d72e2234e6db86ad939ec56e92cf5a73e9cc3683737f9bbf76c46d
                                                                  • Instruction ID: e6feb0e56ebe843507bdfabdc6acdbe2331e966948747cf1b55d260b10ccd096
                                                                  • Opcode Fuzzy Hash: 6927c5e409d72e2234e6db86ad939ec56e92cf5a73e9cc3683737f9bbf76c46d
                                                                  • Instruction Fuzzy Hash: CC115E71D052298FDB049FA4D445BFEBBF0AB09312F15A07AD01277391D7748985DFA8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2a7d5c3452fb296261637feaeacf0892da63650a169da9ed22222212ba8277da
                                                                  • Instruction ID: e63a1244198f15997b974051e47e75fc7e652f00ea8ff79f537e52f81090a00b
                                                                  • Opcode Fuzzy Hash: 2a7d5c3452fb296261637feaeacf0892da63650a169da9ed22222212ba8277da
                                                                  • Instruction Fuzzy Hash: EF111830D052698FDB148FA5C408BEEBBF1AB49312F15906AD016B3291CB788984DF68
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6f38826ecc5d319ad6f08a49cf158ba6cb92fc376601afb5d583254c03be373f
                                                                  • Instruction ID: 303ece10f10f54254b361f1e572bbfc0c1b86ecb9dcef83f0ebb4ff0fdcb9f40
                                                                  • Opcode Fuzzy Hash: 6f38826ecc5d319ad6f08a49cf158ba6cb92fc376601afb5d583254c03be373f
                                                                  • Instruction Fuzzy Hash: 09112A71D052698FDB14CFA5C418BEDBAF2AB4E312F15906AD015B3291CB784944DF68
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1764289973.00000000086A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 086A0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_86a0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5335c3e38bc15cfdc4e182858d626f5cb3fecb1014d9b63b93e4611b3fd94a9f
                                                                  • Instruction ID: a5031d81f375cf5206337d95d59ce0eb9bac0601f36e0215792ca716efd11409
                                                                  • Opcode Fuzzy Hash: 5335c3e38bc15cfdc4e182858d626f5cb3fecb1014d9b63b93e4611b3fd94a9f
                                                                  • Instruction Fuzzy Hash: 18117930D052298FDB108FA4C408BFDBBF2AB0A302F15906AD016B7291CB788944DF68

                                                                  Execution Graph

                                                                  Execution Coverage:13.6%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:2.7%
                                                                  Total number of Nodes:222
                                                                  Total number of Limit Nodes:23
                                                                  execution_graph 58219 1227b30 58220 1227b41 58219->58220 58222 1227b64 58219->58222 58221 1227b91 58222->58221 58223 1227d5b LdrInitializeThunk 58222->58223 58224 1227d78 58223->58224 58225 12ed01c 58226 12ed034 58225->58226 58227 12ed08e 58226->58227 58234 2c768a0 58226->58234 58240 2c769d9 58226->58240 58244 2c7b1fa 58226->58244 58253 2c7478c 58226->58253 58261 2c7477c 58226->58261 58265 2c768b0 58226->58265 58235 2c768b0 58234->58235 58236 2c7477c GetModuleHandleW 58235->58236 58237 2c768e2 58236->58237 58238 2c7478c CallWindowProcW 58237->58238 58239 2c768f7 58238->58239 58239->58227 58241 2c769e0 58240->58241 58271 2c747b4 58241->58271 58243 2c769e7 58243->58227 58245 2c7b186 58244->58245 58246 2c7b202 58244->58246 58245->58227 58247 2c7b269 58246->58247 58249 2c7b259 58246->58249 58287 2c7a164 58247->58287 58250 2c7b267 58249->58250 58279 2c7b380 58249->58279 58283 2c7b390 58249->58283 58254 2c74797 58253->58254 58255 2c7b269 58254->58255 58257 2c7b259 58254->58257 58256 2c7a164 CallWindowProcW 58255->58256 58258 2c7b267 58256->58258 58257->58258 58259 2c7b380 CallWindowProcW 58257->58259 58260 2c7b390 CallWindowProcW 58257->58260 58259->58258 58260->58258 58262 2c74787 58261->58262 58263 2c747b4 GetModuleHandleW 58262->58263 58264 2c769e7 58263->58264 58264->58227 58266 2c768d6 58265->58266 58267 2c7477c GetModuleHandleW 58266->58267 58268 2c768e2 58267->58268 58269 2c7478c CallWindowProcW 58268->58269 58270 2c768f7 58269->58270 58270->58227 58272 2c747bf 58271->58272 58274 2c76ab7 58272->58274 58275 2c736bc 58272->58275 58276 2c75650 GetModuleHandleW 58275->58276 58278 2c756c5 58276->58278 58278->58274 58281 2c7b390 58279->58281 58280 2c7a164 CallWindowProcW 58280->58281 58281->58280 58282 2c7b487 58281->58282 58282->58250 58285 2c7b39e 58283->58285 58284 2c7a164 CallWindowProcW 58284->58285 58285->58284 58286 2c7b487 58285->58286 58286->58250 58288 2c7a16f 58287->58288 58289 2c7b552 CallWindowProcW 58288->58289 58290 2c7b501 58288->58290 58289->58290 58290->58250 58291 64f6608 58295 64f6627 58291->58295 58292 64f688f 58293 64f38d4 RegOpenKeyExW 58293->58295 58294 64f38e0 RegQueryValueExW 58294->58295 58295->58292 58295->58293 58295->58294 58383 2c7a3b0 58384 2c7a3f6 58383->58384 58388 2c7a580 58384->58388 58392 2c7a590 58384->58392 58385 2c7a4e3 58389 2c7a58b 58388->58389 58391 2c7a5be 58388->58391 58395 2c79f8c 58389->58395 58391->58385 58393 2c79f8c DuplicateHandle 58392->58393 58394 2c7a5be 58393->58394 58394->58385 58396 2c7a5f8 DuplicateHandle 58395->58396 58397 2c7a68e 58396->58397 58397->58391 58296 12246e8 58297 1224707 LdrInitializeThunk 58296->58297 58299 122473b 58297->58299 58300 65e9b10 58301 65e9e18 58300->58301 58302 65e9b38 58300->58302 58303 65e9b41 58302->58303 58306 65e8fd4 58302->58306 58305 65e9b64 58308 65e8fdf 58306->58308 58307 65e9e5b 58307->58305 58308->58307 58310 65e8ff0 58308->58310 58311 65e9e90 OleInitialize 58310->58311 58312 65e9ef4 58311->58312 58312->58307 58128 64f9d40 58133 64f9fd7 58128->58133 58129 64f9d5b 58131 64f9d73 58129->58131 58138 64f86e8 58129->58138 58134 64f9ff1 58133->58134 58135 64fa0ca 58134->58135 58147 64fb189 58134->58147 58151 64fb198 58134->58151 58135->58129 58140 64f86fd 58138->58140 58139 64f89dc 58139->58131 58140->58139 58143 64f8c28 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 58140->58143 58144 64f8c38 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 58140->58144 58146 64f8d00 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 58140->58146 58165 64f89f8 58140->58165 58171 64f8b70 58140->58171 58175 64f8e64 58140->58175 58143->58140 58144->58140 58146->58140 58148 64fb18e 58147->58148 58155 64f65b8 58148->58155 58150 64fb384 58152 64fb1b3 58151->58152 58153 64f65b8 2 API calls 58152->58153 58154 64fb384 58153->58154 58156 64f65c9 58155->58156 58160 64f65ec 58155->58160 58156->58150 58157 64f688f 58157->58150 58159 64f38e0 RegQueryValueExW 58159->58160 58160->58157 58160->58159 58161 64f38d4 58160->58161 58162 64f6d18 RegOpenKeyExW 58161->58162 58164 64f6dde 58162->58164 58164->58164 58166 64f8a16 58165->58166 58167 64f8a39 58165->58167 58166->58140 58168 64f8a5e 58167->58168 58179 64f8c28 58167->58179 58187 64f8c38 58167->58187 58168->58140 58173 64f8c28 3 API calls 58171->58173 58174 64f8c38 3 API calls 58171->58174 58172 64f8b97 58172->58140 58173->58172 58174->58172 58176 64f8e65 58175->58176 58177 64f8ea7 58176->58177 58178 64f8ff0 3 API calls 58176->58178 58177->58140 58178->58177 58180 64f8c8d 58179->58180 58181 64f8c4c 58179->58181 58180->58168 58181->58180 58182 64f8da6 58181->58182 58185 64f8db5 58181->58185 58183 64f8b70 3 API calls 58182->58183 58184 64f8dad 58183->58184 58184->58168 58185->58184 58195 64f8ff0 58185->58195 58188 64f8c8d 58187->58188 58189 64f8c4c 58187->58189 58188->58168 58189->58188 58190 64f8da6 58189->58190 58193 64f8db5 58189->58193 58191 64f8b70 3 API calls 58190->58191 58192 64f8dad 58191->58192 58192->58168 58193->58192 58194 64f8ff0 3 API calls 58193->58194 58194->58192 58199 64f9028 58195->58199 58207 64f9038 58195->58207 58196 64f900e 58196->58184 58201 64f9038 58199->58201 58200 64f9045 58200->58196 58201->58200 58215 64f6adc 58201->58215 58203 64f908e 58203->58196 58205 64f9156 GlobalMemoryStatusEx 58206 64f9186 58205->58206 58206->58196 58208 64f9045 58207->58208 58209 64f906d 58207->58209 58208->58196 58210 64f6adc GlobalMemoryStatusEx 58209->58210 58212 64f908a 58210->58212 58211 64f908e 58211->58196 58212->58211 58213 64f9156 GlobalMemoryStatusEx 58212->58213 58214 64f9186 58213->58214 58214->58196 58216 64f9110 GlobalMemoryStatusEx 58215->58216 58218 64f908a 58216->58218 58218->58203 58218->58205 58313 2c719a8 58314 2c719d7 58313->58314 58317 2c71730 58314->58317 58316 2c71afc 58318 2c7173b 58317->58318 58319 2c7201a 58318->58319 58322 2c74b83 58318->58322 58332 2c74b98 58318->58332 58319->58316 58323 2c74bc3 58322->58323 58342 2c75171 58323->58342 58347 2c75180 58323->58347 58324 2c74c46 58325 2c736bc GetModuleHandleW 58324->58325 58327 2c74c72 58324->58327 58326 2c74cb6 58325->58326 58328 2c76698 CreateWindowExW 58326->58328 58329 2c766a8 CreateWindowExW 58326->58329 58328->58327 58329->58327 58333 2c74bc3 58332->58333 58340 2c75171 GetModuleHandleW 58333->58340 58341 2c75180 GetModuleHandleW 58333->58341 58334 2c74c46 58335 2c736bc GetModuleHandleW 58334->58335 58337 2c74c72 58334->58337 58336 2c74cb6 58335->58336 58372 2c76698 58336->58372 58376 2c766a8 58336->58376 58340->58334 58341->58334 58343 2c75180 58342->58343 58344 2c7522e 58343->58344 58352 2c752e0 58343->58352 58362 2c752f0 58343->58362 58348 2c751ad 58347->58348 58349 2c7522e 58348->58349 58350 2c752e0 GetModuleHandleW 58348->58350 58351 2c752f0 GetModuleHandleW 58348->58351 58350->58349 58351->58349 58353 2c752f0 58352->58353 58354 2c736bc GetModuleHandleW 58353->58354 58355 2c7534a 58353->58355 58354->58355 58356 2c736bc GetModuleHandleW 58355->58356 58361 2c75516 58355->58361 58357 2c7549b 58356->58357 58358 2c736bc GetModuleHandleW 58357->58358 58357->58361 58359 2c754e9 58358->58359 58360 2c736bc GetModuleHandleW 58359->58360 58359->58361 58360->58361 58361->58344 58363 2c75305 58362->58363 58364 2c736bc GetModuleHandleW 58363->58364 58365 2c7534a 58363->58365 58364->58365 58366 2c736bc GetModuleHandleW 58365->58366 58371 2c75516 58365->58371 58367 2c7549b 58366->58367 58368 2c736bc GetModuleHandleW 58367->58368 58367->58371 58369 2c754e9 58368->58369 58370 2c736bc GetModuleHandleW 58369->58370 58369->58371 58370->58371 58371->58344 58373 2c766a8 58372->58373 58379 2c74764 58373->58379 58377 2c74764 CreateWindowExW 58376->58377 58378 2c766dd 58377->58378 58378->58337 58380 2c766f8 CreateWindowExW 58379->58380 58382 2c7681c 58380->58382

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 1215f20-1215f39 1 1215ff4-1216004 0->1 2 1215f3f-1215f53 0->2 253 1216006 call 1215f20 1->253 254 1216006 call 1215e70 1->254 255 1216006 call 12161c4 1->255 5 1215f55-1215f57 2->5 6 1215f59 2->6 7 1215f5c-1215f71 5->7 6->7 10 1215f73-1215f82 7->10 11 1215fb8-1215fe1 call 1215918 7->11 8 121600c-1216013 17 1216014 10->17 18 1215f88-1215f8b 10->18 15 1215fe3-1215fea 11->15 16 1215fec-1215ff2 11->16 15->8 16->8 20 1216019-1216053 17->20 19 1215f91-1215f97 18->19 18->20 19->11 22 1215f99-1215fb6 19->22 24 1216095-1216097 20->24 25 1216055-121605a 20->25 22->11 29 12160a1-12160b5 24->29 30 1216099-121609f 24->30 27 1216060-1216063 25->27 28 121627b 25->28 31 1216280-12162f4 27->31 32 1216069-121606f 27->32 28->31 45 12160d0 29->45 46 12160b7-12160bb 29->46 33 12160d6-12160d8 30->33 78 1216300-121631f 31->78 79 12162f6-12162ff 31->79 32->24 35 1216071-1216090 32->35 36 12160e1-12160ea 33->36 37 12160da-12160df 33->37 56 12161a5-12161b9 35->56 48 12160fa-121610c 36->48 49 12160ec-12160f5 36->49 37->36 39 1216144-1216147 37->39 39->28 42 121614d-1216150 39->42 42->31 47 1216156-121615c 42->47 45->33 46->45 51 12160bd-12160ce 46->51 53 121617d-121618e 47->53 54 121615e-121617b 47->54 48->28 59 1216112-1216115 48->59 49->53 51->33 51->45 53->56 64 1216190-121619f 53->64 54->53 74 12161c0-1216257 56->74 59->31 63 121611b-1216121 59->63 63->53 67 1216123-1216142 63->67 64->56 67->53 85 1216259-121625d 74->85 86 121625f-1216265 74->86 90 1216321-121632a 78->90 91 121632b-1216337 78->91 85->86 88 1216267-121626d 85->88 89 121626f-1216278 86->89 88->89 92 121633d-1216346 91->92 93 12165df-12165e9 91->93 95 12165f8-121661f 92->95 96 121634c-1216385 92->96 99 1216621-121662b 95->99 100 1216644-121670d 95->100 111 1216598-12165bc 96->111 112 121638b-12163c3 96->112 102 1216640-1216643 99->102 103 121662d-121663e 99->103 131 1216719-1216898 100->131 132 121670f-1216718 100->132 103->102 118 12165c7 111->118 119 12165be 111->119 128 12163c9-12163e1 112->128 129 121646b-1216483 112->129 118->93 119->118 138 1216571-1216582 128->138 139 12163e7-1216402 128->139 140 1216485-121649d 129->140 141 12164cf-12164e7 129->141 205 121689a 131->205 206 121689e-12168a0 131->206 163 1216587-1216592 138->163 139->138 152 1216408-121642e 139->152 140->138 156 12164a3-12164be 140->156 153 12164e9-1216501 141->153 154 121652b-1216561 141->154 152->138 176 1216434-121644f 152->176 153->138 169 1216503-121651e 153->169 154->163 179 1216563-121656f 154->179 156->138 170 12164c4-12164c7 156->170 163->111 163->112 169->138 182 1216520-1216523 169->182 170->141 176->138 186 1216455-1216463 176->186 179->163 182->154 186->129 207 12168a2 205->207 208 121689c 205->208 209 12168a7-12168c5 206->209 207->209 208->206 210 12168d1-121693f 209->210 211 12168c7-12168d0 209->211 219 1216941-121695a 210->219 220 1216962-12169b3 210->220 219->220 223 1216ae0-1216af5 220->223 224 12169b9-1216a5e 220->224 241 1216a60-1216ac0 224->241 242 1216acb-1216ada 224->242 241->242 242->223 242->224 253->8 254->8 255->8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q$PH^q$\$\$\$\
                                                                  • API String ID: 0-413451394
                                                                  • Opcode ID: a5f162fbe79f650dcf69f94452ed8edf722720040d93430cd66195707e3781ea
                                                                  • Instruction ID: 690dbc86413724310ffc3a2ab12d64a53a3967482d153996feab9de844393d02
                                                                  • Opcode Fuzzy Hash: a5f162fbe79f650dcf69f94452ed8edf722720040d93430cd66195707e3781ea
                                                                  • Instruction Fuzzy Hash: 3B62AD31B102059FDB24DB78D8487AEBBF2AF84310F148569E50ADB399EF75DC428B91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1190 1227b30-1227b3f 1191 1227b41-1227b4b 1190->1191 1192 1227b64-1227b8f 1190->1192 1193 1227b60-1227b63 1191->1193 1194 1227b4d-1227b5e 1191->1194 1197 1227b91-1227b9b 1192->1197 1198 1227bb4-1227bdf 1192->1198 1194->1193 1199 1227bb0-1227bb3 1197->1199 1200 1227b9d-1227bae 1197->1200 1202 1227be1-1227beb 1198->1202 1203 1227c04-1227c2f 1198->1203 1200->1199 1205 1227c00-1227c03 1202->1205 1206 1227bed-1227bfe 1202->1206 1210 1227c31-1227c3b 1203->1210 1211 1227c54-1227c7c 1203->1211 1206->1205 1212 1227c50-1227c53 1210->1212 1213 1227c3d-1227c4e 1210->1213 1216 1227ca1-1227cb5 1211->1216 1217 1227c7e-1227c88 1211->1217 1213->1212 1221 1227cb7-1227cc7 1216->1221 1222 1227ce5-1227ce6 1216->1222 1218 1227c8a-1227c9b 1217->1218 1219 1227c9d-1227ca0 1217->1219 1218->1219 1224 1227cc9-1227cd3 1221->1224 1225 1227cec-1227d72 call 1223868 call 1223980 LdrInitializeThunk 1221->1225 1226 1227ce8-1227ceb 1222->1226 1224->1226 1227 1227cd5-1227cdc 1224->1227 1238 1227ebb-1227ed8 1225->1238 1239 1227d78-1227d92 1225->1239 1227->1222 1251 1227edd-1227ee6 1238->1251 1239->1238 1242 1227d98-1227db2 1239->1242 1246 1227db4-1227db6 1242->1246 1247 1227db8 1242->1247 1248 1227dbb-1227e16 1246->1248 1247->1248 1257 1227e18-1227e1a 1248->1257 1258 1227e1c 1248->1258 1259 1227e1f-1227eb9 1257->1259 1258->1259 1259->1251
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147782857.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1220000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: LR^q$LR^q
                                                                  • API String ID: 2994545307-4089051495
                                                                  • Opcode ID: 20689004c8ae1d8e6e95538e1a0b6a35ea7134c3a315943e6bb701c4a803dc1a
                                                                  • Instruction ID: ddb89604eb00bfa0068aa08f6a1149d6253eb2ae59a1b33379e12adffafdc577
                                                                  • Opcode Fuzzy Hash: 20689004c8ae1d8e6e95538e1a0b6a35ea7134c3a315943e6bb701c4a803dc1a
                                                                  • Instruction Fuzzy Hash: 00B1F431B183459FC706DB78D854A6E7BF2AF96300F1885AAE145CB393EA74DC05CB61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1276 121a058-121a09f 1279 121a0a5-121a146 call 12194e8 call 1213330 call 12144f8 1276->1279 1280 121a37b-121a3cc 1276->1280 1351 121a376 1279->1351 1352 121a14c-121a1b1 1279->1352 1287 121a3e7-121a3ef 1280->1287 1288 121a3ce-121a3d5 1280->1288 1292 121a3f2-121a406 1287->1292 1289 121a3d7-121a3dc 1288->1289 1290 121a3de-121a3e5 1288->1290 1289->1292 1290->1292 1297 121a408-121a40f 1292->1297 1298 121a41c-121a424 1292->1298 1299 121a411-121a413 1297->1299 1300 121a415-121a41a 1297->1300 1302 121a426-121a42a 1298->1302 1299->1302 1300->1302 1305 121a48a-121a48d 1302->1305 1306 121a42c-121a441 1302->1306 1308 121a4d5-121a4db 1305->1308 1309 121a48f-121a4a4 1305->1309 1306->1305 1314 121a443-121a446 1306->1314 1311 121a4e1-121a4e3 1308->1311 1312 121afde 1308->1312 1309->1308 1317 121a4a6-121a4aa 1309->1317 1311->1312 1316 121a4e9-121a4ee 1311->1316 1320 121afe3-121b024 1312->1320 1318 121a465-121a483 1314->1318 1319 121a448-121a44a 1314->1319 1321 121a4f4 1316->1321 1322 121af8c-121af90 1316->1322 1323 121a4b2-121a4d0 1317->1323 1324 121a4ac-121a4b0 1317->1324 1318->1305 1319->1318 1325 121a44c-121a44f 1319->1325 1342 121b026-121b0b4 1320->1342 1343 121afcb-121afdd 1320->1343 1321->1321 1327 121af92-121af95 1322->1327 1328 121af97-121afc9 1322->1328 1323->1308 1324->1308 1324->1323 1325->1305 1329 121a451-121a463 1325->1329 1327->1320 1327->1328 1328->1343 1329->1305 1329->1318 1345 121b0b5-121b0b8 1342->1345 1346 121b0b9-121b0cc 1345->1346 1350 121b0ce-121b10c 1346->1350 1350->1345 1353 121b10e-121b110 1350->1353 1351->1280 1352->1280 1366 121a1b7-121a1bf 1352->1366 1353->1346 1355 121b112-121b124 1353->1355 1355->1350 1356 121b126-121b140 1355->1356 1358 121b143-121b198 1356->1358 1361 121b19a-121b1a4 1358->1361 1366->1280 1367 121a1c5-121a1e0 1366->1367 1369 121a1e2-121a1e6 1367->1369 1370 121a21a-121a223 1367->1370 1369->1280 1371 121a1ec-121a217 1369->1371 1370->1351 1372 121a229-121a22c 1370->1372 1371->1370 1372->1280 1373 121a232-121a28f 1372->1373 1385 121a291-121a2a2 call 2c7e020 1373->1385 1386 121a2e6 1373->1386 1388 121a2a7-121a2af 1385->1388 1387 121a2eb-121a2ef 1386->1387 1391 121a2f1 1387->1391 1392 121a2fa 1387->1392 1389 121a2b1-121a2b8 1388->1389 1390 121a2c4-121a2e4 1388->1390 1389->1386 1393 121a2ba-121a2c2 1389->1393 1390->1387 1391->1392 1392->1351 1393->1390
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq$Xbq$Xbq$Xbq
                                                                  • API String ID: 0-2732225958
                                                                  • Opcode ID: 120135265153f77c9ff7c50b51f9dc733dffcccbcbc7601b9e5e1b39eb492f52
                                                                  • Instruction ID: 8aa51db8cf704be399321c52de4ec7ca86bc02568ff0615322af39eabab64a60
                                                                  • Opcode Fuzzy Hash: 120135265153f77c9ff7c50b51f9dc733dffcccbcbc7601b9e5e1b39eb492f52
                                                                  • Instruction Fuzzy Hash: DAB1D430E113558FDB28DB78C89876EBAE2BF94300F248469D1169B398DF75DC41CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq
                                                                  • API String ID: 0-63242295
                                                                  • Opcode ID: 16d63f71049e8bc05f21d0d86e0b65bd6a824dac535c7dde3ef4ed7b48708a87
                                                                  • Instruction ID: a4b6c17e65503c36710bac6412e9ffad0b05a2472b6489fa0c20aed0004437c9
                                                                  • Opcode Fuzzy Hash: 16d63f71049e8bc05f21d0d86e0b65bd6a824dac535c7dde3ef4ed7b48708a87
                                                                  • Instruction Fuzzy Hash: 12721731F102099FDB25DBBCD8987AEBBF2AF95310F148869E205DB399CA31DC418791
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4077127d141199d7a03c15d35ea7bb11f26f45b3ba55426d8f68f63dfab25dff
                                                                  • Instruction ID: d1860fb40dcfe98deddc5c189c46146dd83776651a26ecbe8f6ab0953260521a
                                                                  • Opcode Fuzzy Hash: 4077127d141199d7a03c15d35ea7bb11f26f45b3ba55426d8f68f63dfab25dff
                                                                  • Instruction Fuzzy Hash: 76428F30E102498FEB24DB78C89476DBBF2BF95300F248469D509AF29ADB75DC85CB52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 378 121c168-121c177 379 121c17d-121c183 378->379 380 121c1ff-121c205 378->380 381 121c206-121c22c 379->381 382 121c189-121c1a3 379->382 387 121c22e-121c231 381->387 382->381 383 121c1a5-121c1b5 382->383 383->381 384 121c1b7-121c1ca 383->384 384->381 386 121c1cc-121c1dc 384->386 386->381 388 121c1de-121c1fc 386->388 389 121c233-121c242 387->389 390 121c247-121c24a 387->390 388->380 389->390 391 121c251-121c254 390->391 392 121c24c 390->392 394 121c256-121c25c 391->394 395 121c279-121c27c 391->395 392->391 396 121c2a8-121c388 394->396 397 121c25e-121c261 394->397 398 121c293-121c295 395->398 399 121c27e-121c28e 395->399 420 121ca4b-121ca74 396->420 421 121c38e-121c391 396->421 397->396 400 121c263-121c266 397->400 401 121c297 398->401 402 121c29c-121c29f 398->402 399->398 400->396 403 121c268-121c274 400->403 401->402 402->387 405 121c2a1-121c2a7 402->405 403->395 421->420 422 121c397-121c39a 421->422 422->420 423 121c3a0-121c3d8 422->423 431 121c495-121c49c 423->431 432 121c3de-121c416 423->432 433 121c4a2-121c4d9 431->433 434 121c555-121ca86 431->434 444 121c418 432->444 445 121c41a-121c426 432->445 446 121c4db 433->446 447 121c4dd-121c4e9 433->447 448 121c428-121c442 444->448 445->448 449 121c4eb-121c52f 446->449 447->449 466 121c447 call 121cbe0 448->466 467 121c447 call 121caa0 448->467 468 121c447 call 121ca8b 448->468 462 121c531-121c541 449->462 463 121c549 449->463 456 121c44d-121c46c 460 121c486 456->460 461 121c46e-121c47e 456->461 460->431 461->460 462->463 463->434 466->456 467->456 468->456
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q$PH^q$XPcq$\Ocq
                                                                  • API String ID: 0-2308457832
                                                                  • Opcode ID: 453d0b7aa0a8f5d1c3127f76c2d6789925831dba0b458578faee58e4faf85b08
                                                                  • Instruction ID: fd5e3b4d52c7a88e5a63629cefba1d36e384ec5fe83b81b3f602d109930ef1ba
                                                                  • Opcode Fuzzy Hash: 453d0b7aa0a8f5d1c3127f76c2d6789925831dba0b458578faee58e4faf85b08
                                                                  • Instruction Fuzzy Hash: 9CC10474A502098FDB25DFB8D4447AEBBE6FF94310F20886AD51ADB398DB309C15CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1397 12186a0-12186ad 1398 12186b9-12186c5 1397->1398 1399 12186af-12186b4 1397->1399 1402 12186d5-12186da 1398->1402 1403 12186c7-12186c9 1398->1403 1400 1218a4e-1218a53 1399->1400 1402->1400 1404 12186d1-12186d3 1403->1404 1404->1402 1405 12186df-12186eb 1404->1405 1407 12186fb-1218700 1405->1407 1408 12186ed-12186f9 1405->1408 1407->1400 1408->1407 1410 1218705-1218710 1408->1410 1412 1218716-1218721 1410->1412 1413 12187ba-12187c5 1410->1413 1418 1218723-1218735 1412->1418 1419 1218737 1412->1419 1416 1218868-1218874 1413->1416 1417 12187cb-12187da 1413->1417 1426 1218884-1218896 1416->1426 1427 1218876-1218882 1416->1427 1428 12187eb-12187fa 1417->1428 1429 12187dc-12187e6 1417->1429 1420 121873c-121873e 1418->1420 1419->1420 1421 1218740-121874f 1420->1421 1422 121875e-1218763 1420->1422 1421->1422 1432 1218751-121875c 1421->1432 1422->1400 1445 1218898-12188a4 1426->1445 1446 12188ba-12188bf 1426->1446 1427->1426 1438 12188c4-12188cf 1427->1438 1436 12187fc-1218808 1428->1436 1437 121881e-1218827 1428->1437 1429->1400 1432->1422 1443 1218768-1218771 1432->1443 1447 1218814-1218819 1436->1447 1448 121880a-121880f 1436->1448 1451 1218829-121883b 1437->1451 1452 121883d 1437->1452 1449 12189b1-12189bc 1438->1449 1450 12188d5-12188de 1438->1450 1460 1218773-1218778 1443->1460 1461 121877d-121878c 1443->1461 1457 12188b0-12188b5 1445->1457 1458 12188a6-12188ab 1445->1458 1446->1400 1447->1400 1448->1400 1464 12189e6-12189f5 1449->1464 1465 12189be-12189c8 1449->1465 1466 12188e0-12188f2 1450->1466 1467 12188f4 1450->1467 1455 1218842-1218844 1451->1455 1452->1455 1455->1416 1463 1218846-1218852 1455->1463 1457->1400 1458->1400 1460->1400 1478 12187b0-12187b5 1461->1478 1479 121878e-121879a 1461->1479 1471 1218854-1218859 1463->1471 1472 121885e-1218863 1463->1472 1483 12189f7-1218a06 1464->1483 1484 1218a49 1464->1484 1481 12189ca-12189d6 1465->1481 1482 12189df-12189e4 1465->1482 1469 12188f9-12188fb 1466->1469 1467->1469 1476 121890b 1469->1476 1477 12188fd-1218909 1469->1477 1471->1400 1472->1400 1480 1218910-1218912 1476->1480 1477->1480 1478->1400 1489 12187a6-12187ab 1479->1489 1490 121879c-12187a1 1479->1490 1487 1218914-1218919 1480->1487 1488 121891e-1218931 1480->1488 1481->1482 1494 12189d8-12189dd 1481->1494 1482->1400 1483->1484 1495 1218a08-1218a20 1483->1495 1484->1400 1487->1400 1496 1218933 1488->1496 1497 1218969-1218973 1488->1497 1489->1400 1490->1400 1494->1400 1505 1218a42-1218a47 1495->1505 1506 1218a22-1218a40 1495->1506 1499 1218936-1218947 1496->1499 1502 1218992-121899e 1497->1502 1503 1218975-1218981 1497->1503 1507 1218949-121894c 1499->1507 1508 121894e-1218953 1499->1508 1515 12189a0-12189a5 1502->1515 1516 12189a7 1502->1516 1513 1218983-1218986 1503->1513 1514 1218988-121898d 1503->1514 1505->1400 1506->1400 1507->1508 1511 1218958-121895b 1507->1511 1508->1400 1517 1218961-1218967 1511->1517 1518 1218a54-1218a7c 1511->1518 1513->1502 1513->1514 1514->1400 1519 12189ac 1515->1519 1516->1519 1517->1497 1517->1499 1522 1218a88-1218a93 1518->1522 1523 1218a7e-1218a83 1518->1523 1519->1400 1527 1218a99-1218aa4 1522->1527 1528 1218b3b-1218b44 1522->1528 1524 1218c09-1218c0d 1523->1524 1533 1218aa6-1218ab8 1527->1533 1534 1218aba 1527->1534 1531 1218b46-1218b51 1528->1531 1532 1218b8f-1218b9a 1528->1532 1543 1218c07 1531->1543 1544 1218b57-1218b69 1531->1544 1541 1218bb0 1532->1541 1542 1218b9c-1218bae 1532->1542 1535 1218abf-1218ac1 1533->1535 1534->1535 1539 1218ac3-1218ad2 1535->1539 1540 1218af6-1218b08 1535->1540 1539->1540 1548 1218ad4-1218aea 1539->1548 1540->1543 1552 1218b0e-1218b1c 1540->1552 1545 1218bb5-1218bb7 1541->1545 1542->1545 1543->1524 1544->1543 1553 1218b6f-1218b73 1544->1553 1545->1543 1550 1218bb9-1218bc8 1545->1550 1548->1540 1570 1218aec-1218af1 1548->1570 1559 1218bf0 1550->1559 1560 1218bca-1218bd3 1550->1560 1563 1218b28-1218b2b 1552->1563 1564 1218b1e-1218b23 1552->1564 1556 1218b75-1218b7a 1553->1556 1557 1218b7f-1218b82 1553->1557 1556->1524 1561 1218b88-1218b8b 1557->1561 1562 1218c0e-1218c39 1557->1562 1565 1218bf5-1218bf7 1559->1565 1574 1218bd5-1218be7 1560->1574 1575 1218be9 1560->1575 1561->1553 1567 1218b8d 1561->1567 1579 1218c3b-1218c3d 1562->1579 1580 1218c3f-1218c43 1562->1580 1563->1562 1568 1218b31-1218b34 1563->1568 1564->1524 1565->1543 1569 1218bf9-1218c05 1565->1569 1567->1543 1568->1552 1573 1218b36 1568->1573 1569->1524 1570->1524 1573->1543 1576 1218bee 1574->1576 1575->1576 1576->1565 1582 1218c49-1218c4a 1579->1582 1580->1582
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q$;^q
                                                                  • API String ID: 0-799016360
                                                                  • Opcode ID: 89e86fc82650e9c91d3a5a5211e5ed3a477348e727ef9430af31e20426f38650
                                                                  • Instruction ID: 089260ec2024365cfb05c92f04d07008bc888ed70cd6eebb1c9aa72875fba807
                                                                  • Opcode Fuzzy Hash: 89e86fc82650e9c91d3a5a5211e5ed3a477348e727ef9430af31e20426f38650
                                                                  • Instruction Fuzzy Hash: 75F1C2353241028FEB29DA3DC8D57397BD6AF94714F1944A6E602CF3AAEA75CC42C742

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1675 1216ed0-1216f42 1684 1216f44-1216f5f 1675->1684 1685 1216f76-1216f9f 1675->1685 1693 1216f67-1216f6f 1684->1693 1694 1216fa1-1216fbc 1685->1694 1695 1216fd3-121700c 1685->1695 1693->1685 1706 1216fc4-1216fcc 1694->1706 1698 1217012-1217067 call 1217207 1695->1698 1699 12171d4-12171f2 1695->1699 1713 121718d-12171b1 1698->1713 1714 121706d-12170ce call 2c7e020 1698->1714 1704 12171f3 1699->1704 1704->1704 1706->1695 1718 12171b3 1713->1718 1719 12171bc-12171bd 1713->1719 1729 12170d4-1217114 call 121a058 1714->1729 1730 121717c-1217187 1714->1730 1718->1719 1719->1699 1748 1217116 call 121c220 1729->1748 1749 1217116 call 121c162 1729->1749 1750 1217116 call 121c168 1729->1750 1730->1713 1730->1714 1738 121711c-121712f 1740 1217131-1217137 1738->1740 1741 1217149-1217154 1738->1741 1742 1217139 1740->1742 1743 121713b-1217147 1740->1743 1752 1217156 call 121ee68 1741->1752 1753 1217156 call 121ee58 1741->1753 1742->1741 1743->1741 1746 121715c-1217160 1747 1217169 1746->1747 1747->1730 1748->1738 1749->1738 1750->1738 1752->1746 1753->1746
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$ fcq$PH^q
                                                                  • API String ID: 0-4172635152
                                                                  • Opcode ID: 2121a4784eaea32baff2a9893938b1a6ce0b75b48678d47779182521d9c693a8
                                                                  • Instruction ID: 4fa1e6e0f2a7d3c0b64c4d7703451915a2df208ce560a81926d06fd82fe2ac47
                                                                  • Opcode Fuzzy Hash: 2121a4784eaea32baff2a9893938b1a6ce0b75b48678d47779182521d9c693a8
                                                                  • Instruction Fuzzy Hash: C9715035B102098FDB58DBB9D45876E76F7AFC8750F144428E50ADB388EF749C428B92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1974 1216af8-1216b24 1978 1216e17-1216e3f 1974->1978 1979 1216b2a-1216b32 1974->1979 1986 1216e41-1216e4b 1978->1986 1987 1216e64-1216e8f 1978->1987 1980 1216d10-1216d16 1979->1980 1981 1216b40-1216b4a 1980->1981 1982 1216d1c-1216d4a 1980->1982 1984 1216b74-1216bbe 1981->1984 1985 1216b4c-1216b6c 1981->1985 2012 1216d50-1216d61 1982->2012 2013 1216ddc-1216df1 1982->2013 2002 1216ce4-1216cf7 1984->2002 2003 1216bc4-1216bd3 1984->2003 1985->1984 1988 1216e60-1216e63 1986->1988 1989 1216e4d-1216e5e 1986->1989 1995 1216e91-1216e9b 1987->1995 1996 1216eb4-1216ec0 1987->1996 1989->1988 1999 1216eb0-1216eb3 1995->1999 2000 1216e9d-1216eae 1995->2000 2010 1216f20-1216f42 1996->2010 2011 1216ec2-1216f19 1996->2011 2000->1999 2006 1216d03 2002->2006 2007 1216bd9-1216bea 2003->2007 2008 1216cfe 2003->2008 2006->1980 2021 1216bf0-1216c11 2007->2021 2022 1216ccf-1216cde 2007->2022 2008->2006 2031 1216f44-1216f58 2010->2031 2032 1216f76-1216f9f 2010->2032 2011->2010 2019 1216d63-1216dc0 2012->2019 2020 1216dc7-1216dd6 2012->2020 2013->1978 2019->2020 2020->2012 2020->2013 2040 1216c17-1216c20 2021->2040 2041 1216cf9 2021->2041 2022->2002 2022->2003 2048 1216f5f 2031->2048 2054 1216fa1-1216fb5 2032->2054 2055 1216fd3-121700c 2032->2055 2040->2008 2042 1216c26-1216cc7 2040->2042 2041->2008 2042->2022 2052 1216f67-1216f6f 2048->2052 2052->2032 2069 1216fbc 2054->2069 2060 1217012-121701a call 1217207 2055->2060 2061 12171d4-12171f2 2055->2061 2066 1217020-1217037 2060->2066 2070 12171f3 2061->2070 2077 121703e 2066->2077 2073 1216fc4-1216fcc 2069->2073 2070->2070 2073->2055 2079 1217046-1217067 2077->2079 2086 121718d-12171b1 2079->2086 2087 121706d-1217093 2079->2087 2092 12171b3 2086->2092 2093 12171bc-12171bd 2086->2093 2098 121709a-12170a6 call 2c7e020 2087->2098 2092->2093 2093->2061 2099 12170ab-12170ce 2098->2099 2103 12170d4-12170e6 2099->2103 2104 121717c-1217187 2099->2104 2108 12170ec-12170fa call 121a058 2103->2108 2104->2086 2104->2087 2110 1217104-1217108 2108->2110 2111 1217112-1217114 2110->2111 2126 1217116 call 121c220 2111->2126 2127 1217116 call 121c162 2111->2127 2128 1217116 call 121c168 2111->2128 2112 121711c-1217121 2113 121712b-121712f 2112->2113 2114 1217131-1217137 2113->2114 2115 1217149 2113->2115 2116 1217139 2114->2116 2117 121713b-1217147 2114->2117 2118 121714f-1217154 2115->2118 2116->2115 2117->2115 2123 1217156 call 121ee68 2118->2123 2124 1217156 call 121ee58 2118->2124 2120 121715c-1217160 2121 1217169 2120->2121 2121->2104 2123->2120 2124->2120 2126->2112 2127->2112 2128->2112
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q
                                                                  • API String ID: 0-2325994563
                                                                  • Opcode ID: 943c7a280ce2b2339d1dd70cf9f8460125d8e31c5ee021156d7916bcc59569e0
                                                                  • Instruction ID: 778c0008692266137b84d163d491526d1cdfb7e7c9bff547e39bf4d453ee2d79
                                                                  • Opcode Fuzzy Hash: 943c7a280ce2b2339d1dd70cf9f8460125d8e31c5ee021156d7916bcc59569e0
                                                                  • Instruction Fuzzy Hash: 7D026C31B1020A8FCB15DB78D45876E7BF7AF88300F148569E50AEB399EF759C428B91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2130 121bae0-121baf1 2131 121baf7-121bafa 2130->2131 2132 121bb9b 2130->2132 2131->2132 2133 121bb00-121bb18 2131->2133 2134 121bba0-121bbd9 2132->2134 2133->2132 2142 121bb1e-121bb22 2133->2142 2137 121bc16 2134->2137 2138 121bbdb-121bbe1 2134->2138 2141 121bc18-121bc1f 2137->2141 2140 121bbe4-121bbe6 2138->2140 2143 121bc25-121bc59 2140->2143 2144 121bbe8-121bbf1 2140->2144 2145 121bb24 2142->2145 2146 121bb46-121bb4c 2142->2146 2157 121bcb9-121bcc6 2143->2157 2158 121bc5b-121bc61 2143->2158 2148 121bbf3-121bbf6 2144->2148 2149 121bc05-121bc0f 2144->2149 2150 121bb27-121bb2a 2145->2150 2146->2132 2147 121bb4e-121bb50 2146->2147 2151 121bb52 2147->2151 2152 121bb74-121bb7b 2147->2152 2160 121bbfe-121bc03 2148->2160 2153 121bc11-121bc14 2149->2153 2154 121bc20 2149->2154 2150->2134 2155 121bb2c-121bb38 2150->2155 2159 121bb55-121bb58 2151->2159 2152->2134 2161 121bb7d-121bb86 2152->2161 2153->2137 2153->2140 2154->2143 2155->2132 2162 121bb3a-121bb40 2155->2162 2168 121bcc8-121bccf 2157->2168 2164 121bc63-121bc6f 2158->2164 2165 121bcd7-121bd11 2158->2165 2159->2134 2166 121bb5a-121bb66 2159->2166 2160->2141 2161->2132 2167 121bb88-121bb91 2161->2167 2162->2132 2163 121bb42-121bb44 2162->2163 2163->2146 2163->2150 2169 121bc71-121bc7b 2164->2169 2170 121bca8-121bcb2 2164->2170 2217 121bd13 call 121bad1 2165->2217 2218 121bd13 call 121bae0 2165->2218 2219 121bd13 call 121bc30 2165->2219 2166->2132 2171 121bb68-121bb6e 2166->2171 2167->2132 2172 121bb93-121bb9a 2167->2172 2169->2170 2174 121bc7d-121bca6 2169->2174 2176 121bcd2 2170->2176 2177 121bcb4-121bcb7 2170->2177 2171->2132 2175 121bb70-121bb72 2171->2175 2174->2168 2175->2152 2175->2159 2176->2165 2177->2157 2177->2158 2178 121bd19-121bd20 2180 121bd22-121bd27 2178->2180 2181 121bd2c-121bd4c 2178->2181 2182 121bdf5-121bdfc 2180->2182 2185 121bd87-121bd89 2181->2185 2186 121bd4e-121bd50 2181->2186 2189 121bdf0 2185->2189 2190 121bd8b-121bd91 2185->2190 2187 121bd52-121bd57 2186->2187 2188 121bd5f-121bd66 2186->2188 2187->2188 2192 121bd6c-121bd85 2188->2192 2193 121bdff-121be2b call 121b6e0 2188->2193 2189->2182 2190->2189 2191 121bd93-121bdae 2190->2191 2198 121bdb0-121bdb2 2191->2198 2199 121bde5-121bde7 2191->2199 2192->2182 2204 121be39-121be42 call 121b6e0 2193->2204 2205 121be2d-121be37 2193->2205 2201 121bdc1-121bdc8 2198->2201 2202 121bdb4-121bdb9 2198->2202 2199->2189 2203 121bde9-121bdee 2199->2203 2201->2193 2206 121bdca-121bde3 2201->2206 2202->2201 2203->2182 2211 121be50-121be59 2204->2211 2212 121be44-121be4e 2204->2212 2205->2204 2206->2182 2214 121be64-121be8d 2211->2214 2212->2211 2217->2178 2218->2178 2219->2178
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q
                                                                  • API String ID: 0-2697143702
                                                                  • Opcode ID: b4377a49970b6202699154d575aeb3199d5d19fdbfdc7501c5eea75bb552e50b
                                                                  • Instruction ID: 468e72433ba084f19741c2d6736f6551bfb745d6f1803861bbb243fe4ef3d2b2
                                                                  • Opcode Fuzzy Hash: b4377a49970b6202699154d575aeb3199d5d19fdbfdc7501c5eea75bb552e50b
                                                                  • Instruction Fuzzy Hash: 9BC10970A102058FC715CF2CC88466ABBF6FF98310F588566E918DB35AEB31ED52C7A1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq$Hbq
                                                                  • API String ID: 0-4258043069
                                                                  • Opcode ID: ecc73030501d629b3984a9e2a2efdb3b08673f4fe91de8627948303dc50405aa
                                                                  • Instruction ID: 8e59281891b3acb7599d692acae0c873621e6d8436d6365d74de7bcf3882abdb
                                                                  • Opcode Fuzzy Hash: ecc73030501d629b3984a9e2a2efdb3b08673f4fe91de8627948303dc50405aa
                                                                  • Instruction Fuzzy Hash: D7919E70B101099FDF19EE68D865B6E7BE6BB98744F148828E605DB384DF70DC41CB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q$\
                                                                  • API String ID: 0-1717531024
                                                                  • Opcode ID: 206dfffcb15c602b1477fe272c4ad6e93f089d4bd5bab871e8a81f22fe3ed613
                                                                  • Instruction ID: b97a068228fc22ed25e6779150e31e7cf59d6249cad42f18a193752f9807ed06
                                                                  • Opcode Fuzzy Hash: 206dfffcb15c602b1477fe272c4ad6e93f089d4bd5bab871e8a81f22fe3ed613
                                                                  • Instruction Fuzzy Hash: 4541F671F142419FD706DB78C840BBF7BFAABE2340F1481AAE108DB295EB74D8058791
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q
                                                                  • API String ID: 0-2325994563
                                                                  • Opcode ID: fc8de4ada8817f1da4518f1f24fa4a124cbb43f818d86a931885a50c95d4f540
                                                                  • Instruction ID: b80e0bb9b71b63611f276c8018b953cf9fbb3d5b02bf339e6ac351b956806620
                                                                  • Opcode Fuzzy Hash: fc8de4ada8817f1da4518f1f24fa4a124cbb43f818d86a931885a50c95d4f540
                                                                  • Instruction Fuzzy Hash: 23415135B102058FDB68DB78E55C76E7AE7AFC8650F244428E506DB398EF748C428B91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147782857.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1220000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 0c2b5d1f893327af9c52c21e70ae6ff345afdfe4e7a02900146faf45a0a7abdc
                                                                  • Instruction ID: ea52e787f577ef3d16b73adae848361734070c260cf88451a9216d8d3cfd640f
                                                                  • Opcode Fuzzy Hash: 0c2b5d1f893327af9c52c21e70ae6ff345afdfe4e7a02900146faf45a0a7abdc
                                                                  • Instruction Fuzzy Hash: 5A615F31B20255DFDB24EFB8D858BAEBBF2AF45300F108528E506AB394DF759845CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 28928f0670a4521aa4175ea93cdbbdcdc716c10c59c7ff8515f519bcd0297bc2
                                                                  • Instruction ID: 670981ba2aea191ba9de5b1df9398bece2db954fc031e4a6af97c18572a544bc
                                                                  • Opcode Fuzzy Hash: 28928f0670a4521aa4175ea93cdbbdcdc716c10c59c7ff8515f519bcd0297bc2
                                                                  • Instruction Fuzzy Hash: 28415F72E143998FCB05CFB9D8002AEBFF0EF8A210F1486AFD444AB251DB749845CB91
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C7680A
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 3452738daf3eafb2a311ead058b4f791e225cafc90e15a85b7a51ae9bae68ff0
                                                                  • Instruction ID: acc6ffc003bbe2598529ce034eb84ba68ae47fb33dcdce681d3a8e7e89144150
                                                                  • Opcode Fuzzy Hash: 3452738daf3eafb2a311ead058b4f791e225cafc90e15a85b7a51ae9bae68ff0
                                                                  • Instruction Fuzzy Hash: C451C2B1D00309DFDB14CFAAC984ADEBBB5FF88314F24812AE419AB210D775A945CF91
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 02C7680A
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 25e928b1a1f1a276ebee0203bf23f8246146a22813e99627138d9b3ef0fc00f0
                                                                  • Instruction ID: 968152f99364bed13582e02b3dcfd82539ae95a06bf4a99b4c62b8a67d872f86
                                                                  • Opcode Fuzzy Hash: 25e928b1a1f1a276ebee0203bf23f8246146a22813e99627138d9b3ef0fc00f0
                                                                  • Instruction Fuzzy Hash: B351C1B1D00309DFDB14CF9AC984ADEBBB5FF88314F64812AE419AB210D775A985CF91
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 02C7B579
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: 7a658107387946b253385bf67f3556a11b3a3c50023357ea30be517010ed6337
                                                                  • Instruction ID: cb0c67d9f9033e028f3809e1262fdfdacbb8705fe5be7a872c2cc60908ced201
                                                                  • Opcode Fuzzy Hash: 7a658107387946b253385bf67f3556a11b3a3c50023357ea30be517010ed6337
                                                                  • Instruction Fuzzy Hash: C341E8B9900745CFCB54CF99C488AAABBF5FF88318F24C459E519AB321D774A941CFA0
                                                                  APIs
                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 064F7039
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID:
                                                                  • API String ID: 3660427363-0
                                                                  • Opcode ID: 61a2ee2bfeae6e4b55901dfb7e3bd92ad896fd0e7d4b4639a4772389574129e5
                                                                  • Instruction ID: d2c2ddd9f123ae7a19addfe68bc7f39075fa8ee9c25dce1c9c6f9978ba198422
                                                                  • Opcode Fuzzy Hash: 61a2ee2bfeae6e4b55901dfb7e3bd92ad896fd0e7d4b4639a4772389574129e5
                                                                  • Instruction Fuzzy Hash: 8C41FFB1D102589FCB60CFAAD984ADEBBF5BF49314F14802AE918AB320C7759945CF90
                                                                  APIs
                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 064F7039
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID:
                                                                  • API String ID: 3660427363-0
                                                                  • Opcode ID: 6e442db3847cafbe9c78a6236c03ae6bc4ce7b83b3edf0850d89ee82977a66dd
                                                                  • Instruction ID: 4ea737ca3573fad3f0165671947f26c5f0cd6cec0d7d66533b1344e974ad3422
                                                                  • Opcode Fuzzy Hash: 6e442db3847cafbe9c78a6236c03ae6bc4ce7b83b3edf0850d89ee82977a66dd
                                                                  • Instruction Fuzzy Hash: 1031F0B1D102589FCB60CF9AD984A9EFBF5BF48314F14802AE918AB310D775A945CFA4
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 064F6DCC
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID:
                                                                  • API String ID: 71445658-0
                                                                  • Opcode ID: c02eab9de6dab0607ccf7af9f4e16e721190b2c144f5e5ba1be1466d9adec599
                                                                  • Instruction ID: ece4f88bcff17cd8dce238d6471d89f0122ba86800811efd00d6fe2e1ebe80d0
                                                                  • Opcode Fuzzy Hash: c02eab9de6dab0607ccf7af9f4e16e721190b2c144f5e5ba1be1466d9adec599
                                                                  • Instruction Fuzzy Hash: 1331FFB1C002498FDB14CF99C584A9EFFF5BF48304F25856AE808AB255C7759885CFA4
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 064F6DCC
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID:
                                                                  • API String ID: 71445658-0
                                                                  • Opcode ID: af1a84636e7209a03e406e60e3f052f8986d8e9e6da59b2b24853e0ecbf0c017
                                                                  • Instruction ID: fef4e5b62d2fa609d7e28168425b2d5b74baf1de24505bdf6de07d0bdfeeb894
                                                                  • Opcode Fuzzy Hash: af1a84636e7209a03e406e60e3f052f8986d8e9e6da59b2b24853e0ecbf0c017
                                                                  • Instruction Fuzzy Hash: C1310DB1D002898FDB10CF99C584A8EFFF5BB08304F29816AE908AB355C7759885CFA4
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147782857.0000000001220000.00000040.00000800.00020000.00000000.sdmp, Offset: 01220000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1220000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 5ea723a52244767a7bd3ca764d6ceb43b7e44262a4d6d243b3e8ee38228a3c52
                                                                  • Instruction ID: 99a7ce1dbc63d4aedbfc379b6b4b62c4ee3dfa78fd62506effbb04711a73d6fe
                                                                  • Opcode Fuzzy Hash: 5ea723a52244767a7bd3ca764d6ceb43b7e44262a4d6d243b3e8ee38228a3c52
                                                                  • Instruction Fuzzy Hash: 5E31A970A10344EFCB15EFB8E458AADBBB2BF45301F148569D001AB291EB399849CF50
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C7A5BE,?,?,?,?,?), ref: 02C7A67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 387bf5236c9564fc96d46fcd132363f7f9a9a638c1c599335164b2daa8515bee
                                                                  • Instruction ID: 4d87febf1b736757eb4b94891985fac30d015d2f628b975081172d08f63f41ec
                                                                  • Opcode Fuzzy Hash: 387bf5236c9564fc96d46fcd132363f7f9a9a638c1c599335164b2daa8515bee
                                                                  • Instruction Fuzzy Hash: AB3126B5900248AFCB00CFAAC884AEEBFF4EB19310F14845AE958A7351D334A944CFA5
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02C7A5BE,?,?,?,?,?), ref: 02C7A67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 40eaee70e5bde246d37d89b66719959bbfd6a10ad2efeceb856ea95fcf6f855e
                                                                  • Instruction ID: 2b34b0e3388447425293a06195d3bd4ff9bbc0ebd5be26181907b37315f6e024
                                                                  • Opcode Fuzzy Hash: 40eaee70e5bde246d37d89b66719959bbfd6a10ad2efeceb856ea95fcf6f855e
                                                                  • Instruction Fuzzy Hash: D721E4B5900258DFDB10CFAAD584ADEBFF9EB48314F14801AE918A7310D378A954CFA5
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,064F908A), ref: 064F9177
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: 83131e11b77bff55f7df7fcebf47f5117368d7b65a2b03b34b60e298a432c40c
                                                                  • Instruction ID: f31fe7b0fdf611427624b5ee0c784993531a4a051c05c189b828f7642a1a950c
                                                                  • Opcode Fuzzy Hash: 83131e11b77bff55f7df7fcebf47f5117368d7b65a2b03b34b60e298a432c40c
                                                                  • Instruction Fuzzy Hash: 701144B1C0026A9FCB10CFAAC544BDEFBF4EF48324F10816AD418A7250D378AA44CFA5
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,064F908A), ref: 064F9177
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195325898.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_64f0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: d095304465e0bc045717e315117dd303b86ebcc81a49ab9a2565aa05b54bee32
                                                                  • Instruction ID: 9bf7842a7b292326dd4d7f73abed90f6b72b6fcd1c1233c68a9d3e39f0e38c85
                                                                  • Opcode Fuzzy Hash: d095304465e0bc045717e315117dd303b86ebcc81a49ab9a2565aa05b54bee32
                                                                  • Instruction Fuzzy Hash: 661114B1C006699FDB10DF9AC544BDEFBF8EB48324F10816AE918A7251D378A944CFE5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 02C756B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: f414ad17f78101ff9313345e5651f0eedadbdc003e2de31a8bb16e885de2b487
                                                                  • Instruction ID: 72324b1ccdaeb997fd26fc4a31600660cd481f22e3d1e0d77209fd8c3a867d0e
                                                                  • Opcode Fuzzy Hash: f414ad17f78101ff9313345e5651f0eedadbdc003e2de31a8bb16e885de2b487
                                                                  • Instruction Fuzzy Hash: 0011FDB5D007498FDB10DF9AC444ADEFBF4AB88224F50846AD829B7310D379A545CFA5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 02C756B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4150582836.0000000002C70000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C70000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_2c70000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 790d94991965fe35ae665ce1b66df28ba2511c2834440e4f461db0a9c6b28c13
                                                                  • Instruction ID: cd89870b5c4e6030592c0703bed18b7ee332e7ad5ef18da663c2548b8b64d2ed
                                                                  • Opcode Fuzzy Hash: 790d94991965fe35ae665ce1b66df28ba2511c2834440e4f461db0a9c6b28c13
                                                                  • Instruction Fuzzy Hash: 8611F0B5C002498FDB10DF9AC444BDEFBF5AF89214F14846AD858A7310C375A545CFA5
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 065E9EE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195891915.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_65e0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: 052105a7499674be39f3cd79826a13a3d1cfc5de49f3d22ebe253674e6ef5fd1
                                                                  • Instruction ID: f75a00e60bcdda797ef7b4d417d0c49c6bc84a474dbef3bf62c28dba6d6ae749
                                                                  • Opcode Fuzzy Hash: 052105a7499674be39f3cd79826a13a3d1cfc5de49f3d22ebe253674e6ef5fd1
                                                                  • Instruction Fuzzy Hash: 351145B0900749CFCB20DF9AC448BDEBBF4FB48324F108459E618A7210C375A940CFA5
                                                                  APIs
                                                                  • OleInitialize.OLE32(00000000), ref: 065E9EE5
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4195891915.00000000065E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 065E0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_65e0000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize
                                                                  • String ID:
                                                                  • API String ID: 2538663250-0
                                                                  • Opcode ID: e8f0659e608f37e280db995bb05c39f7610e36ac570fd8560a98e37dfb4c1899
                                                                  • Instruction ID: 95dc14787f7d73ee3b9e31dfff2dbf4968d37b02e5beb5dc50b7c2529725cd1e
                                                                  • Opcode Fuzzy Hash: e8f0659e608f37e280db995bb05c39f7610e36ac570fd8560a98e37dfb4c1899
                                                                  • Instruction Fuzzy Hash: 2B1133B190069A8FCB20CFA9D448BCEFFF4AB48324F24845AD198A7650C335A584CFA5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq
                                                                  • API String ID: 0-1245868
                                                                  • Opcode ID: 488c765003667a843cc42ae51ba55cf8b73a1ec5d3808b306746ea019e5a6e14
                                                                  • Instruction ID: 88adacb254a710b57a981fbc164d9696241d7763c6c3cb00d494f40985cc4c2b
                                                                  • Opcode Fuzzy Hash: 488c765003667a843cc42ae51ba55cf8b73a1ec5d3808b306746ea019e5a6e14
                                                                  • Instruction Fuzzy Hash: 5A31B234E20105CBDB28EBBCD45437E7AE5EBD5B00F508969D11ADB788DB349D828782
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq
                                                                  • API String ID: 0-1245868
                                                                  • Opcode ID: f7fe9f528949ba254f138aeb394c2fe4e925d94639fd8b7b60dc925ec30f3178
                                                                  • Instruction ID: a47c166bbd9524cf48421bb20765c9b032f7689d6a9f1ffa791db0b0e8cfed95
                                                                  • Opcode Fuzzy Hash: f7fe9f528949ba254f138aeb394c2fe4e925d94639fd8b7b60dc925ec30f3178
                                                                  • Instruction Fuzzy Hash: BB31D175E142059FCB55DBBCC8087AA7BF1EFA1300F5485FAD408DB296EB368946CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 448fc784d4810695cbbbe324fdc46a3d4a4c86a31cb59670610979a086d4872a
                                                                  • Instruction ID: 0c7a044c4492be4fef9037326694d607ec421f19a3af1dfa4e81a2a5cf9258f2
                                                                  • Opcode Fuzzy Hash: 448fc784d4810695cbbbe324fdc46a3d4a4c86a31cb59670610979a086d4872a
                                                                  • Instruction Fuzzy Hash: F8129031B102058FCB15DBB8E9586AE7BF2EF99300F1484A9E505DB359EB35DC42CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c164e1b8cf7f91a352ee5195ca5a86933d675710262acc9f0326a912e00ef02d
                                                                  • Instruction ID: 133ff5301b3c2df9c5184e357632822de294d11e259794cfac087a70cb0cec47
                                                                  • Opcode Fuzzy Hash: c164e1b8cf7f91a352ee5195ca5a86933d675710262acc9f0326a912e00ef02d
                                                                  • Instruction Fuzzy Hash: 53F14430F102458FDB05EBB8D9582AE7BF2EF91304F24846AD555EB399DE309C4AC752
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8d627737dc472caa1568aff3ef96d0a7ec655f4cb62a2c67543404cc1a89ac68
                                                                  • Instruction ID: 28445a534c1ca1b21acc759dc3a5ec97adecff5745fbe7fab10bcfa24cf2012e
                                                                  • Opcode Fuzzy Hash: 8d627737dc472caa1568aff3ef96d0a7ec655f4cb62a2c67543404cc1a89ac68
                                                                  • Instruction Fuzzy Hash: 66A1AB71A10249DFCF15CFA8C884ADEBFF2FF59300F14855AE905AB269DB70A845CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8b4ccde1c71b04b27a775360239f31a357f10710d1e2a68c0b25709e21693428
                                                                  • Instruction ID: 851a18f2e9dfd0e6a4ffe66964495a702f557d53f12513386a637e925fefd33d
                                                                  • Opcode Fuzzy Hash: 8b4ccde1c71b04b27a775360239f31a357f10710d1e2a68c0b25709e21693428
                                                                  • Instruction Fuzzy Hash: 00816C3172024A8FDB25DF2CC894A797BF5AF99700F1940AAEA05CB3A5DB70DC41CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 52da0fef636c5a61066b2d1cf56f6d79a702f3872d1ed4a86572faacef594088
                                                                  • Instruction ID: c4a5f8eee1923460684dd1c4b066b1505ec910d9031a2bf88d308f1426afed5c
                                                                  • Opcode Fuzzy Hash: 52da0fef636c5a61066b2d1cf56f6d79a702f3872d1ed4a86572faacef594088
                                                                  • Instruction Fuzzy Hash: 8C618170E1075A8FDF22CFA9C5806DEFBF2AF59300F648619E915AB246D770A945CF40
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 64ff019a073322f849fcc739203579a19b030cd4b6cf1d1ef73a491e0d3c5fbb
                                                                  • Instruction ID: 467f143e9633d8be558af1c976dc1980bb5b08660f08db7c347b88791ef980ed
                                                                  • Opcode Fuzzy Hash: 64ff019a073322f849fcc739203579a19b030cd4b6cf1d1ef73a491e0d3c5fbb
                                                                  • Instruction Fuzzy Hash: 6261A375D10218CFCB24EFB4E89869DBBB5FF89301F108569E80AAB354DB349842CF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c81c90729c54cec75204b9b5d4aee61ec30a9ea84d18be78a4f85380b278dc77
                                                                  • Instruction ID: eb5aee7b804f6ed3fc895c3638590aa7cc3a3cd717b05419afd6c5972c9a25f1
                                                                  • Opcode Fuzzy Hash: c81c90729c54cec75204b9b5d4aee61ec30a9ea84d18be78a4f85380b278dc77
                                                                  • Instruction Fuzzy Hash: EA518F75E107499FDF22CFA9C1806DDBBF2AF9A300F644619E908AB246D770AD85CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dfd371502c9d07fa2a09bcb0435f876f74a007051c250820a43f7f62cd70e46b
                                                                  • Instruction ID: c2bf86af13e1a8a94c437120ee6770cfaefe785c6d059615d52ed529dcabadeb
                                                                  • Opcode Fuzzy Hash: dfd371502c9d07fa2a09bcb0435f876f74a007051c250820a43f7f62cd70e46b
                                                                  • Instruction Fuzzy Hash: F541AF31A1024ADFCF12CFA8C884A9DBFF2FF59310F058555E955AB29AD774E910CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d54e22b7ccab0519f625d229932d156e4d922dcb3de320ca84bf7d45fa0da975
                                                                  • Instruction ID: c835c012ceeaba17f47a9a9692df02c6332a2683f5a630d5697e12573393d9fa
                                                                  • Opcode Fuzzy Hash: d54e22b7ccab0519f625d229932d156e4d922dcb3de320ca84bf7d45fa0da975
                                                                  • Instruction Fuzzy Hash: CD31E4B5E102498FCB05DFA8E544AAEBBF2EF95314F24817AD108D7345E735E842CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 860ce2654021f6378cc7fb8c4cfabdad286c6f010f1ec2c1febcbcd344459721
                                                                  • Instruction ID: d72ed229823faa2b7e36076982d91de72663b030adf125adbbbee9929920271d
                                                                  • Opcode Fuzzy Hash: 860ce2654021f6378cc7fb8c4cfabdad286c6f010f1ec2c1febcbcd344459721
                                                                  • Instruction Fuzzy Hash: 89218071F102159FDB10EFB9A8086AE7BF6EF99650F004065D909EB348EB30DD018BD5
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4148961137.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_12ed000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 09b31c710467beadb89a182b2020523ec124d592f3611a27e7ceed1a9b2a5273
                                                                  • Instruction ID: 62d1fc9ec67c14eb6e2d633798b2f41fb131d5f0c2902100a8154501533e04f7
                                                                  • Opcode Fuzzy Hash: 09b31c710467beadb89a182b2020523ec124d592f3611a27e7ceed1a9b2a5273
                                                                  • Instruction Fuzzy Hash: A1216470214208DFCB11DF68D9C8B26BFA1FB84314F68C56DD90A4B256C37BD407CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ba623ab40a0d0b3a1fd5799b30457c5449fbd6dc9656edd797c1a4e0fe0cc481
                                                                  • Instruction ID: a48c37b386627e2f91495552336c5d83dbfc3cf1021d01eb0eaf202488d1cd38
                                                                  • Opcode Fuzzy Hash: ba623ab40a0d0b3a1fd5799b30457c5449fbd6dc9656edd797c1a4e0fe0cc481
                                                                  • Instruction Fuzzy Hash: 4A218D70E20249DFDB24DFA5D855BAEBFF5BF44300F144429E501A7388DB759901CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f910c8d0f96cbaeea3858e0c899907f0a7ad1a9e19125d203e91a354d363c722
                                                                  • Instruction ID: fd9b743ad3ba1a393624134d5fdd263d80adbc77e7d8b149d856c852895b7b22
                                                                  • Opcode Fuzzy Hash: f910c8d0f96cbaeea3858e0c899907f0a7ad1a9e19125d203e91a354d363c722
                                                                  • Instruction Fuzzy Hash: DE218974E10289DFDB15DFA5D550AEEBFFAAF88301F24806AE911E6358DB309901DF60
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f1251a017939091b18e76f0016846ccccb3a6c8c1bf95caf678e2e4a3f21f19f
                                                                  • Instruction ID: 91e9b469d67b5bb0d25c02a10a80289d09cb6a35345d718da38a356ae9b698a5
                                                                  • Opcode Fuzzy Hash: f1251a017939091b18e76f0016846ccccb3a6c8c1bf95caf678e2e4a3f21f19f
                                                                  • Instruction Fuzzy Hash: B52119B5D102099BCF24EFB4E85969DBBB1FF88300F108569D55AEB344DB345846CF41
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 77e9cb30b7758b74b6ca1116cfad2f824515a0ba7927ef28bcdbc1d177293160
                                                                  • Instruction ID: f9aae9f2509f7ed55a9712d9028288aaa9be9ee867736d155a214c5c91fc07d3
                                                                  • Opcode Fuzzy Hash: 77e9cb30b7758b74b6ca1116cfad2f824515a0ba7927ef28bcdbc1d177293160
                                                                  • Instruction Fuzzy Hash: 4811B431A00245AFDB10CF58C8C4B5EBFE6EF95314F058555D6186B29AD371E810CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4148961137.00000000012ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 012ED000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_12ed000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: 40d65b2d6505f8c138cab06617c4e934032fa005cb4b460ea41412ed1fcff82e
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 2F11DD75504284CFDB12CF58D5C8B16FFA2FB84314F28C6AAD9094B656C33BD40ACBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6f6c743b8643207b555cd9c9db9726eda3fa9c27547c4323d6b525055dc5a991
                                                                  • Instruction ID: 0296eb356635ebe23cb5dceaecd4e20881011f1fc768bfb3aaed999ab38156a1
                                                                  • Opcode Fuzzy Hash: 6f6c743b8643207b555cd9c9db9726eda3fa9c27547c4323d6b525055dc5a991
                                                                  • Instruction Fuzzy Hash: F311C1B1E20259DFEB28DF64D955BAEBBB5BF44301F144829E501E7398EB349802CB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d27df2029ea434cf30fd0c6ce9781ddb24c4f131acd4c7f549cdd05c21a45427
                                                                  • Instruction ID: c4e4b37b408954787392ef86e89a19ff5eb7d2fa65dd3e8422d485feebdc2afd
                                                                  • Opcode Fuzzy Hash: d27df2029ea434cf30fd0c6ce9781ddb24c4f131acd4c7f549cdd05c21a45427
                                                                  • Instruction Fuzzy Hash: 90011372E002189FCF09CFD8CA419DDBBF9FF88310F00812AE905AB254EB3199158B90
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c930a2dcaedcd83366c0265e43cfd6ce9cc96ccb35afc27b50ba705a87503eea
                                                                  • Instruction ID: 8bc8a4f36dcd8fd43771dd2f0d9fbbc403a43cf6f8a054fa736c271b40f44b81
                                                                  • Opcode Fuzzy Hash: c930a2dcaedcd83366c0265e43cfd6ce9cc96ccb35afc27b50ba705a87503eea
                                                                  • Instruction Fuzzy Hash: 52E02BF6E141148F8740DFBC69052FE7BF8EA4C221B054526D64DE3304F77086028BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5751aacd636dba01e053c09e3d546faacaffc8ea442633beb6ed7af2a0d85865
                                                                  • Instruction ID: 34c6e44a87f280f1ecb4bfdc7b28e79a8108fec7a855d46a30f9739528855da4
                                                                  • Opcode Fuzzy Hash: 5751aacd636dba01e053c09e3d546faacaffc8ea442633beb6ed7af2a0d85865
                                                                  • Instruction Fuzzy Hash: BFE01271E141199F4B50EBADA8055AFBBF8EA8C211B04447AE60DD3304EA704A018BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05b82398b7072d7c85c533225932b32192aa27d3b11d653d7974cc22958cfc04
                                                                  • Instruction ID: 2255addc790d71faa29cd4ceda2e3cd9687d11e9e541c6abb85ac897cc13bba2
                                                                  • Opcode Fuzzy Hash: 05b82398b7072d7c85c533225932b32192aa27d3b11d653d7974cc22958cfc04
                                                                  • Instruction Fuzzy Hash: BFD01201B612669ECF856ABF151523E04C72AD42D2B608C7A6603CA3EEFC6DCA841255
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq$Xbq$Xbq$Xbq
                                                                  • API String ID: 0-2732225958
                                                                  • Opcode ID: 4f85eecb886aa8e5a3c424cdb3d97c17cf9f185a8b7844caf82f379879ec6e6a
                                                                  • Instruction ID: 5fe6432aad43d0f3c2cd32db6abfa22b65e92b65a9298fd7561ac147a333e4bb
                                                                  • Opcode Fuzzy Hash: 4f85eecb886aa8e5a3c424cdb3d97c17cf9f185a8b7844caf82f379879ec6e6a
                                                                  • Instruction Fuzzy Hash: 63D13932672786CFD742DB38C0152A5F7F4FF1536AB3801A9E014DA229E7714A628F59
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000002.00000002.4147473235.0000000001210000.00000040.00000800.00020000.00000000.sdmp, Offset: 01210000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_2_2_1210000_rwzBBMVxUb.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq$Xbq$Xbq$Xbq
                                                                  • API String ID: 0-2732225958
                                                                  • Opcode ID: 274b32644749462484a33bcde8cb8afe82209653f8477824390581f43425ce71
                                                                  • Instruction ID: c3ec967f8433f7f30cce33b7272c1442d7a726d6f2150ee361792aa6c84bbda5
                                                                  • Opcode Fuzzy Hash: 274b32644749462484a33bcde8cb8afe82209653f8477824390581f43425ce71
                                                                  • Instruction Fuzzy Hash: F831B470E5129A8BDF75CFAC854436EBAF2EBA4310F1440B5C619A7299DB71C981CBC2

                                                                  Execution Graph

                                                                  Execution Coverage:11.1%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:216
                                                                  Total number of Limit Nodes:14
                                                                  execution_graph 26372 2486d58 26373 2486d68 26372->26373 26374 2486d79 26373->26374 26377 2486e7f 26373->26377 26382 2486db7 26373->26382 26378 2486e84 26377->26378 26379 2486ee9 26378->26379 26387 2487020 26378->26387 26391 2487011 26378->26391 26379->26374 26383 2486dc8 26382->26383 26384 2486ee9 26383->26384 26385 2487020 4 API calls 26383->26385 26386 2487011 4 API calls 26383->26386 26384->26374 26385->26384 26386->26384 26389 248702d 26387->26389 26388 2487067 26388->26379 26389->26388 26395 2486ab0 26389->26395 26392 248702d 26391->26392 26393 2487067 26392->26393 26394 2486ab0 4 API calls 26392->26394 26393->26379 26394->26393 26396 2486abb 26395->26396 26398 2487d80 26396->26398 26399 248721c 26396->26399 26398->26398 26400 2487227 26399->26400 26404 248d108 26400->26404 26413 248d120 26400->26413 26401 2487e29 26401->26398 26406 248d151 26404->26406 26407 248d252 26404->26407 26405 248d15d 26405->26401 26406->26405 26422 248d488 26406->26422 26426 248d479 26406->26426 26407->26401 26408 248d19e 26408->26407 26430 248e7a8 26408->26430 26439 248e797 26408->26439 26415 248d151 26413->26415 26417 248d252 26413->26417 26414 248d15d 26414->26401 26415->26414 26420 248d488 3 API calls 26415->26420 26421 248d479 3 API calls 26415->26421 26416 248d19e 26416->26417 26418 248e7a8 2 API calls 26416->26418 26419 248e797 2 API calls 26416->26419 26417->26401 26418->26417 26419->26417 26420->26416 26421->26416 26423 248d492 26422->26423 26448 248d4c8 26422->26448 26458 248d4d8 26422->26458 26423->26408 26428 248d4c8 2 API calls 26426->26428 26429 248d4d8 2 API calls 26426->26429 26427 248d492 26427->26408 26428->26427 26429->26427 26431 248e7d3 26430->26431 26478 248ecf4 26431->26478 26432 248e856 26433 248c374 GetModuleHandleW 26432->26433 26435 248e882 26432->26435 26434 248e8c6 26433->26434 26436 248f680 CreateWindowExW 26434->26436 26437 248f590 CreateWindowExW 26434->26437 26436->26435 26437->26435 26440 248e7d3 26439->26440 26445 248ecf4 GetModuleHandleW 26440->26445 26441 248e856 26442 248c374 GetModuleHandleW 26441->26442 26444 248e882 26441->26444 26443 248e8c6 26442->26443 26503 248f680 26443->26503 26506 248f590 26443->26506 26445->26441 26449 248d4e9 26448->26449 26452 248d50c 26448->26452 26468 248c374 26449->26468 26452->26423 26453 248d504 26453->26452 26454 248d710 GetModuleHandleW 26453->26454 26455 248d73d 26454->26455 26455->26423 26459 248d4e9 26458->26459 26463 248d50c 26458->26463 26460 248c374 GetModuleHandleW 26459->26460 26461 248d4f4 26460->26461 26461->26463 26466 248d770 GetModuleHandleW 26461->26466 26467 248d761 GetModuleHandleW 26461->26467 26462 248d504 26462->26463 26464 248d710 GetModuleHandleW 26462->26464 26463->26423 26465 248d73d 26464->26465 26465->26423 26466->26462 26467->26462 26469 248d6c8 GetModuleHandleW 26468->26469 26471 248d4f4 26469->26471 26471->26452 26472 248d761 26471->26472 26475 248d770 26471->26475 26473 248c374 GetModuleHandleW 26472->26473 26474 248d784 26473->26474 26474->26453 26476 248c374 GetModuleHandleW 26475->26476 26477 248d784 26475->26477 26476->26477 26477->26453 26479 248ed2d 26478->26479 26480 248edae 26479->26480 26483 248ee70 26479->26483 26493 248ee62 26479->26493 26484 248ee85 26483->26484 26485 248c374 GetModuleHandleW 26484->26485 26487 248eea9 26484->26487 26485->26487 26486 248f065 26486->26480 26487->26486 26488 248c374 GetModuleHandleW 26487->26488 26489 248efeb 26488->26489 26489->26486 26490 248c374 GetModuleHandleW 26489->26490 26491 248f039 26490->26491 26491->26486 26492 248c374 GetModuleHandleW 26491->26492 26492->26486 26494 248ee85 26493->26494 26495 248c374 GetModuleHandleW 26494->26495 26497 248eea9 26494->26497 26495->26497 26496 248f065 26496->26480 26497->26496 26498 248c374 GetModuleHandleW 26497->26498 26499 248efeb 26498->26499 26499->26496 26500 248c374 GetModuleHandleW 26499->26500 26501 248f039 26500->26501 26501->26496 26502 248c374 GetModuleHandleW 26501->26502 26502->26496 26509 248c53c 26503->26509 26507 248f6b5 26506->26507 26508 248c53c CreateWindowExW 26506->26508 26507->26444 26508->26507 26510 248fad0 CreateWindowExW 26509->26510 26512 248fbf4 26510->26512 26513 8347fd0 26515 8347ff2 26513->26515 26514 83484b6 26515->26514 26517 8348516 26515->26517 26518 8348532 26517->26518 26526 8348a54 26518->26526 26531 8348a7f 26518->26531 26536 8348d53 26518->26536 26541 83490e2 26518->26541 26549 8348b91 26518->26549 26563 8348d80 26518->26563 26519 8348559 26519->26515 26527 8348a5e 26526->26527 26577 8347590 26527->26577 26581 8347598 26527->26581 26528 8348af6 26528->26519 26528->26528 26532 8348a99 26531->26532 26534 8347590 ResumeThread 26532->26534 26535 8347598 ResumeThread 26532->26535 26533 8348af6 26533->26519 26533->26533 26534->26533 26535->26533 26537 8348d70 26536->26537 26538 8349258 26537->26538 26585 8347900 26537->26585 26589 83478f8 26537->26589 26542 83490ec 26541->26542 26593 8347810 26542->26593 26597 8347808 26542->26597 26543 83491e2 26544 8349258 26543->26544 26547 8347900 WriteProcessMemory 26543->26547 26548 83478f8 WriteProcessMemory 26543->26548 26547->26544 26548->26544 26550 8348ba2 26549->26550 26551 8348c2c 26550->26551 26601 8347678 26550->26601 26605 8347670 26550->26605 26609 8347a20 26551->26609 26613 8347a18 26551->26613 26552 8348d1d 26554 8348d43 26552->26554 26557 8347810 VirtualAllocEx 26552->26557 26558 8347808 VirtualAllocEx 26552->26558 26553 83491e2 26553->26554 26555 8347900 WriteProcessMemory 26553->26555 26556 83478f8 WriteProcessMemory 26553->26556 26555->26554 26556->26554 26557->26553 26558->26553 26564 8348d91 26563->26564 26565 8348e37 26564->26565 26573 8347900 WriteProcessMemory 26564->26573 26574 83478f8 WriteProcessMemory 26564->26574 26568 8348af6 26565->26568 26569 8347900 WriteProcessMemory 26565->26569 26570 83478f8 WriteProcessMemory 26565->26570 26566 8348eeb 26567 8348a7a 26566->26567 26566->26568 26575 8347670 Wow64SetThreadContext 26566->26575 26576 8347678 Wow64SetThreadContext 26566->26576 26567->26568 26571 8347590 ResumeThread 26567->26571 26572 8347598 ResumeThread 26567->26572 26568->26519 26569->26566 26570->26566 26571->26568 26572->26568 26573->26565 26574->26565 26575->26567 26576->26567 26578 83475d8 ResumeThread 26577->26578 26580 8347609 26578->26580 26580->26528 26582 83475d8 ResumeThread 26581->26582 26584 8347609 26582->26584 26584->26528 26586 8347948 WriteProcessMemory 26585->26586 26588 834799f 26586->26588 26588->26538 26590 8347948 WriteProcessMemory 26589->26590 26592 834799f 26590->26592 26592->26538 26594 8347850 VirtualAllocEx 26593->26594 26596 834788d 26594->26596 26596->26543 26598 8347850 VirtualAllocEx 26597->26598 26600 834788d 26598->26600 26600->26543 26602 83476bd Wow64SetThreadContext 26601->26602 26604 8347705 26602->26604 26604->26551 26606 8347678 Wow64SetThreadContext 26605->26606 26608 8347705 26606->26608 26608->26551 26610 8347a6b ReadProcessMemory 26609->26610 26612 8347aaf 26610->26612 26612->26552 26614 8347a6b ReadProcessMemory 26613->26614 26616 8347aaf 26614->26616 26616->26552 26355 2487540 26356 2487586 26355->26356 26360 2487720 26356->26360 26363 2487712 26356->26363 26357 2487673 26361 248774e 26360->26361 26369 2486ae4 26360->26369 26361->26357 26364 2487778 DuplicateHandle 26363->26364 26365 248771b 26363->26365 26368 248781e 26364->26368 26366 2486ae4 DuplicateHandle 26365->26366 26367 248774e 26366->26367 26367->26357 26368->26357 26370 2487788 DuplicateHandle 26369->26370 26371 248781e 26370->26371 26371->26361 26617 8347c18 26618 8347ca1 CreateProcessA 26617->26618 26620 8347e63 26618->26620 26620->26620 26621 8349488 26622 8349613 26621->26622 26623 83494ae 26621->26623 26623->26622 26626 8349700 26623->26626 26629 8349708 PostMessageW 26623->26629 26627 8349708 PostMessageW 26626->26627 26628 8349774 26627->26628 26628->26623 26630 8349774 26629->26630 26630->26623
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e9eadb3f322e38bf089089a9e88f20610718c545dd9f8b6c76c46b3c191caf2
                                                                  • Instruction ID: 3acc9ef013d17adc3e7ba8a1885b920826591705ab8bffd1eb0d85589946d7b8
                                                                  • Opcode Fuzzy Hash: 0e9eadb3f322e38bf089089a9e88f20610718c545dd9f8b6c76c46b3c191caf2
                                                                  • Instruction Fuzzy Hash: C9912D74D012098BDB04DFAAD89879EBBF2BF48310F14D529E804E7399DB749982CF59
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d0331a28a23feee5357de3d98a4124c9b4b106f75f85d4a3619770c5f7084ce6
                                                                  • Instruction ID: af7cf9a39d4f3ed79b30e20cd94b4866d78d83d721a861d239fe3f8da99b6d58
                                                                  • Opcode Fuzzy Hash: d0331a28a23feee5357de3d98a4124c9b4b106f75f85d4a3619770c5f7084ce6
                                                                  • Instruction Fuzzy Hash: CBA1F370E00219CBDB54DFA9D8887EEBBB2BF89300F10D469D908B7295EB705986CF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4b1a4d448457dbab38e352c76eaf3c19b6c7a7a4eed75932c250d269087afbd
                                                                  • Instruction ID: 3c0d2d8718484f0f8b5fccbe2959aebc9c8701bcb55c5849cb533fdae68af8f5
                                                                  • Opcode Fuzzy Hash: b4b1a4d448457dbab38e352c76eaf3c19b6c7a7a4eed75932c250d269087afbd
                                                                  • Instruction Fuzzy Hash: 7A811671E042198FDB14CFA9D8947EEBBB2BF89300F14D4A9D908E7295EB304986CF55
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e9967065ec376710d32784fc309618d5653f917a6efa727bbef4b38fb6a61c16
                                                                  • Instruction ID: b1eed5b4c69eb76c09c72d3d37b303bfeba6a36d64ed954893e731f296da0b19
                                                                  • Opcode Fuzzy Hash: e9967065ec376710d32784fc309618d5653f917a6efa727bbef4b38fb6a61c16
                                                                  • Instruction Fuzzy Hash: 7F712F74D052098FDB04DFAAD99879EBBF2BF88310F14D429D804E7399EB744982CB59

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 263 2505940-2505964 264 2505966 263->264 265 250596d-2505971 263->265 264->265 266 2505973-250597e 264->266 267 25059d6-2505a36 264->267 268 2505994-25059a8 264->268 269 25059aa-25059b4 264->269 265->266 265->267 274 2505980-2505983 266->274 275 25059bd-25059d4 266->275 276 250598d-2505991 268->276 273 25059bb 269->273 273->276 278 250598b 274->278 275->278 278->276
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8O}$8O}$Hbq$d8cq
                                                                  • API String ID: 0-2193686777
                                                                  • Opcode ID: 67788095540c8e9ac67c5faf589c8710d3757b9af7702ed49fcfc4be24b313be
                                                                  • Instruction ID: 4dacbb290a4c603e4c781501d8fd2d1123ee8d313f39ccccd90b8907965ced7f
                                                                  • Opcode Fuzzy Hash: 67788095540c8e9ac67c5faf589c8710d3757b9af7702ed49fcfc4be24b313be
                                                                  • Instruction Fuzzy Hash: B021C4307442046FE7286A3A5C95FBF2A6BFBC1761F288829F5469B3C5DD389C06C758

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 413 8347c0d-8347cad 415 8347ce6-8347d06 413->415 416 8347caf-8347cb9 413->416 423 8347d3f-8347d6e 415->423 424 8347d08-8347d12 415->424 416->415 417 8347cbb-8347cbd 416->417 418 8347ce0-8347ce3 417->418 419 8347cbf-8347cc9 417->419 418->415 421 8347ccd-8347cdc 419->421 422 8347ccb 419->422 421->421 425 8347cde 421->425 422->421 430 8347da7-8347e61 CreateProcessA 423->430 431 8347d70-8347d7a 423->431 424->423 426 8347d14-8347d16 424->426 425->418 428 8347d18-8347d22 426->428 429 8347d39-8347d3c 426->429 432 8347d24 428->432 433 8347d26-8347d35 428->433 429->423 444 8347e63-8347e69 430->444 445 8347e6a-8347ef0 430->445 431->430 434 8347d7c-8347d7e 431->434 432->433 433->433 435 8347d37 433->435 436 8347d80-8347d8a 434->436 437 8347da1-8347da4 434->437 435->429 439 8347d8c 436->439 440 8347d8e-8347d9d 436->440 437->430 439->440 440->440 441 8347d9f 440->441 441->437 444->445 455 8347f00-8347f04 445->455 456 8347ef2-8347ef6 445->456 458 8347f14-8347f18 455->458 459 8347f06-8347f0a 455->459 456->455 457 8347ef8 456->457 457->455 461 8347f28-8347f2c 458->461 462 8347f1a-8347f1e 458->462 459->458 460 8347f0c 459->460 460->458 464 8347f3e-8347f45 461->464 465 8347f2e-8347f34 461->465 462->461 463 8347f20 462->463 463->461 466 8347f47-8347f56 464->466 467 8347f5c 464->467 465->464 466->467 469 8347f5d 467->469 469->469
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08347E4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: 14c6d46be6c0da70359ce660556c39d03531d7674dffbfc84a2fa0f6c83d2b84
                                                                  • Instruction ID: f07337b573db103d3e4258a4eb359ae063ea1f29e5be9453e27cfd86113b893a
                                                                  • Opcode Fuzzy Hash: 14c6d46be6c0da70359ce660556c39d03531d7674dffbfc84a2fa0f6c83d2b84
                                                                  • Instruction Fuzzy Hash: 8BA14871D1061DCFDB20CF68C840BADBBF2BF89315F1485A9E809A7250DB75A986CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 470 8347c18-8347cad 472 8347ce6-8347d06 470->472 473 8347caf-8347cb9 470->473 480 8347d3f-8347d6e 472->480 481 8347d08-8347d12 472->481 473->472 474 8347cbb-8347cbd 473->474 475 8347ce0-8347ce3 474->475 476 8347cbf-8347cc9 474->476 475->472 478 8347ccd-8347cdc 476->478 479 8347ccb 476->479 478->478 482 8347cde 478->482 479->478 487 8347da7-8347e61 CreateProcessA 480->487 488 8347d70-8347d7a 480->488 481->480 483 8347d14-8347d16 481->483 482->475 485 8347d18-8347d22 483->485 486 8347d39-8347d3c 483->486 489 8347d24 485->489 490 8347d26-8347d35 485->490 486->480 501 8347e63-8347e69 487->501 502 8347e6a-8347ef0 487->502 488->487 491 8347d7c-8347d7e 488->491 489->490 490->490 492 8347d37 490->492 493 8347d80-8347d8a 491->493 494 8347da1-8347da4 491->494 492->486 496 8347d8c 493->496 497 8347d8e-8347d9d 493->497 494->487 496->497 497->497 498 8347d9f 497->498 498->494 501->502 512 8347f00-8347f04 502->512 513 8347ef2-8347ef6 502->513 515 8347f14-8347f18 512->515 516 8347f06-8347f0a 512->516 513->512 514 8347ef8 513->514 514->512 518 8347f28-8347f2c 515->518 519 8347f1a-8347f1e 515->519 516->515 517 8347f0c 516->517 517->515 521 8347f3e-8347f45 518->521 522 8347f2e-8347f34 518->522 519->518 520 8347f20 519->520 520->518 523 8347f47-8347f56 521->523 524 8347f5c 521->524 522->521 523->524 526 8347f5d 524->526 526->526
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 08347E4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: 6165cf6062551d19afd18179916fc4617728db6f1777cd4e36fee83403520179
                                                                  • Instruction ID: 45902a6761ed8863c7becf1ee91385584ab35292ad3bdac3a388216628744068
                                                                  • Opcode Fuzzy Hash: 6165cf6062551d19afd18179916fc4617728db6f1777cd4e36fee83403520179
                                                                  • Instruction Fuzzy Hash: 8F913971D1061DCFDB20DF68C840BADBBF2BF84315F1485A9E809A7250DB75A986CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 527 248d4d8-248d4e7 528 248d4e9-248d4f6 call 248c374 527->528 529 248d513-248d517 527->529 536 248d4f8 528->536 537 248d50c 528->537 530 248d519-248d523 529->530 531 248d52b-248d56c 529->531 530->531 538 248d579-248d587 531->538 539 248d56e-248d576 531->539 584 248d4fe call 248d770 536->584 585 248d4fe call 248d761 536->585 537->529 540 248d589-248d58e 538->540 541 248d5ab-248d5ad 538->541 539->538 543 248d599 540->543 544 248d590-248d597 call 248c380 540->544 546 248d5b0-248d5b7 541->546 542 248d504-248d506 542->537 545 248d648-248d708 542->545 548 248d59b-248d5a9 543->548 544->548 577 248d70a-248d70d 545->577 578 248d710-248d73b GetModuleHandleW 545->578 549 248d5b9-248d5c1 546->549 550 248d5c4-248d5cb 546->550 548->546 549->550 551 248d5d8-248d5e1 call 248c390 550->551 552 248d5cd-248d5d5 550->552 558 248d5ee-248d5f3 551->558 559 248d5e3-248d5eb 551->559 552->551 560 248d611-248d615 558->560 561 248d5f5-248d5fc 558->561 559->558 582 248d618 call 248da40 560->582 583 248d618 call 248da50 560->583 561->560 563 248d5fe-248d60e call 248c148 call 248c3a0 561->563 563->560 566 248d61b-248d61e 567 248d620-248d63e 566->567 568 248d641-248d647 566->568 567->568 577->578 579 248d73d-248d743 578->579 580 248d744-248d758 578->580 579->580 582->566 583->566 584->542 585->542
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060165846.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2480000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 6a37e3bc42c47a7a532c5f395b388c80a669b51ed4e8288160aa8f03746bddbd
                                                                  • Instruction ID: 4b6002489386461361774c369ef291cce3ce3d12dc9fefe49d41687f5ad49f66
                                                                  • Opcode Fuzzy Hash: 6a37e3bc42c47a7a532c5f395b388c80a669b51ed4e8288160aa8f03746bddbd
                                                                  • Instruction Fuzzy Hash: 71710370A10B05CFDB24EF29D45479ABBF2BB88304F10892ED48A97B50D775E949CB94

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 586 248c53c-248fb36 588 248fb38-248fb3e 586->588 589 248fb41-248fb48 586->589 588->589 590 248fb4a-248fb50 589->590 591 248fb53-248fbf2 CreateWindowExW 589->591 590->591 593 248fbfb-248fc33 591->593 594 248fbf4-248fbfa 591->594 598 248fc40 593->598 599 248fc35-248fc38 593->599 594->593 599->598
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0248FBE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060165846.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2480000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: becd1c413493de7dd650070e4685ca82a84eae161f5135409855f4b535e966e3
                                                                  • Instruction ID: 51d3ce01198072d1451ce7c5798c8ab90c55bd4b93bb65302d3e3d64fe55ef19
                                                                  • Opcode Fuzzy Hash: becd1c413493de7dd650070e4685ca82a84eae161f5135409855f4b535e966e3
                                                                  • Instruction Fuzzy Hash: 2D51CDB1D103099FDB14DFA9C984ADEBBB5FF48314F64812AE819AB210D770A885CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 600 2487712-2487719 601 2487778-248781c DuplicateHandle 600->601 602 248771b-2487749 call 2486ae4 600->602 604 248781e-2487824 601->604 605 2487825-2487842 601->605 606 248774e-2487774 602->606 604->605
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0248774E,?,?,?,?,?), ref: 0248780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060165846.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2480000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: fedbcd206621dab04ac1cd716e6c8a9498e0578cd413ad4996d7bc51088e65d1
                                                                  • Instruction ID: 790dc6c9478b129094a8f6776e0a3f840c09618d204fec062652d42f43cad3ce
                                                                  • Opcode Fuzzy Hash: fedbcd206621dab04ac1cd716e6c8a9498e0578cd413ad4996d7bc51088e65d1
                                                                  • Instruction Fuzzy Hash: C44159759042889FCB01CFA9D844AEEBFF5EF49314F18809AE944A7262C3359955DF60

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 611 2486ac1-2486ae0 613 2486a9f-2486aa8 611->613 614 2486ae2-2486aeb 611->614 613->611 615 2487788-248781c DuplicateHandle 614->615 616 248781e-2487824 615->616 617 2487825-2487842 615->617 616->617
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0248774E,?,?,?,?,?), ref: 0248780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060165846.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2480000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: c2b2f951ac1ce68055b57ffb62c1d192b8a2e8eebfe8c4ff59ec3f09bde42260
                                                                  • Instruction ID: c49b188b0ce0bf0c552c1e4a586bea74986042a2cc806b52215b57cacaa581a9
                                                                  • Opcode Fuzzy Hash: c2b2f951ac1ce68055b57ffb62c1d192b8a2e8eebfe8c4ff59ec3f09bde42260
                                                                  • Instruction Fuzzy Hash: 5A318AB5D043489FDB10DFA9D484AEEBFF4FF49320F24805AE554A7211D334A985CBA4

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 620 83478f8-834794e 622 8347950-834795c 620->622 623 834795e-834799d WriteProcessMemory 620->623 622->623 625 83479a6-83479d6 623->625 626 834799f-83479a5 623->626 626->625
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08347990
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: 27395d310c24c067e74d96d8c63f961ff17a19eeb3350bdb4ebbaa23657f50e7
                                                                  • Instruction ID: a2eaecb744d4d5d8da5464e252c3f9d0ff3188a8eb17e765a4233c2afc492468
                                                                  • Opcode Fuzzy Hash: 27395d310c24c067e74d96d8c63f961ff17a19eeb3350bdb4ebbaa23657f50e7
                                                                  • Instruction Fuzzy Hash: C02137B19002599FDB10CFA9C885BEEBBF1FF88310F108429E959A7251C7799945CF64

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 630 8347900-834794e 632 8347950-834795c 630->632 633 834795e-834799d WriteProcessMemory 630->633 632->633 635 83479a6-83479d6 633->635 636 834799f-83479a5 633->636 636->635
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 08347990
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: 88b0b081c165e88005ce5920c22af431e070a8c45773f85a455db259adc47c50
                                                                  • Instruction ID: 9a62248ea60643a9fa84cc29a130f48cd1369b26b030cd35743cf0db224ebc71
                                                                  • Opcode Fuzzy Hash: 88b0b081c165e88005ce5920c22af431e070a8c45773f85a455db259adc47c50
                                                                  • Instruction Fuzzy Hash: B72166B19003599FDB10CFA9C880BDEBBF4FF88310F10842AE958A7250C778A944CFA4
                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08347AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: f33b2a75e4aac53863e3ae128ae1a591c3d363bc03ea1b4b3bab8e405f2f4851
                                                                  • Instruction ID: 6d2cd7d59e65bba49b927b67b05c316a369ad617ea9242be7ac806c82e29f211
                                                                  • Opcode Fuzzy Hash: f33b2a75e4aac53863e3ae128ae1a591c3d363bc03ea1b4b3bab8e405f2f4851
                                                                  • Instruction Fuzzy Hash: B42139B1C002499FCB10DFA9C885AEEFBF5FF88320F10842DE959A7251C7789555DBA1
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 083476F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: 6039067cdba53bead931bb23d6891bf69ed6eacb67ab80353ba2f527aa63d2f3
                                                                  • Instruction ID: c362d8e10503eac23326827c665a4fc94c9b0b7a9953b55ed907d8e11d081256
                                                                  • Opcode Fuzzy Hash: 6039067cdba53bead931bb23d6891bf69ed6eacb67ab80353ba2f527aa63d2f3
                                                                  • Instruction Fuzzy Hash: C82157B19002098FDB10DFAAC4857EEBBF5EF88320F108429D459A7241C778A945CFA4
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0248774E,?,?,?,?,?), ref: 0248780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060165846.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2480000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 9147058fb1b6f2c0cee89f66f0dedfc8e2a98a87c0540492a7eaae5886093996
                                                                  • Instruction ID: f004e123e644e2fcb3e0a910076b7506a85f23d77fa02bc3db28abcd8331dd20
                                                                  • Opcode Fuzzy Hash: 9147058fb1b6f2c0cee89f66f0dedfc8e2a98a87c0540492a7eaae5886093996
                                                                  • Instruction Fuzzy Hash: 3621E3B59102089FDB10DFAAD984AEEFBF4FB48320F14845AE958A7311D374A940CFA5
                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 08347AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: 11394a708b96cdd6856669c54e45e1649e916fff97bed8e82c09865649aa6adb
                                                                  • Instruction ID: 17d4988b0e2766812a9ceda37c1aad5a34c718a1b63ac12cf1035bebfe788c40
                                                                  • Opcode Fuzzy Hash: 11394a708b96cdd6856669c54e45e1649e916fff97bed8e82c09865649aa6adb
                                                                  • Instruction Fuzzy Hash: E72159B1C003499FCB10DFAAC880ADEFBF4FF88310F108429E558A7250C774A540CBA4
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 083476F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: a1c1ed8fef07f3b5d87c0117c5792a51bc2fb0e83647ff68d3fa0d61df3808f6
                                                                  • Instruction ID: cf70f27c4cbaf96bdc509e6fceba5d33902246168bc338bc231b0c8510e9231a
                                                                  • Opcode Fuzzy Hash: a1c1ed8fef07f3b5d87c0117c5792a51bc2fb0e83647ff68d3fa0d61df3808f6
                                                                  • Instruction Fuzzy Hash: 542138B19002098FDB10DFAEC4857EEBBF5EF88324F108429D459A7241C778A945CFA5
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0834787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: de987edd63024a9d12c019fa38d96ce8a8b5ddb781a60611cf5d42ed6fb5eea0
                                                                  • Instruction ID: beb7cf8dc69629c356337d3d18a8532f89bf6b8a3d299034bd2338f4383b06a1
                                                                  • Opcode Fuzzy Hash: de987edd63024a9d12c019fa38d96ce8a8b5ddb781a60611cf5d42ed6fb5eea0
                                                                  • Instruction Fuzzy Hash: FE1179B18002489FCB10DFA9C845BDFBFF5EF88324F208429E559A7260C779A545CFA4
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0834787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 6e5b526941d3be09dd07b5ad1522077078ec3ba6f08941c3ead97b57c264e12f
                                                                  • Instruction ID: cb21b4ed52898d840e73e4867c612d1ea40f15fb9c7d790318bcc62a2a8cbf79
                                                                  • Opcode Fuzzy Hash: 6e5b526941d3be09dd07b5ad1522077078ec3ba6f08941c3ead97b57c264e12f
                                                                  • Instruction Fuzzy Hash: 6E1167B18002488FCB10DFAAC845BDFBFF5EF88320F108419E519A7250C735A540CFA0
                                                                  APIs
                                                                  • ResumeThread.KERNELBASE(?), ref: 083475FA
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: ca2dd2f42c096b3f65a2511ce782d0c8c02757030cafe901bbeb967de71f3feb
                                                                  • Instruction ID: 1c8900cb037ccae9442fc570960e5ce2e9bbd93e545f6e7fdf9a8c6fa9c64424
                                                                  • Opcode Fuzzy Hash: ca2dd2f42c096b3f65a2511ce782d0c8c02757030cafe901bbeb967de71f3feb
                                                                  • Instruction Fuzzy Hash: 5B115BB19002488FDB20DFA9C4457EEFFF5EF88324F248429D459A7250CB39A946CFA4
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0248D4F4), ref: 0248D72E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060165846.0000000002480000.00000040.00000800.00020000.00000000.sdmp, Offset: 02480000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2480000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 654d32c2968249c9246ff8a18eda9b9957cb79868d5fff31a9ed3af3cfcba92d
                                                                  • Instruction ID: 5af854551f552a605b49a9cae2f85acc661b31d7dc9d7511a4d6cf4aa3cbbb27
                                                                  • Opcode Fuzzy Hash: 654d32c2968249c9246ff8a18eda9b9957cb79868d5fff31a9ed3af3cfcba92d
                                                                  • Instruction Fuzzy Hash: 80113FB6C00608CFCB20DFAAC444ADEFBF4EB88224F10842AD819A7250C379A545CFA5
                                                                  APIs
                                                                  • ResumeThread.KERNELBASE(?), ref: 083475FA
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 02d846a2f4535dd23bceb6ca10d03ebfb96bbadd0af1678e7a018a66eae89303
                                                                  • Instruction ID: 5541960757682f283cb0bb929e74ee949d3071cfbac5eac316639ff519c5370d
                                                                  • Opcode Fuzzy Hash: 02d846a2f4535dd23bceb6ca10d03ebfb96bbadd0af1678e7a018a66eae89303
                                                                  • Instruction Fuzzy Hash: 94113AB19002488FDB10DFAAC4457DEFBF5EB88324F208829D559A7250C779A545CFA5
                                                                  APIs
                                                                  • PostMessageW.USER32(?,?,?,?), ref: 08349765
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: b0927b642a35aaaa0dba6e6d6e16a817907451e16259d72bfbe242a01ecca101
                                                                  • Instruction ID: b67cc68d220fac6a7e058c1318ec8ffbdfb8c06eabca69568cf076208555ddf6
                                                                  • Opcode Fuzzy Hash: b0927b642a35aaaa0dba6e6d6e16a817907451e16259d72bfbe242a01ecca101
                                                                  • Instruction Fuzzy Hash: 261122B58003489FDB10DF9AC884BDEBFF8EB88360F208459E918A7610C375A945CFA5
                                                                  APIs
                                                                  • PostMessageW.USER32(?,?,?,?), ref: 08349765
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2083135066.0000000008340000.00000040.00000800.00020000.00000000.sdmp, Offset: 08340000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_8340000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 3e32adb5da549b479ef24ed31bacc4d3d32a5b18f522ddb980de1f3630c7a2bc
                                                                  • Instruction ID: 9491691a3e1a9d1c842c452d0662c37806c74f4a3b56bdb0ef7fab4a41927770
                                                                  • Opcode Fuzzy Hash: 3e32adb5da549b479ef24ed31bacc4d3d32a5b18f522ddb980de1f3630c7a2bc
                                                                  • Instruction Fuzzy Hash: D41103B58003489FDB10DF9AC884BDEBFF8EB48320F208459D958A7210C375A944CFA1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8bq
                                                                  • API String ID: 0-187764589
                                                                  • Opcode ID: 0a82ed06c77736f654eb5555542f482644d76f6433481454ca492f95aae78d3c
                                                                  • Instruction ID: c913f10e15359341a8697afb81ebb00698958582d3fe48de41d2a50ac8017e95
                                                                  • Opcode Fuzzy Hash: 0a82ed06c77736f654eb5555542f482644d76f6433481454ca492f95aae78d3c
                                                                  • Instruction Fuzzy Hash: 4EB1BD74E00218CFDB54DFA9D984BADBBB2BF49301F10846AD409AB394EB34AD85CF05
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8bq
                                                                  • API String ID: 0-187764589
                                                                  • Opcode ID: b4d2788c2bc073840ee414c4be95e0ba3d609d4f2f7fb44c0ddc3af1e25c5665
                                                                  • Instruction ID: f51e875a879defbb92006c6d9a403d7066000bdc69c70a5d5e6f7deb927f2126
                                                                  • Opcode Fuzzy Hash: b4d2788c2bc073840ee414c4be95e0ba3d609d4f2f7fb44c0ddc3af1e25c5665
                                                                  • Instruction Fuzzy Hash: FDA1AE74E00218CFDB54DFA9D984B9DBBB2BF49301F1084AAD409AB295DB34AD85CF05
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Te^q
                                                                  • API String ID: 0-671973202
                                                                  • Opcode ID: 066168f076befaf2d02dce935f4a87e53183069e32c19f2c6456bdfa8b963441
                                                                  • Instruction ID: 1ebfb6111499ea6c978147e2480d87a4b53ded719764514595750ad932219759
                                                                  • Opcode Fuzzy Hash: 066168f076befaf2d02dce935f4a87e53183069e32c19f2c6456bdfa8b963441
                                                                  • Instruction Fuzzy Hash: 90112171F0020A8BCB54EBB999506EFB6F6BFC4314B50446AC509E7384EB359D06CBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 16beeb5a284f0f651ec1278bd271650e053c925a85313e4778fe6b2323266198
                                                                  • Instruction ID: 311f5e378cfc4e7e642de5425e2ab18ec7b7acccbfab39341079f1639a77992c
                                                                  • Opcode Fuzzy Hash: 16beeb5a284f0f651ec1278bd271650e053c925a85313e4778fe6b2323266198
                                                                  • Instruction Fuzzy Hash: FA613C31A00619DFDB14DFA9C984A9DBBF2FF88314F108159E909AB3A0DB71ED41CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3fdb31cbd1ee4f4e95527a03d861812ed99baf39874e86b869e15ab831d7aaab
                                                                  • Instruction ID: f78980284a51f79448e3fbf7f1711854ca9143dd2e7d9dc1f2a08eb3fec16f92
                                                                  • Opcode Fuzzy Hash: 3fdb31cbd1ee4f4e95527a03d861812ed99baf39874e86b869e15ab831d7aaab
                                                                  • Instruction Fuzzy Hash: 3D615F31A00619CFDB14DFA9C994A9DBBF2FF88314F108159E509AB3A0DB71ED45CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 471838a163f1ee436205e86cf267d305fb43cf7f1b8f93cdf5c4f1297f0f9ff0
                                                                  • Instruction ID: ace92cbc9e26ca9165f8054702e0378522c92ed93fed840be6359d409f64d7ad
                                                                  • Opcode Fuzzy Hash: 471838a163f1ee436205e86cf267d305fb43cf7f1b8f93cdf5c4f1297f0f9ff0
                                                                  • Instruction Fuzzy Hash: C471D974A02214CFD750EF68E998A4EBFF5FB08311F04A1A6E409973A9DB30AD84CF55
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4f3c35d9281affa8e4a165b208a5c84a710dcc6c29e4cc8ba9aff7a15e3d1e1
                                                                  • Instruction ID: 1d438eda8f0fac2c5d90ffb8b3b0b74a3b2844bcb50a692b9206e2bbd089e6ff
                                                                  • Opcode Fuzzy Hash: b4f3c35d9281affa8e4a165b208a5c84a710dcc6c29e4cc8ba9aff7a15e3d1e1
                                                                  • Instruction Fuzzy Hash: 5B711974D41209CFDB50DFA8E988AADBBB1FF48301F10956AE41AA7355DB309D84CF54
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 7032405e1f4f072987b884034eafcf89ab5ae5529b8b0b0846d8c67a8425b6f6
                                                                  • Instruction ID: 904ea3c1a0197413fb71641ad5bb74a9371e42ad3f133a6649e23fa2ba070c18
                                                                  • Opcode Fuzzy Hash: 7032405e1f4f072987b884034eafcf89ab5ae5529b8b0b0846d8c67a8425b6f6
                                                                  • Instruction Fuzzy Hash: A431907180E3D4AFC7039B7888A55D97FB0EF07210B1A84D7D8D4CB1A3E128854EDB6A
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d411a52d3f5be80291b39406aa859b20bd5941115decde3ebf698690eae3539
                                                                  • Instruction ID: f7fe64ec36fa2aa0a91b8f6aa3580e9581780eba9ccfc95fdcf0f9cc0db988c2
                                                                  • Opcode Fuzzy Hash: 1d411a52d3f5be80291b39406aa859b20bd5941115decde3ebf698690eae3539
                                                                  • Instruction Fuzzy Hash: 79219C71A003454FCB15EB798C9867FBBB7FBC42603254829E415D7381DE34DD068B61
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058567485.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7cd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8050b5ba2029750706e8b5eec63e194adaa5c92ea9fcb972084128c5dc914fa7
                                                                  • Instruction ID: eeb77be2e58cc6879eb0d1a4e99f4913e35b2f516128d7e77ce8c8aa945b4c98
                                                                  • Opcode Fuzzy Hash: 8050b5ba2029750706e8b5eec63e194adaa5c92ea9fcb972084128c5dc914fa7
                                                                  • Instruction Fuzzy Hash: 9021E0B1500280EFCB199F14D9C0F26BF66FB94324F20C57DEE090A256C33AE956C6A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058567485.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7cd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 12eb91d2e252309b7834dbc3b1f7da59317f3812d27c1e2f017b2af404b31bb4
                                                                  • Instruction ID: 316ecbabea82cb8614ec7f6dd959b33d67511691c9f4871d7e27462330b4dc97
                                                                  • Opcode Fuzzy Hash: 12eb91d2e252309b7834dbc3b1f7da59317f3812d27c1e2f017b2af404b31bb4
                                                                  • Instruction Fuzzy Hash: DA2103B1500200DFCB25DF14E9C0F26BFA5FB98318F20817DE9094B256C33ADC66CAA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058629034.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7dd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c078df74af853de01458e678431adf45557e0e8742ac5dc76257c08803a1bdde
                                                                  • Instruction ID: 9692795ed759b208a7df4a98591378dca6d5a7c057339bc66fb1ab5ba7042386
                                                                  • Opcode Fuzzy Hash: c078df74af853de01458e678431adf45557e0e8742ac5dc76257c08803a1bdde
                                                                  • Instruction Fuzzy Hash: A421D071604204DFCB24DF24D984B26BBB5EB88314F24C56AD80A4B396C33ADC46CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058629034.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7dd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72867be3d9535e7041523f05c1913aab5c8a1a64530dd3915a88d79bc3c76bf0
                                                                  • Instruction ID: 12b5efc767ba4ef2e893678f90fae755010e86d2a7347a36307fbc1f1956d900
                                                                  • Opcode Fuzzy Hash: 72867be3d9535e7041523f05c1913aab5c8a1a64530dd3915a88d79bc3c76bf0
                                                                  • Instruction Fuzzy Hash: C6212671544204EFDB25DF54DAC0B26BBB5FB88314F20C66EE8494B396C33AEC46CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c5aa5a5bd36106b449b3ef3b80898e28873c0c3942e9dbce07bfd5e1d53f7d19
                                                                  • Instruction ID: 66d12e52630e49f31739ae727f5b00b6fc16f6c1f8cec16558ff7373d0391e6e
                                                                  • Opcode Fuzzy Hash: c5aa5a5bd36106b449b3ef3b80898e28873c0c3942e9dbce07bfd5e1d53f7d19
                                                                  • Instruction Fuzzy Hash: B931E2B0D016189FEB24DF99C9847CDBFF5BB48354F248169D408BB290C7795846CF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c58ad2bab69fcae82b4859d25be6ded287af089707e6261d1bfcae6b11c2a23
                                                                  • Instruction ID: bb7027ad2b53a44137b183a061e833d8b151655122f11eecce0dfd2996fe446f
                                                                  • Opcode Fuzzy Hash: 2c58ad2bab69fcae82b4859d25be6ded287af089707e6261d1bfcae6b11c2a23
                                                                  • Instruction Fuzzy Hash: 69214C70E04209DFCB15DFA9C9846AEFBB2FB89301F14D66AD405A7384D7349981CF84
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee78e3be5eacdd2df99beb51f86d56256f2c9cf2b3df38bfe13e5bcf356b9107
                                                                  • Instruction ID: 989ac8898c9db81755f162024848b8fbbd972a2169f022e2231b1d6deb0195ee
                                                                  • Opcode Fuzzy Hash: ee78e3be5eacdd2df99beb51f86d56256f2c9cf2b3df38bfe13e5bcf356b9107
                                                                  • Instruction Fuzzy Hash: E631C0B0D016189FEB24DF9AC984B9EBFF5BB48314F24805AE409BB390C7B55845CF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0c3732b52b51d7b272cf87b3a4798265a7518db86b5b1e334336b45d7014e0ea
                                                                  • Instruction ID: 3a9f7c4e2a121f41aadf8f6b9331f7612f2057bf898018a3c4067a95f89b8203
                                                                  • Opcode Fuzzy Hash: 0c3732b52b51d7b272cf87b3a4798265a7518db86b5b1e334336b45d7014e0ea
                                                                  • Instruction Fuzzy Hash: C931F734D8121A8FDB64DFA4E848BADB771FB48301F0099A6E41AA3354DB705E989F54
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058629034.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7dd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fa2f4cfe5428bcf52b5d729dbe7d2886253438cd4ff79ef5367a045a9d0d1245
                                                                  • Instruction ID: 4442dbfdf3d154ca9c08a1fa89b70d6557f5ea2b8d8a2e6287821a3ab38772cf
                                                                  • Opcode Fuzzy Hash: fa2f4cfe5428bcf52b5d729dbe7d2886253438cd4ff79ef5367a045a9d0d1245
                                                                  • Instruction Fuzzy Hash: AF217F755083849FCB12CF24D994711BF71EB86314F28C5EAD8498F2A7C33A9C0ACB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 11a5d7dc009f11763ce00e31640a00d6c2123e4f752f14b531daf81e096c2ae2
                                                                  • Instruction ID: 344cec7043b47252c017b7106e93b1a12b1829e69e56a6a9e88d3dac9b27b8b3
                                                                  • Opcode Fuzzy Hash: 11a5d7dc009f11763ce00e31640a00d6c2123e4f752f14b531daf81e096c2ae2
                                                                  • Instruction Fuzzy Hash: C111E371A002064FCB10EF799C84ABFBBB7FBC42607148529E819D7381EF349A0687A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058567485.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7cd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction ID: 58c15a9d1f9b053a8a16cdf97f339ba73ae55a5b369555aac3bbd013ade5c397
                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction Fuzzy Hash: 3011AC76504280DFCB16CF10D9C4B16BF62FB94324F24C6ADDD090B656C33AE95ACBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058567485.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7cd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction ID: e85e1e09e2a7b9a050a46cd7ea45ab0f6e7f9121654abf5d55836c01300dee65
                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction Fuzzy Hash: 6811B176504240DFCB16CF14D9C4B16BF72FB94318F24C6ADD9090B256C33AD86ACBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058629034.00000000007DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007DD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7dd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: ceed770d34df05d8143bc5e1a9c41cac5e7cd7c620e2425764b9e0a40b528a5f
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 24118B75504280DFDB16CF14D6C4B15BBB1FB84324F24C6AAD8494B796C33AE84ACB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058567485.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7cd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e99aa3c9d67a4df51b7b43dacd5fce080837be9259a41283d236fc8bc58d1299
                                                                  • Instruction ID: 68516e6275faa47cd0ce841a5044c96b3dd6a693549fdb11f8f39b7298e1d0b7
                                                                  • Opcode Fuzzy Hash: e99aa3c9d67a4df51b7b43dacd5fce080837be9259a41283d236fc8bc58d1299
                                                                  • Instruction Fuzzy Hash: 0901A2711093449AE7209A29CE84F67BFE8EF55724F18C83EED094A286C37DDC40C6B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 845c92f02dc74a4881db410aa82a7f3458eb6fa9b5fad23b98390b931a6cc58b
                                                                  • Instruction ID: 346af02c7f4bd82bd11f8592d318033d81b235d1ba90f2542f7fcfc46346366a
                                                                  • Opcode Fuzzy Hash: 845c92f02dc74a4881db410aa82a7f3458eb6fa9b5fad23b98390b931a6cc58b
                                                                  • Instruction Fuzzy Hash: 63010C71800619DFDB11CFA5C8843EE7BB1FB44354F10C665D429AA2A0D7744A45CF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c6edcf97a504c258051315f11ead9a6aca0c84ccc6bf354d7fc0208f78596be7
                                                                  • Instruction ID: 7c79872a170ea5d3e3322625b77483aabbb99e590b301789ab63c88e843d41be
                                                                  • Opcode Fuzzy Hash: c6edcf97a504c258051315f11ead9a6aca0c84ccc6bf354d7fc0208f78596be7
                                                                  • Instruction Fuzzy Hash: 9CF0E2B6B041141FD3048B6E98C5CA7BBEDFBC9660311807AE418CB311D9318D0AC7B0
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2058567485.00000000007CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007CD000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_7cd000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 019d8e83cb05db897d693f0d092e8fa75056c1f297b181c89b743c6824a461c0
                                                                  • Instruction ID: 2ed9cc7def6fcd94a77930dd663261f023c8abc2677a25d4289ea01b04350f9d
                                                                  • Opcode Fuzzy Hash: 019d8e83cb05db897d693f0d092e8fa75056c1f297b181c89b743c6824a461c0
                                                                  • Instruction Fuzzy Hash: BFF06271404344AEE7208A16C984B62FFA8EF95734F18C45EED484A286C3799C44CAB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e314fd1b67acfdbca99d6e5a06096b5e9ffabe2cc1eb4ebc8fe07b19ff14225a
                                                                  • Instruction ID: 353b25ca804f8f0e97896c7b82670c872eb098206bbbe65239717afe699d844c
                                                                  • Opcode Fuzzy Hash: e314fd1b67acfdbca99d6e5a06096b5e9ffabe2cc1eb4ebc8fe07b19ff14225a
                                                                  • Instruction Fuzzy Hash: BBF0AF70C09248AFCB51DFA899404DDBFB0BF06220F1481EAE854972A2D7351B12EF44
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 02374e2fe7433bf51431937cf830717633443ad0f0043ddeb5311f982c4ad3ac
                                                                  • Instruction ID: a38d36232a2a4add6c95632124485bf1ce2ef51014533c526a19ea353a4de5d9
                                                                  • Opcode Fuzzy Hash: 02374e2fe7433bf51431937cf830717633443ad0f0043ddeb5311f982c4ad3ac
                                                                  • Instruction Fuzzy Hash: E101EC70800619DFDB15CFA6C8443AE7BF1FF45355F10C665E419AA2A0D7744A40CF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6b7977b973275658773d7cd273bb45a93dab094ed259248ddd76e33867d5395c
                                                                  • Instruction ID: e5a0d31fbfb18dc79f25c7a22f9f5667665d8af3b6b43a1660fbe7bfb4462827
                                                                  • Opcode Fuzzy Hash: 6b7977b973275658773d7cd273bb45a93dab094ed259248ddd76e33867d5395c
                                                                  • Instruction Fuzzy Hash: 1AF08C3084A248DFCB119FA8ED856EC7F31FB0B312F209695E80567292C7351E42DB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 14e98b1eabdfdda60e75f596e050568a43c9f4c79139c77f4b323b4922557f04
                                                                  • Instruction ID: 6f3636f2d3fb89ec7cd57698f0cf71b7937dd011cca06a7f38045650d88e4aaa
                                                                  • Opcode Fuzzy Hash: 14e98b1eabdfdda60e75f596e050568a43c9f4c79139c77f4b323b4922557f04
                                                                  • Instruction Fuzzy Hash: F2E039727041286F93049A6ED888D6BBBEEFBCC660311807AF508C7310DA319C0086A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 350ba47a8474ace5041caad3295c19c6fd7564164a43700030a0ccff1968368d
                                                                  • Instruction ID: 8e44bb30638342a6311c868169a31428b01b0f8f75e2efb541687b3f995b63db
                                                                  • Opcode Fuzzy Hash: 350ba47a8474ace5041caad3295c19c6fd7564164a43700030a0ccff1968368d
                                                                  • Instruction Fuzzy Hash: 5EE01A30949208EFC714EFA5ED85BBDBB79FB4A312F109154E809232D5CB316E50DB99
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 37157f37d5a6ff7bf7636f0e40b77bd92036279374e2e4f3058c12be7530681b
                                                                  • Instruction ID: 8c5d297a76ad2f97e4c7c1523449dc65e7e9f041ee69055992f946d800764079
                                                                  • Opcode Fuzzy Hash: 37157f37d5a6ff7bf7636f0e40b77bd92036279374e2e4f3058c12be7530681b
                                                                  • Instruction Fuzzy Hash: D6E0C274D06208EFCB54DFA8E8446ACBBF5FB48310F0085A9E80892350E7355A55EF84
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 678c24a8abbda79e8b1998fd56a27d5684725ba48765890f56f9c6f49a101e1e
                                                                  • Instruction ID: e023fbbf64b461be0afa6593ec79e998be714de6c481b752f8e1cc5b1199c178
                                                                  • Opcode Fuzzy Hash: 678c24a8abbda79e8b1998fd56a27d5684725ba48765890f56f9c6f49a101e1e
                                                                  • Instruction Fuzzy Hash: BDE0927044828A8FE7428F54DCD4AA97F79FF1A304F041AC2D09997292C7345D5DCF19
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0ede2d269d5063ab99eadf655316801f52304be60d5acd8e92fc780a98733f22
                                                                  • Instruction ID: 47a115c522924d7659d78e861849047ee5f30d552408bed5c6ba8a048ef8c7b5
                                                                  • Opcode Fuzzy Hash: 0ede2d269d5063ab99eadf655316801f52304be60d5acd8e92fc780a98733f22
                                                                  • Instruction Fuzzy Hash: 12E0C2A008F31CDEC344DBE49A40B69B7BDEB82218F0019AC9108131E1CF351F00D68E
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c1d731b7396231a5d7f4ab3e78d995eef4f9a4b380767d8234c2d69f797d1944
                                                                  • Instruction ID: c6743c3c1be9e0f8e901ff5880f7cb8bb676adad134ccd81b1533a78c05340fa
                                                                  • Opcode Fuzzy Hash: c1d731b7396231a5d7f4ab3e78d995eef4f9a4b380767d8234c2d69f797d1944
                                                                  • Instruction Fuzzy Hash: BCD0227048F11CEFC740CAE4DA44BB977EDE782208F001098D40D132E1CF752E00D689
                                                                  Memory Dump Source
                                                                  • Source File: 00000006.00000002.2060363900.0000000002500000.00000040.00000800.00020000.00000000.sdmp, Offset: 02500000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_6_2_2500000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ddde4b083fd6d1da17aefd9447b2ec0f9d530e3c2b6a4e37b40c03e2bef10cb7
                                                                  • Instruction ID: 3dccbbc8a4ead0f306634803e4cb341bc66c33440272523ce5baaa22cfb73b5c
                                                                  • Opcode Fuzzy Hash: ddde4b083fd6d1da17aefd9447b2ec0f9d530e3c2b6a4e37b40c03e2bef10cb7
                                                                  • Instruction Fuzzy Hash: 9FB012760000005DE7092B40C806C947B52FB152083109050D085060304525A027D706

                                                                  Execution Graph

                                                                  Execution Coverage:21.5%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:196
                                                                  Total number of Limit Nodes:20
                                                                  execution_graph 74809 5f39570 74814 5f3a53f 74809->74814 74810 5f395a3 74811 5f3958b 74811->74810 74818 5f37b10 74811->74818 74815 5f3a559 74814->74815 74816 5f3a632 74815->74816 74826 5f3c248 74815->74826 74816->74811 74819 5f37b25 74818->74819 74820 5f37e04 74819->74820 74823 5f38530 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 74819->74823 74825 5f38468 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 74819->74825 74840 5f383a0 74819->74840 74843 5f3806d 74819->74843 74848 5f38694 74819->74848 74820->74810 74823->74819 74825->74819 74827 5f3c263 74826->74827 74830 5f359e0 74827->74830 74829 5f3c434 74831 5f359f1 74830->74831 74835 5f35a14 74830->74835 74831->74829 74832 5f35cb7 74832->74829 74834 5f32d08 RegQueryValueExW 74834->74835 74835->74832 74835->74834 74836 5f32cfc 74835->74836 74837 5f36140 RegOpenKeyExW 74836->74837 74839 5f36206 74837->74839 74839->74839 74841 5f383c7 74840->74841 74852 5f38468 74840->74852 74841->74819 74844 5f38075 74843->74844 74845 5f3828e 74844->74845 74847 5f38468 3 API calls 74844->74847 74845->74819 74846 5f383c7 74846->74819 74847->74846 74849 5f38695 74848->74849 74850 5f386d7 74849->74850 74851 5f38820 3 API calls 74849->74851 74850->74819 74851->74850 74853 5f384bd 74852->74853 74854 5f3847c 74852->74854 74853->74841 74854->74853 74855 5f385d6 74854->74855 74858 5f385e5 74854->74858 74856 5f383a0 3 API calls 74855->74856 74857 5f385dd 74856->74857 74857->74841 74858->74857 74860 5f38820 74858->74860 74864 5f38858 74860->74864 74872 5f38868 74860->74872 74861 5f3883e 74861->74857 74865 5f38875 74864->74865 74866 5f3889d 74864->74866 74865->74861 74880 5f35f04 74866->74880 74868 5f388be 74868->74861 74870 5f38986 GlobalMemoryStatusEx 74871 5f389b6 74870->74871 74871->74861 74873 5f38875 74872->74873 74874 5f3889d 74872->74874 74873->74861 74875 5f35f04 GlobalMemoryStatusEx 74874->74875 74877 5f388ba 74875->74877 74876 5f388be 74876->74861 74877->74876 74878 5f38986 GlobalMemoryStatusEx 74877->74878 74879 5f389b6 74878->74879 74879->74861 74881 5f38940 GlobalMemoryStatusEx 74880->74881 74883 5f388ba 74881->74883 74883->74868 74883->74870 74884 10f19a8 74885 10f19d7 74884->74885 74888 10f1730 74885->74888 74887 10f1afc 74889 10f173b 74888->74889 74890 10f201a 74889->74890 74893 10f4b98 74889->74893 74904 10f4b83 74889->74904 74890->74887 74894 10f4bc3 74893->74894 74915 10f36ac 74894->74915 74897 10f4c46 74898 10f4c72 74897->74898 74924 10f36bc 74897->74924 74898->74898 74901 10f36ac 2 API calls 74901->74897 74905 10f4bc3 74904->74905 74906 10f36ac 2 API calls 74905->74906 74907 10f4c2a 74906->74907 74912 10f36ac 2 API calls 74907->74912 74913 10f50d0 2 API calls 74907->74913 74908 10f4c46 74909 10f36bc GetModuleHandleW 74908->74909 74911 10f4c72 74908->74911 74910 10f4cb6 74909->74910 74914 10f6681 CreateWindowExW 74910->74914 74912->74908 74913->74908 74914->74911 74916 10f36b7 74915->74916 74917 10f4c2a 74916->74917 74933 10f52e0 74916->74933 74917->74901 74919 10f50d0 74917->74919 74920 10f50eb 74919->74920 74921 10f50ef 74919->74921 74920->74897 74922 10f522e 74921->74922 74923 10f52e0 2 API calls 74921->74923 74923->74922 74925 10f5650 GetModuleHandleW 74924->74925 74927 10f4cb6 74925->74927 74928 10f6681 74927->74928 74929 10f66e6 CreateWindowExW 74928->74929 74930 10f66ae 74928->74930 74932 10f681c 74929->74932 74930->74898 74932->74932 74934 10f5305 74933->74934 74935 10f36bc GetModuleHandleW 74934->74935 74936 10f534a 74934->74936 74935->74936 74937 10f36bc GetModuleHandleW 74936->74937 74945 10f5516 74936->74945 74939 10f549b 74937->74939 74938 10f5571 74938->74917 74939->74938 74942 10f36bc GetModuleHandleW 74939->74942 74939->74945 74940 10f5698 GetModuleHandleW 74941 10f56c5 74940->74941 74941->74917 74943 10f54e9 74942->74943 74944 10f36bc GetModuleHandleW 74943->74944 74943->74945 74944->74945 74945->74938 74945->74940 74946 10fa5f8 DuplicateHandle 74947 10fa68e 74946->74947 74948 101d01c 74949 101d034 74948->74949 74950 101d08e 74949->74950 74959 10f478c 74949->74959 74967 10f68b0 74949->74967 74973 10fb1e0 74949->74973 74981 10f68a0 74949->74981 74987 10f4765 74949->74987 74995 10f4723 74949->74995 75003 10f477c 74949->75003 75007 10f69db 74949->75007 74960 10f4797 74959->74960 74961 10fb269 74960->74961 74963 10fb259 74960->74963 74964 10fb267 74961->74964 75019 10fa164 74961->75019 75011 10fb380 74963->75011 75015 10fb390 74963->75015 74964->74964 74968 10f68d6 74967->74968 74969 10f477c 2 API calls 74968->74969 74970 10f68e2 74969->74970 74971 10f478c CallWindowProcW 74970->74971 74972 10f68f7 74971->74972 74972->74950 74976 10fb235 74973->74976 74974 10fb269 74975 10fa164 CallWindowProcW 74974->74975 74978 10fb267 74974->74978 74975->74978 74976->74974 74977 10fb259 74976->74977 74979 10fb380 CallWindowProcW 74977->74979 74980 10fb390 CallWindowProcW 74977->74980 74979->74978 74980->74978 74982 10f68d6 74981->74982 74983 10f477c 2 API calls 74982->74983 74984 10f68e2 74983->74984 74985 10f478c CallWindowProcW 74984->74985 74986 10f68f7 74985->74986 74986->74950 74989 10f4771 74987->74989 74988 10fb269 74990 10fa164 CallWindowProcW 74988->74990 74992 10fb267 74988->74992 74989->74988 74991 10fb259 74989->74991 74990->74992 74993 10fb380 CallWindowProcW 74991->74993 74994 10fb390 CallWindowProcW 74991->74994 74992->74992 74993->74992 74994->74992 74996 10f4726 74995->74996 74997 10fb269 74996->74997 74999 10fb259 74996->74999 74998 10fa164 CallWindowProcW 74997->74998 75000 10fb267 74997->75000 74998->75000 75001 10fb380 CallWindowProcW 74999->75001 75002 10fb390 CallWindowProcW 74999->75002 75000->75000 75001->75000 75002->75000 75004 10f4787 75003->75004 75023 10f47b4 75004->75023 75006 10f69e7 75006->74950 75008 10f69e0 75007->75008 75009 10f47b4 2 API calls 75008->75009 75010 10f69e7 75009->75010 75010->74950 75012 10fb39e 75011->75012 75013 10fa164 CallWindowProcW 75012->75013 75014 10fb487 75012->75014 75013->75012 75014->74964 75017 10fb39e 75015->75017 75016 10fa164 CallWindowProcW 75016->75017 75017->75016 75018 10fb487 75017->75018 75018->74964 75020 10fa16f 75019->75020 75021 10fb501 75020->75021 75022 10fb552 CallWindowProcW 75020->75022 75021->74964 75022->75021 75024 10f47bf 75023->75024 75025 10f36ac 2 API calls 75024->75025 75026 10f6a49 75025->75026 75027 10f36bc GetModuleHandleW 75026->75027 75028 10f6ab7 75026->75028 75027->75028 75029 10fa3b0 75030 10fa3f6 GetCurrentProcess 75029->75030 75032 10fa448 GetCurrentThread 75030->75032 75033 10fa441 75030->75033 75034 10fa47e 75032->75034 75035 10fa485 GetCurrentProcess 75032->75035 75033->75032 75034->75035 75038 10fa4bb 75035->75038 75036 10fa4e3 GetCurrentThreadId 75037 10fa514 75036->75037 75038->75036 75039 ef4230 75040 ef424f LdrInitializeThunk 75039->75040 75042 ef4283 75040->75042 75043 10ffeb0 75044 10ffeea 75043->75044 75045 10fff14 RtlEncodePointer 75044->75045 75046 10fff3d 75044->75046 75045->75046

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 524 f06030-f06053 525 f06095-f06097 524->525 526 f06055-f0605a 524->526 529 f060a1-f060b5 525->529 530 f06099-f0609f 525->530 527 f06060-f06063 526->527 528 f0627b 526->528 531 f06280-f062f4 527->531 532 f06069-f0606f 527->532 528->531 548 f060d0 529->548 549 f060b7-f060bb 529->549 533 f060d6-f060d8 530->533 578 f06300-f0631f 531->578 579 f062f6-f062ff 531->579 532->525 536 f06071-f06090 532->536 534 f060e1-f060ea 533->534 535 f060da-f060df 533->535 545 f060fa-f0610c 534->545 546 f060ec-f060f5 534->546 535->534 538 f06144-f06147 535->538 555 f061a5-f061b9 536->555 538->528 540 f0614d-f06150 538->540 540->531 544 f06156-f0615c 540->544 550 f0617d-f0618e 544->550 551 f0615e-f0617b 544->551 545->528 560 f06112-f06115 545->560 546->550 548->533 549->548 553 f060bd-f060ce 549->553 550->555 562 f06190-f0619f 550->562 551->550 553->533 553->548 572 f061c0-f06257 555->572 560->531 564 f0611b-f06121 560->564 562->555 564->550 566 f06123-f06142 564->566 566->550 584 f06259-f0625d 572->584 585 f0625f-f06265 572->585 589 f06321-f0632a 578->589 590 f0632b-f06337 578->590 584->585 586 f06267-f0626d 584->586 587 f0626f-f06278 585->587 586->587 591 f0633d-f06346 590->591 592 f065df-f065e9 590->592 594 f065f8-f0661f 591->594 595 f0634c-f06385 591->595 598 f06621-f0662b 594->598 599 f06644-f0670d 594->599 611 f06598-f065bc 595->611 612 f0638b-f063c3 595->612 601 f06640-f06643 598->601 602 f0662d-f0663e 598->602 630 f06719-f06898 599->630 631 f0670f-f06718 599->631 602->601 619 f065c7 611->619 620 f065be 611->620 627 f063c9-f063e1 612->627 628 f0646b-f06483 612->628 619->592 620->619 639 f06571-f06582 627->639 640 f063e7-f06402 627->640 637 f06485-f0649d 628->637 638 f064cf-f064e7 628->638 704 f0689a 630->704 705 f0689e-f068a0 630->705 637->639 655 f064a3-f064be 637->655 652 f064e9-f06501 638->652 653 f0652b-f06561 638->653 662 f06587-f06592 639->662 640->639 651 f06408-f0642e 640->651 651->639 674 f06434-f0644f 651->674 652->639 670 f06503-f0651e 652->670 653->662 680 f06563-f0656f 653->680 655->639 668 f064c4-f064c7 655->668 662->611 662->612 668->638 670->639 681 f06520-f06523 670->681 674->639 686 f06455-f06463 674->686 680->662 681->653 686->628 706 f068a2 704->706 707 f0689c 704->707 708 f068a7-f068c5 705->708 706->708 707->705 709 f068d1-f0693f 708->709 710 f068c7-f068d0 708->710 718 f06941-f0695a 709->718 719 f06962-f069b3 709->719 718->719 722 f06ae0-f06af5 719->722 723 f069b9-f06a5e 719->723 740 f06a60-f06ac0 723->740 741 f06acb-f06ada 723->741 740->741 741->722 741->723
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PH^q$\$\$\
                                                                  • API String ID: 0-2373583716
                                                                  • Opcode ID: f93a89b26bb9f0851e70a9ebc3c5362bfd3faf786120565b03b32b913116d915
                                                                  • Instruction ID: 23b4a6cec90ba82d554758316eaec8f2eea0f69330948f33784757e1953e9b5a
                                                                  • Opcode Fuzzy Hash: f93a89b26bb9f0851e70a9ebc3c5362bfd3faf786120565b03b32b913116d915
                                                                  • Instruction Fuzzy Hash: 67529F30B002158FDB259F74D8587AEBBF2AF84314F148569E40ADB399EF39DC829B51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1044 f0a058-f0a09f 1047 f0a0a5-f0a146 call f094e8 call f03330 call f044f8 1044->1047 1048 f0a37b-f0a3cc 1044->1048 1115 f0a376 1047->1115 1116 f0a14c-f0a1b1 1047->1116 1055 f0a3e7-f0a3ef 1048->1055 1056 f0a3ce-f0a3d5 1048->1056 1060 f0a3f2-f0a406 1055->1060 1057 f0a3d7-f0a3dc 1056->1057 1058 f0a3de-f0a3e5 1056->1058 1057->1060 1058->1060 1064 f0a408-f0a40f 1060->1064 1065 f0a41c-f0a424 1060->1065 1067 f0a411-f0a413 1064->1067 1068 f0a415-f0a41a 1064->1068 1070 f0a426-f0a42a 1065->1070 1067->1070 1068->1070 1072 f0a48a-f0a48d 1070->1072 1073 f0a42c-f0a441 1070->1073 1075 f0a4d5-f0a4db 1072->1075 1076 f0a48f-f0a4a4 1072->1076 1073->1072 1083 f0a443-f0a446 1073->1083 1078 f0a4e1-f0a4e3 1075->1078 1079 f0afde 1075->1079 1076->1075 1087 f0a4a6-f0a4aa 1076->1087 1078->1079 1081 f0a4e9-f0a4ee 1078->1081 1088 f0afe3-f0b5d5 1079->1088 1085 f0a4f4 1081->1085 1086 f0af8c-f0af90 1081->1086 1089 f0a465-f0a483 1083->1089 1090 f0a448-f0a44a 1083->1090 1085->1085 1095 f0af92-f0af95 1086->1095 1096 f0af97-f0afdd 1086->1096 1092 f0a4b2-f0a4d0 1087->1092 1093 f0a4ac-f0a4b0 1087->1093 1124 f0b626-f0b64f 1088->1124 1125 f0b5d7-f0b5d9 1088->1125 1089->1072 1090->1089 1094 f0a44c-f0a44f 1090->1094 1092->1075 1093->1075 1093->1092 1094->1072 1099 f0a451-f0a463 1094->1099 1095->1088 1095->1096 1099->1072 1099->1089 1115->1048 1116->1048 1152 f0a1b7-f0a1bf 1116->1152 1138 f0b651-f0b65b 1124->1138 1139 f0b674-f0b68e 1124->1139 1126 f0b5e5-f0b5e8 1125->1126 1127 f0b5db 1125->1127 1129 f0b5f4-f0b604 1126->1129 1132 f0b5ea 1126->1132 1127->1129 1130 f0b5dd-f0b5e3 1127->1130 1141 f0b622-f0b625 1129->1141 1130->1126 1130->1129 1134 f0b606-f0b612 1132->1134 1135 f0b5ec-f0b5f2 1132->1135 1145 f0b614-f0b616 1134->1145 1146 f0b61a-f0b61d 1134->1146 1135->1129 1135->1134 1143 f0b670-f0b673 1138->1143 1144 f0b65d-f0b66e 1138->1144 1144->1143 1145->1124 1149 f0b618 1145->1149 1146->1124 1150 f0b61f 1146->1150 1149->1150 1150->1141 1152->1048 1153 f0a1c5-f0a1e0 1152->1153 1155 f0a1e2-f0a1e6 1153->1155 1156 f0a21a-f0a223 1153->1156 1155->1048 1158 f0a1ec-f0a217 1155->1158 1156->1115 1157 f0a229-f0a22c 1156->1157 1157->1048 1159 f0a232-f0a28f 1157->1159 1158->1156 1171 f0a291-f0a2a0 1159->1171 1172 f0a2e6 1159->1172 1174 f0a2a7-f0a2af 1171->1174 1173 f0a2eb-f0a2ef 1172->1173 1175 f0a2f1 1173->1175 1176 f0a2fa 1173->1176 1177 f0a2b1-f0a2b8 1174->1177 1178 f0a2c4-f0a2e4 1174->1178 1175->1176 1176->1115 1177->1172 1179 f0a2ba-f0a2c2 1177->1179 1178->1173 1179->1178
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq$Xbq$Xbq$Xbq
                                                                  • API String ID: 0-2732225958
                                                                  • Opcode ID: e80ac8b8c01b75b8a3ab14fcd39d927d958eba6a0ab1daaef19a0ecb639ecd71
                                                                  • Instruction ID: 3752dd2763ac60c7524295fe432fa0cdc6edcc7bb4a313eea190052aa636bda5
                                                                  • Opcode Fuzzy Hash: e80ac8b8c01b75b8a3ab14fcd39d927d958eba6a0ab1daaef19a0ecb639ecd71
                                                                  • Instruction Fuzzy Hash: B7B1B334E003058FDB25DB78C99876EBAE2BF84310F148469D0569B3E5DF759C41EB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq
                                                                  • API String ID: 0-63242295
                                                                  • Opcode ID: 6ec3076d7f320c26a248c0c7ff0bf89fbb03fb404f97e1a9d99e0c87ddb109b2
                                                                  • Instruction ID: 0800f8072eb98aa7eba918411362db7ae9c34ceb3fb2fdf2d21bad4c4c16e481
                                                                  • Opcode Fuzzy Hash: 6ec3076d7f320c26a248c0c7ff0bf89fbb03fb404f97e1a9d99e0c87ddb109b2
                                                                  • Instruction Fuzzy Hash: 6A42B830F002049FEB199BB8D9947AEBBE3AB85320F148469E445EF3D5CE75DC42A791
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5e12eb9536dc75905a6fce5a9cecafcad0472464930d10d94c948b9649fff8af
                                                                  • Instruction ID: c2fedba8830bd41656b6cba7d334f5499af46e1d7cea4b185388fd38058754e8
                                                                  • Opcode Fuzzy Hash: 5e12eb9536dc75905a6fce5a9cecafcad0472464930d10d94c948b9649fff8af
                                                                  • Instruction Fuzzy Hash: B542B330E043088FEB25EB78C8547ADBBF2AF85310F24C4A9D4499F2D5DA75AC45DB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c888fabc05a0fa39a098a0cd44f5f3eb22bdfbd8a76ebf92d6fa8847bbd26eeb
                                                                  • Instruction ID: f7149f55ac502cd5db1df77dd258bafa078858386db2956b460ecaeef2c4fd28
                                                                  • Opcode Fuzzy Hash: c888fabc05a0fa39a098a0cd44f5f3eb22bdfbd8a76ebf92d6fa8847bbd26eeb
                                                                  • Instruction Fuzzy Hash: 21029270F002058FDB24DBA8C984BAEBBF2AF95320F248565E545DB3D5CA35DC42AB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 399 f0c220-f0c22c 400 f0c22e-f0c231 399->400 401 f0c233-f0c242 400->401 402 f0c247-f0c24a 400->402 401->402 403 f0c251-f0c254 402->403 404 f0c24c 402->404 406 f0c256-f0c25c 403->406 407 f0c279-f0c27c 403->407 404->403 408 f0c2a8-f0c388 406->408 409 f0c25e-f0c261 406->409 410 f0c293-f0c295 407->410 411 f0c27e-f0c28e 407->411 432 f0ca4b-f0ca74 408->432 433 f0c38e-f0c391 408->433 409->408 414 f0c263-f0c266 409->414 412 f0c297 410->412 413 f0c29c-f0c29f 410->413 411->410 412->413 413->400 416 f0c2a1-f0c2a7 413->416 414->408 418 f0c268-f0c274 414->418 418->407 433->432 434 f0c397-f0c39a 433->434 434->432 435 f0c3a0-f0c3d8 434->435 443 f0c495-f0c49c 435->443 444 f0c3de-f0c416 435->444 445 f0c4a2-f0c4d9 443->445 446 f0c555-f0ca86 443->446 455 f0c418 444->455 456 f0c41a-f0c426 444->456 459 f0c4db 445->459 460 f0c4dd-f0c4e9 445->460 458 f0c428-f0c442 455->458 456->458 478 f0c447 call f0caa0 458->478 479 f0c447 call f0cd91 458->479 461 f0c4eb-f0c52f 459->461 460->461 474 f0c531-f0c541 461->474 475 f0c549 461->475 468 f0c44d-f0c46c 472 f0c486 468->472 473 f0c46e-f0c47e 468->473 472->443 473->472 474->475 475->446 478->468 479->468
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q$PH^q$XPcq$\Ocq
                                                                  • API String ID: 0-2308457832
                                                                  • Opcode ID: 93c4617586731fc9b1539217452182e97eb5c6e97ec0d8fe31e78c76696cb850
                                                                  • Instruction ID: e1efaed5d89fedfa82cd5982f950700e036ee441748febe924f9633cbe2e9937
                                                                  • Opcode Fuzzy Hash: 93c4617586731fc9b1539217452182e97eb5c6e97ec0d8fe31e78c76696cb850
                                                                  • Instruction Fuzzy Hash: 6791C670F002098FDB159FB9D8547AEBBA6FBC8310F208529E54ADB3D4DE358C41AB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 480 10fa3a0-10fa43f GetCurrentProcess 484 10fa448-10fa47c GetCurrentThread 480->484 485 10fa441-10fa447 480->485 486 10fa47e-10fa484 484->486 487 10fa485-10fa4b9 GetCurrentProcess 484->487 485->484 486->487 489 10fa4bb-10fa4c1 487->489 490 10fa4c2-10fa4dd call 10fa580 487->490 489->490 493 10fa4e3-10fa512 GetCurrentThreadId 490->493 494 10fa51b-10fa57d 493->494 495 10fa514-10fa51a 493->495 495->494
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 010FA42E
                                                                  • GetCurrentThread.KERNEL32 ref: 010FA46B
                                                                  • GetCurrentProcess.KERNEL32 ref: 010FA4A8
                                                                  • GetCurrentThreadId.KERNEL32 ref: 010FA501
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 18592f7ad948168bf2702099aa984326054ad99f9b18d0ba1f8652e05d69cc42
                                                                  • Instruction ID: ef63fac615abe48fbfb2dfadd9883b18cd5e077d7a949e196c5285155ed29776
                                                                  • Opcode Fuzzy Hash: 18592f7ad948168bf2702099aa984326054ad99f9b18d0ba1f8652e05d69cc42
                                                                  • Instruction Fuzzy Hash: 755155B0901309CFDB04DFA9D549BDEBBF5AF88304F24C459E158A72A0DB34A984CF66

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 502 10fa3b0-10fa43f GetCurrentProcess 506 10fa448-10fa47c GetCurrentThread 502->506 507 10fa441-10fa447 502->507 508 10fa47e-10fa484 506->508 509 10fa485-10fa4b9 GetCurrentProcess 506->509 507->506 508->509 511 10fa4bb-10fa4c1 509->511 512 10fa4c2-10fa4dd call 10fa580 509->512 511->512 515 10fa4e3-10fa512 GetCurrentThreadId 512->515 516 10fa51b-10fa57d 515->516 517 10fa514-10fa51a 515->517 517->516
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 010FA42E
                                                                  • GetCurrentThread.KERNEL32 ref: 010FA46B
                                                                  • GetCurrentProcess.KERNEL32 ref: 010FA4A8
                                                                  • GetCurrentThreadId.KERNEL32 ref: 010FA501
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: ea3d750e28c96e06bca0fb00407b803a3b597104ef162c927a3684afd010d07e
                                                                  • Instruction ID: 4aa1379f70d9d7c07bc285359787c12fc4a54332bc59da19782f62c72dc1def3
                                                                  • Opcode Fuzzy Hash: ea3d750e28c96e06bca0fb00407b803a3b597104ef162c927a3684afd010d07e
                                                                  • Instruction Fuzzy Hash: 075155B0901309CFDB04DFA9D549BDEBBF5AF88304F20C459E558A7260DB34A984CF66

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 815 ef7678-ef7687 816 ef76ac-ef76d7 815->816 817 ef7689-ef7693 815->817 821 ef76fc-ef7727 816->821 822 ef76d9-ef76e3 816->822 818 ef76a8-ef76ab 817->818 819 ef7695-ef76a6 817->819 819->818 828 ef774c-ef7777 821->828 829 ef7729-ef7733 821->829 824 ef76f8-ef76fb 822->824 825 ef76e5-ef76f6 822->825 825->824 835 ef779c-ef77c4 828->835 836 ef7779-ef7783 828->836 830 ef7748-ef774b 829->830 831 ef7735-ef7746 829->831 831->830 841 ef77e9-ef780f 835->841 842 ef77c6-ef77d0 835->842 837 ef7798-ef779b 836->837 838 ef7785-ef7796 836->838 838->837 846 ef7834-ef78ba call ef33b8 call ef34c8 LdrInitializeThunk 841->846 847 ef7811-ef781b 841->847 843 ef77e5-ef77e8 842->843 844 ef77d2-ef77e3 842->844 844->843 862 ef7a03-ef7a20 846->862 863 ef78c0-ef78da 846->863 849 ef781d-ef782e 847->849 850 ef7830-ef7833 847->850 849->850 875 ef7a25-ef7a2e 862->875 863->862 866 ef78e0-ef78fa 863->866 869 ef78fc-ef78fe 866->869 870 ef7900 866->870 872 ef7903-ef795e 869->872 870->872 881 ef7964 872->881 882 ef7960-ef7962 872->882 883 ef7967-ef7a01 881->883 882->883 883->875
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148156501.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_ef0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: LR^q$LR^q
                                                                  • API String ID: 2994545307-4089051495
                                                                  • Opcode ID: 4588da79e92c420ad40f8901448f008663d35a7438d1ce6a86dddb111ba74866
                                                                  • Instruction ID: 64313dfbde84f5a344f01ac913ecf15bdfd9fa989a5654dd443287d9cabf4e02
                                                                  • Opcode Fuzzy Hash: 4588da79e92c420ad40f8901448f008663d35a7438d1ce6a86dddb111ba74866
                                                                  • Instruction Fuzzy Hash: 7FB12430B083459FD706AB78D815BAA7BF6AF86304F1484BAE185DF392EA74DC09C751

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1031 5f32cfc-5f36190 1033 5f36192-5f36195 1031->1033 1034 5f36198-5f36204 RegOpenKeyExW 1031->1034 1033->1034 1036 5f36206-5f3620c 1034->1036 1037 5f3620d-5f36245 1034->1037 1036->1037 1041 5f36247-5f36250 1037->1041 1042 5f36258 1037->1042 1041->1042 1043 5f36259 1042->1043 1043->1043
                                                                  APIs
                                                                  • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 05F361F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197652305.0000000005F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5f30000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Open
                                                                  • String ID: t8$|9
                                                                  • API String ID: 71445658-2897010974
                                                                  • Opcode ID: 25ac85e04cc9ba2533659b4fa588278cb892748e39496cf6c78a9c96deb080ec
                                                                  • Instruction ID: b9cc73ee5c31b9bf48200a66a7866d4ee4b7231d8b87b3c2aa4a444aeeb162fc
                                                                  • Opcode Fuzzy Hash: 25ac85e04cc9ba2533659b4fa588278cb892748e39496cf6c78a9c96deb080ec
                                                                  • Instruction Fuzzy Hash: D83113B0D052899FDB10CF99C585A8EFFF5BF48304F24816AE809AB355C7799984CF94

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2051 f086a0-f086ad 2052 f086b9-f086c5 2051->2052 2053 f086af-f086b4 2051->2053 2056 f086d5-f086da 2052->2056 2057 f086c7-f086c9 2052->2057 2054 f08a4e-f08a53 2053->2054 2056->2054 2058 f086d1-f086d3 2057->2058 2058->2056 2059 f086df-f086eb 2058->2059 2061 f086fb-f08700 2059->2061 2062 f086ed-f086f9 2059->2062 2061->2054 2062->2061 2064 f08705-f08710 2062->2064 2066 f08716-f08721 2064->2066 2067 f087ba-f087c5 2064->2067 2070 f08723-f08735 2066->2070 2071 f08737 2066->2071 2072 f08868-f08874 2067->2072 2073 f087cb-f087da 2067->2073 2074 f0873c-f0873e 2070->2074 2071->2074 2082 f08884-f08896 2072->2082 2083 f08876-f08882 2072->2083 2080 f087eb-f087fa 2073->2080 2081 f087dc-f087e6 2073->2081 2077 f08740-f0874f 2074->2077 2078 f0875e-f08763 2074->2078 2077->2078 2088 f08751-f0875c 2077->2088 2078->2054 2090 f087fc-f08808 2080->2090 2091 f0881e-f08827 2080->2091 2081->2054 2095 f08898-f088a4 2082->2095 2096 f088ba-f088bf 2082->2096 2083->2082 2092 f088c4-f088cf 2083->2092 2088->2078 2099 f08768-f08771 2088->2099 2101 f08814-f08819 2090->2101 2102 f0880a-f0880f 2090->2102 2105 f08829-f0883b 2091->2105 2106 f0883d 2091->2106 2103 f089b1-f089bc 2092->2103 2104 f088d5-f088de 2092->2104 2115 f088b0-f088b5 2095->2115 2116 f088a6-f088ab 2095->2116 2096->2054 2110 f08773-f08778 2099->2110 2111 f0877d-f0878c 2099->2111 2101->2054 2102->2054 2120 f089e6-f089f5 2103->2120 2121 f089be-f089c8 2103->2121 2118 f088e0-f088f2 2104->2118 2119 f088f4 2104->2119 2108 f08842-f08844 2105->2108 2106->2108 2108->2072 2113 f08846-f08852 2108->2113 2110->2054 2129 f087b0-f087b5 2111->2129 2130 f0878e-f0879a 2111->2130 2131 f08854-f08859 2113->2131 2132 f0885e-f08863 2113->2132 2115->2054 2116->2054 2122 f088f9-f088fb 2118->2122 2119->2122 2134 f089f7-f08a06 2120->2134 2135 f08a49 2120->2135 2137 f089ca-f089d6 2121->2137 2138 f089df-f089e4 2121->2138 2127 f0890b 2122->2127 2128 f088fd-f08909 2122->2128 2136 f08910-f08912 2127->2136 2128->2136 2129->2054 2144 f087a6-f087ab 2130->2144 2145 f0879c-f087a1 2130->2145 2131->2054 2132->2054 2134->2135 2147 f08a08-f08a20 2134->2147 2135->2054 2141 f08914-f08919 2136->2141 2142 f0891e-f08931 2136->2142 2137->2138 2149 f089d8-f089dd 2137->2149 2138->2054 2141->2054 2150 f08933 2142->2150 2151 f08969-f08973 2142->2151 2144->2054 2145->2054 2161 f08a42-f08a47 2147->2161 2162 f08a22-f08a40 2147->2162 2149->2054 2153 f08936-f08947 2150->2153 2157 f08992-f0899e 2151->2157 2158 f08975-f08981 2151->2158 2159 f08949-f0894c 2153->2159 2160 f0894e-f08953 2153->2160 2166 f089a0-f089a5 2157->2166 2167 f089a7 2157->2167 2171 f08983-f08986 2158->2171 2172 f08988-f0898d 2158->2172 2159->2160 2164 f08958-f0895b 2159->2164 2160->2054 2161->2054 2162->2054 2168 f08961-f08967 2164->2168 2169 f08a54-f08a7c 2164->2169 2173 f089ac 2166->2173 2167->2173 2168->2151 2168->2153 2176 f08a88-f08a93 2169->2176 2177 f08a7e-f08a83 2169->2177 2171->2157 2171->2172 2172->2054 2173->2054 2181 f08a99-f08aa4 2176->2181 2182 f08b3b-f08b44 2176->2182 2179 f08c09-f08c0d 2177->2179 2187 f08aa6-f08ab8 2181->2187 2188 f08aba 2181->2188 2185 f08b46-f08b51 2182->2185 2186 f08b8f-f08b9a 2182->2186 2197 f08c07 2185->2197 2198 f08b57-f08b69 2185->2198 2195 f08bb0 2186->2195 2196 f08b9c-f08bae 2186->2196 2189 f08abf-f08ac1 2187->2189 2188->2189 2191 f08ac3-f08ad2 2189->2191 2192 f08af6-f08b08 2189->2192 2191->2192 2202 f08ad4-f08aea 2191->2202 2192->2197 2206 f08b0e-f08b1c 2192->2206 2200 f08bb5-f08bb7 2195->2200 2196->2200 2197->2179 2198->2197 2207 f08b6f-f08b73 2198->2207 2200->2197 2204 f08bb9-f08bc8 2200->2204 2202->2192 2227 f08aec-f08af1 2202->2227 2217 f08bf0 2204->2217 2218 f08bca-f08bd3 2204->2218 2215 f08b28-f08b2b 2206->2215 2216 f08b1e-f08b23 2206->2216 2208 f08b75-f08b7a 2207->2208 2209 f08b7f-f08b82 2207->2209 2208->2179 2213 f08b88-f08b8b 2209->2213 2214 f08c0e-f08c39 2209->2214 2213->2207 2219 f08b8d 2213->2219 2233 f08c3b-f08c3d 2214->2233 2234 f08c3f-f08c43 2214->2234 2215->2214 2220 f08b31-f08b34 2215->2220 2216->2179 2221 f08bf5-f08bf7 2217->2221 2228 f08bd5-f08be7 2218->2228 2229 f08be9 2218->2229 2219->2197 2220->2206 2225 f08b36 2220->2225 2221->2197 2226 f08bf9-f08c05 2221->2226 2225->2197 2226->2179 2227->2179 2231 f08bee 2228->2231 2229->2231 2231->2221 2236 f08c49-f08c4a 2233->2236 2234->2236
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q$;^q
                                                                  • API String ID: 0-799016360
                                                                  • Opcode ID: b7189009124b813dee90029d7f7ce9b52c52dd8480cb2b45bd0f88b0e95f6ce9
                                                                  • Instruction ID: 76757487c2d1a65241cb02db350ff64fe7983ca6c20992cc88956d7649290cf3
                                                                  • Opcode Fuzzy Hash: b7189009124b813dee90029d7f7ce9b52c52dd8480cb2b45bd0f88b0e95f6ce9
                                                                  • Instruction Fuzzy Hash: BFF183317041018FDB259A29C9547397AA6BF847A4F1844AAE486CF3E6EF39CC43F751

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2237 f05e70-f05e8f 2238 f05e91-f05e9b 2237->2238 2239 f05eb4-f05edf 2237->2239 2240 f05eb0-f05eb3 2238->2240 2241 f05e9d-f05eae 2238->2241 2244 f05ee1-f05eeb 2239->2244 2245 f05f04-f05f39 2239->2245 2241->2240 2246 f05f00-f05f03 2244->2246 2247 f05eed-f05efe 2244->2247 2249 f05ff4-f06004 2245->2249 2250 f05f3f-f05f53 2245->2250 2247->2246 2502 f06006 call f05e70 2249->2502 2503 f06006 call f06030 2249->2503 2504 f06006 call f061c4 2249->2504 2254 f05f55-f05f57 2250->2254 2255 f05f59 2250->2255 2256 f05f5c-f05f71 2254->2256 2255->2256 2259 f05f73-f05f82 2256->2259 2260 f05fb8-f05fe1 call f05900 2256->2260 2257 f0600c-f06013 2266 f06014 2259->2266 2267 f05f88-f05f8b 2259->2267 2264 f05fe3-f05fea 2260->2264 2265 f05fec-f05ff2 2260->2265 2264->2257 2265->2257 2269 f06019-f06053 2266->2269 2268 f05f91-f05f97 2267->2268 2267->2269 2268->2260 2271 f05f99-f05fb6 2268->2271 2274 f06095-f06097 2269->2274 2275 f06055-f0605a 2269->2275 2271->2260 2278 f060a1-f060b5 2274->2278 2279 f06099-f0609f 2274->2279 2276 f06060-f06063 2275->2276 2277 f0627b 2275->2277 2281 f06280-f062f4 2276->2281 2282 f06069-f0606f 2276->2282 2277->2281 2298 f060d0 2278->2298 2299 f060b7-f060bb 2278->2299 2283 f060d6-f060d8 2279->2283 2328 f06300-f0631f 2281->2328 2329 f062f6-f062ff 2281->2329 2282->2274 2286 f06071-f06090 2282->2286 2284 f060e1-f060ea 2283->2284 2285 f060da-f060df 2283->2285 2295 f060fa-f0610c 2284->2295 2296 f060ec-f060f5 2284->2296 2285->2284 2288 f06144-f06147 2285->2288 2305 f061a5-f061b9 2286->2305 2288->2277 2290 f0614d-f06150 2288->2290 2290->2281 2294 f06156-f0615c 2290->2294 2300 f0617d-f0618e 2294->2300 2301 f0615e-f0617b 2294->2301 2295->2277 2310 f06112-f06115 2295->2310 2296->2300 2298->2283 2299->2298 2303 f060bd-f060ce 2299->2303 2300->2305 2312 f06190-f0619f 2300->2312 2301->2300 2303->2283 2303->2298 2322 f061c0-f06257 2305->2322 2310->2281 2314 f0611b-f06121 2310->2314 2312->2305 2314->2300 2316 f06123-f06142 2314->2316 2316->2300 2334 f06259-f0625d 2322->2334 2335 f0625f-f06265 2322->2335 2339 f06321-f0632a 2328->2339 2340 f0632b-f06337 2328->2340 2334->2335 2336 f06267-f0626d 2334->2336 2337 f0626f-f06278 2335->2337 2336->2337 2341 f0633d-f06346 2340->2341 2342 f065df-f065e9 2340->2342 2344 f065f8-f0661f 2341->2344 2345 f0634c-f06385 2341->2345 2348 f06621-f0662b 2344->2348 2349 f06644-f0670d 2344->2349 2361 f06598-f065bc 2345->2361 2362 f0638b-f063c3 2345->2362 2351 f06640-f06643 2348->2351 2352 f0662d-f0663e 2348->2352 2380 f06719-f06898 2349->2380 2381 f0670f-f06718 2349->2381 2352->2351 2369 f065c7 2361->2369 2370 f065be 2361->2370 2377 f063c9-f063e1 2362->2377 2378 f0646b-f06483 2362->2378 2369->2342 2370->2369 2389 f06571-f06582 2377->2389 2390 f063e7-f06402 2377->2390 2387 f06485-f0649d 2378->2387 2388 f064cf-f064e7 2378->2388 2454 f0689a 2380->2454 2455 f0689e-f068a0 2380->2455 2387->2389 2405 f064a3-f064be 2387->2405 2402 f064e9-f06501 2388->2402 2403 f0652b-f06561 2388->2403 2412 f06587-f06592 2389->2412 2390->2389 2401 f06408-f0642e 2390->2401 2401->2389 2424 f06434-f0644f 2401->2424 2402->2389 2420 f06503-f0651e 2402->2420 2403->2412 2430 f06563-f0656f 2403->2430 2405->2389 2418 f064c4-f064c7 2405->2418 2412->2361 2412->2362 2418->2388 2420->2389 2431 f06520-f06523 2420->2431 2424->2389 2436 f06455-f06463 2424->2436 2430->2412 2431->2403 2436->2378 2456 f068a2 2454->2456 2457 f0689c 2454->2457 2458 f068a7-f068c5 2455->2458 2456->2458 2457->2455 2459 f068d1-f0693f 2458->2459 2460 f068c7-f068d0 2458->2460 2468 f06941-f0695a 2459->2468 2469 f06962-f069b3 2459->2469 2468->2469 2472 f06ae0-f06af5 2469->2472 2473 f069b9-f06a5e 2469->2473 2490 f06a60-f06ac0 2473->2490 2491 f06acb-f06ada 2473->2491 2490->2491 2491->2472 2491->2473 2502->2257 2503->2257 2504->2257
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q$\$\
                                                                  • API String ID: 0-2226078569
                                                                  • Opcode ID: e094dd8c96dc19a556b57d95ceca4d5a6708881454703664e465ce0e796600ec
                                                                  • Instruction ID: 6a426466a94512686272dba2498b2017d14f81c41771a9568919323e50f65beb
                                                                  • Opcode Fuzzy Hash: e094dd8c96dc19a556b57d95ceca4d5a6708881454703664e465ce0e796600ec
                                                                  • Instruction Fuzzy Hash: 5A712530B046419FDB05DB788C546AF7BB6AB86310F1485BAE508DB6D6DB78CC02DBA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 84fd043ddc2b2c8aac23f290a4cb1b7cbf76bf3355e42b5db4d12a7ac3d5cccb
                                                                  • Instruction ID: 8ec3b0529f5a81a96e39196256b4b4c94184c887983716a7be5824f91f222093
                                                                  • Opcode Fuzzy Hash: 84fd043ddc2b2c8aac23f290a4cb1b7cbf76bf3355e42b5db4d12a7ac3d5cccb
                                                                  • Instruction Fuzzy Hash: 04A21774A50229CFCB65DF20D84869DB7B6BF88305F5084E9D94AA3348DF399E82CF45
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$ fcq$PH^q
                                                                  • API String ID: 0-4172635152
                                                                  • Opcode ID: 78c87238ebda5030c829a5f1d820c3836c19df831b604aa22e1ed5b804eb6c03
                                                                  • Instruction ID: e2baf43d014970780e262cc4789b0b3c67e6c2d23fa7bd5813d0078e7b73a572
                                                                  • Opcode Fuzzy Hash: 78c87238ebda5030c829a5f1d820c3836c19df831b604aa22e1ed5b804eb6c03
                                                                  • Instruction Fuzzy Hash: 50714E31F002098FDB54AB74D55876E76E7AFC8710F104428E44ADB3C4EF799C429B92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197652305.0000000005F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5f30000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 0?
                                                                  • API String ID: 0-3145223607
                                                                  • Opcode ID: 693f9aa8633396794b15231061c1213dd5a304ce97161dbf1908ef3b834157a7
                                                                  • Instruction ID: d5e6f22a4fa0453311d5fe259e6715a2a2275f2676f86c74b55daffc41f00183
                                                                  • Opcode Fuzzy Hash: 693f9aa8633396794b15231061c1213dd5a304ce97161dbf1908ef3b834157a7
                                                                  • Instruction Fuzzy Hash: 4E414531E083898FCB15CFB9C81429EBFF1AFC9310F1885ABD444A7691DB389845CB91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 78b55a3b89402c42256b732c615a9f3d0dd8a3a2e1f79a579e94a479ec72a011
                                                                  • Instruction ID: 24da25248984e47acf45866dbc87a928828738ae44dfcff6a9642678d7c4ca1b
                                                                  • Opcode Fuzzy Hash: 78b55a3b89402c42256b732c615a9f3d0dd8a3a2e1f79a579e94a479ec72a011
                                                                  • Instruction Fuzzy Hash: 3B6229B4A50219CFCB25DF70D84869DB7B6BF88205F5084E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 6b33902ff1d5da70d9b1c98de8565770249846117b508326e833660c1e08de12
                                                                  • Instruction ID: e92465df360415116458b4951f979269e359a722df55d2b0b0f842feeb00099d
                                                                  • Opcode Fuzzy Hash: 6b33902ff1d5da70d9b1c98de8565770249846117b508326e833660c1e08de12
                                                                  • Instruction Fuzzy Hash: 945229B4A50229CFCB25DF70D94869DB7B6BF88205F5084E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 28cd06807b41dac41acf9a5366cc65e7840bdc5f51146a233e7b767b031f5986
                                                                  • Instruction ID: 1efd262a2ab1e0ba4d7009d56b430d9d9dd2e42666ea3a9dd8b800a5e8cc9bcc
                                                                  • Opcode Fuzzy Hash: 28cd06807b41dac41acf9a5366cc65e7840bdc5f51146a233e7b767b031f5986
                                                                  • Instruction Fuzzy Hash: A75219B4A50219CFCB25DF70D94869DBBB6BF88205F5084E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: c48db9f30a8943e3c9ecaf1ac44d0dc26da84d8141fc6cfcf33996aa2c6db539
                                                                  • Instruction ID: 91f6c39a6d5ce2f3c6728ab416b8846c28432a2e2aa66b752435ee0cfb48912a
                                                                  • Opcode Fuzzy Hash: c48db9f30a8943e3c9ecaf1ac44d0dc26da84d8141fc6cfcf33996aa2c6db539
                                                                  • Instruction Fuzzy Hash: 8B5219B4A50219CFCB25DF70D94869DBBB6BF88205F5084E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: d64be3faee347deef6f799c2e4d9a69bf45d1e253f95fee3c11531f4898eb7c4
                                                                  • Instruction ID: 26ea158db182fa67de988a3190d58a8799b7f6fa6be07fd227de7ef68bd6ac23
                                                                  • Opcode Fuzzy Hash: d64be3faee347deef6f799c2e4d9a69bf45d1e253f95fee3c11531f4898eb7c4
                                                                  • Instruction Fuzzy Hash: 635228B4A50219CFCB25DF70D94869DBBB6BF88205F5084E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 03e5aaeef394cc01e6d997fe1f707ba73b268c0cb4ed860a55a4ba96308d9b64
                                                                  • Instruction ID: da9176cc6533df9395a34daf2a0f60d91284dcca07e1af4e8e92f4cb79c347d7
                                                                  • Opcode Fuzzy Hash: 03e5aaeef394cc01e6d997fe1f707ba73b268c0cb4ed860a55a4ba96308d9b64
                                                                  • Instruction Fuzzy Hash: D05218B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 4d2837fc59aa21bed2681cc1ddf866b2026bc00740a275f29cc2813e3b5481f3
                                                                  • Instruction ID: 4ccb2d88c9e1c79ff0777140f74ba81c4231f70210f28e3224dc4932442c7b4f
                                                                  • Opcode Fuzzy Hash: 4d2837fc59aa21bed2681cc1ddf866b2026bc00740a275f29cc2813e3b5481f3
                                                                  • Instruction Fuzzy Hash: AF5218B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 07f62b6dd2a9c3430bcabd9ca1c9c181ff1e00aca0712b27eb17c8aee8d50b3e
                                                                  • Instruction ID: e82d8b8c32788b9f641464499c8cc9ab6d6b3c7a99a01c3c9234374e6dfb8110
                                                                  • Opcode Fuzzy Hash: 07f62b6dd2a9c3430bcabd9ca1c9c181ff1e00aca0712b27eb17c8aee8d50b3e
                                                                  • Instruction Fuzzy Hash: 4C5218B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 5af37cfacaf4fcd1099a7f672acc9d1b1ae9c39dbfcfb81534806e9cadd198a3
                                                                  • Instruction ID: 8ce63b86bbb23807f01471ccb0958bf640b71d5c5518488f9e74fca7ccdaf34e
                                                                  • Opcode Fuzzy Hash: 5af37cfacaf4fcd1099a7f672acc9d1b1ae9c39dbfcfb81534806e9cadd198a3
                                                                  • Instruction Fuzzy Hash: C75218B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 95fc457639bc88dd54ebf1491ea1a09ebc095a0cebf6aaa9ab481d72f0e820fa
                                                                  • Instruction ID: c915d42b27611e2e75f9cafe3529eff0bd29a1c80842c79cc9cc967166062aad
                                                                  • Opcode Fuzzy Hash: 95fc457639bc88dd54ebf1491ea1a09ebc095a0cebf6aaa9ab481d72f0e820fa
                                                                  • Instruction Fuzzy Hash: 934218B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: ca5e7f88f2d9e4ac9f8847a7776cf6df8e018dbfa438c83a2983e5858a0ff9b7
                                                                  • Instruction ID: de8fba9df0da654d14af2e6b2b633f6f13356a3ac9dddb67f616508710181a09
                                                                  • Opcode Fuzzy Hash: ca5e7f88f2d9e4ac9f8847a7776cf6df8e018dbfa438c83a2983e5858a0ff9b7
                                                                  • Instruction Fuzzy Hash: AB4227B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 29874e373e008b74df704f3957149791a2f3fd82d010e1b0c86ce80352db64e7
                                                                  • Instruction ID: b057de4514d0f0b86274360162ccd2888c287d707fff20c34cd20fc79f83d060
                                                                  • Opcode Fuzzy Hash: 29874e373e008b74df704f3957149791a2f3fd82d010e1b0c86ce80352db64e7
                                                                  • Instruction Fuzzy Hash: 464228B4A40219CFCB25DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: a4af2d02c008adb14c7648a5a5b304faa312c13159171ad8f0426653eaf18456
                                                                  • Instruction ID: eda25b21766f87c9e7653392a4f0521df950bcc9429ab3b84d3fde8e55bcacab
                                                                  • Opcode Fuzzy Hash: a4af2d02c008adb14c7648a5a5b304faa312c13159171ad8f0426653eaf18456
                                                                  • Instruction Fuzzy Hash: 3B4228B4A40219CFCB25DF70D94869DBBB6BF88205F5084E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 85232ddf51410bc97573be14f3eeea00bdf815ab5dece6518a95c662dc15359f
                                                                  • Instruction ID: 58ded56fb3eb91ac77f3e20fcef7be909869fefd90aa7d2f612d2ad346154637
                                                                  • Opcode Fuzzy Hash: 85232ddf51410bc97573be14f3eeea00bdf815ab5dece6518a95c662dc15359f
                                                                  • Instruction Fuzzy Hash: 2A4227B4A00219CFCB24DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF45
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 792e932bfe87ee2eb437f7c3cb24eea5ae7648d02339515723776e4d466626d5
                                                                  • Instruction ID: 2f20d77c131beebc6fa02884b6e35111976831ff8f26ac28d6c9ac43b91bf23a
                                                                  • Opcode Fuzzy Hash: 792e932bfe87ee2eb437f7c3cb24eea5ae7648d02339515723776e4d466626d5
                                                                  • Instruction Fuzzy Hash: CC4227B4A40219CFCB24DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 5cda9498b70375a5369df68bb5f6ecedeff73df71169aac228bd9a536c659015
                                                                  • Instruction ID: 409b95c31d7e8deb74efddf58b99ab32d7208562c22861d7e206bfab0c15df0e
                                                                  • Opcode Fuzzy Hash: 5cda9498b70375a5369df68bb5f6ecedeff73df71169aac228bd9a536c659015
                                                                  • Instruction Fuzzy Hash: BD3228B4A40219CFCB24DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 5a41928a3a8e5b181037ce07668277b18660ef4f5b055e98f042ae3c2cf50727
                                                                  • Instruction ID: 295fe46aa3d9de813b17aaf396a8e1093cb69f0885c5f3c6c2dfecbcca736979
                                                                  • Opcode Fuzzy Hash: 5a41928a3a8e5b181037ce07668277b18660ef4f5b055e98f042ae3c2cf50727
                                                                  • Instruction Fuzzy Hash: 1C3228B4A40219CFCB24DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 299dbd6b85fec07aad8c63629e70e4875e0c1f9711efe81e96b4df8170c192da
                                                                  • Instruction ID: 7a7e73b8bcdee6883c288f1fb5c5679dfe6cf78df088a2d84363b606ff9b74b8
                                                                  • Opcode Fuzzy Hash: 299dbd6b85fec07aad8c63629e70e4875e0c1f9711efe81e96b4df8170c192da
                                                                  • Instruction Fuzzy Hash: 093228B4A00219CFCB24DF70D94869DBBB6BF88205F5085E9D909A3348DF399E82CF55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 28260b6e9e5e00430267c3bffc174336307a47f85cc4ad6900a156268b850a8c
                                                                  • Instruction ID: 8108a313deb1717c0026de56499367daf9bd176f45f7b1e517e3af717c537593
                                                                  • Opcode Fuzzy Hash: 28260b6e9e5e00430267c3bffc174336307a47f85cc4ad6900a156268b850a8c
                                                                  • Instruction Fuzzy Hash: FE3228B4A00219CFCB24DF74D94869DBBB6BF88205F5085E9D909A3348DF399E82CF55
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197085215.0000000005650000.00000040.00000800.00020000.00000000.sdmp, Offset: 05650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5650000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: 8dfb7dd9e293943db5bec227bd21045415b5637ee411994da18a452e1a457410
                                                                  • Instruction ID: 8a5a13d5a4041a8923bbdced16a50b7fbe4cd91728672ab6d3964d5febf923e7
                                                                  • Opcode Fuzzy Hash: 8dfb7dd9e293943db5bec227bd21045415b5637ee411994da18a452e1a457410
                                                                  • Instruction Fuzzy Hash: 503228B4A00219CFCB24DF74D94869DBBB6BF88205F5085E9D909A3348DF399E82CF55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq$Hbq
                                                                  • API String ID: 0-4258043069
                                                                  • Opcode ID: 61f2f763046e1e615f85f80cc1ef91df1d1ec9a5cf5439daef28f0ba56e9d5f0
                                                                  • Instruction ID: 8eba94f9879a2bcad388f2b2adca7e3e7007cc383d1f67b750667fa87574e9a2
                                                                  • Opcode Fuzzy Hash: 61f2f763046e1e615f85f80cc1ef91df1d1ec9a5cf5439daef28f0ba56e9d5f0
                                                                  • Instruction Fuzzy Hash: 5D91CF31B041099FDB09EF68C864BAE7BA6BB88310F148429F506DB2C5DF75DD41EB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q
                                                                  • API String ID: 0-2697143702
                                                                  • Opcode ID: 3ba87d5e50e8a0d511492a6867f0ceb8881c27fb1618d944eada248441d5b1f2
                                                                  • Instruction ID: 29f95d38f354e13094837a753f50c22d26025005269a629320150e9bd36dea3d
                                                                  • Opcode Fuzzy Hash: 3ba87d5e50e8a0d511492a6867f0ceb8881c27fb1618d944eada248441d5b1f2
                                                                  • Instruction Fuzzy Hash: 2151AD307052459FDB05DF69D844BAEBBA6EF88320F148066F908CB396DB75CC02EB61
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q
                                                                  • API String ID: 0-2325994563
                                                                  • Opcode ID: 39e3b204e624091e182da2e1025543c44bc7642291cf743e4d6fbdd7275586b5
                                                                  • Instruction ID: c2bcd5e59a979c8a8ef020ac67eb108debcbc6a9fbea2d74b696c149c6959eee
                                                                  • Opcode Fuzzy Hash: 39e3b204e624091e182da2e1025543c44bc7642291cf743e4d6fbdd7275586b5
                                                                  • Instruction Fuzzy Hash: 0E417131F002058FDB24AB74D95876E76E6BBC8750F204468E446DB3D8EF799C02AB91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q
                                                                  • API String ID: 0-2697143702
                                                                  • Opcode ID: 7cd72a62bd0805886bd1018f0df5b01559da3b8e8017d887e371f3327c806b70
                                                                  • Instruction ID: 34367b5cd8ba097bcae84dcf7a9b3363b0e20fad452fa918d7cb5a5fdc856972
                                                                  • Opcode Fuzzy Hash: 7cd72a62bd0805886bd1018f0df5b01559da3b8e8017d887e371f3327c806b70
                                                                  • Instruction Fuzzy Hash: 1D0186353441052FDB081AA998549BABB9BEBCC360B14847AF909C7395DE76CC035351
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 010F56B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: 099e03fa18a9ceff5efdbce682c67e18de7305b4720f00307fce296f2f9c53f2
                                                                  • Instruction ID: b0020e7e89d8ad8d2ac43a55b8a7a07aa9595147b28c26ffa620538046bdc67d
                                                                  • Opcode Fuzzy Hash: 099e03fa18a9ceff5efdbce682c67e18de7305b4720f00307fce296f2f9c53f2
                                                                  • Instruction Fuzzy Hash: 9CC1AF70A007068FDB05DF69D89565EBBF2FF88300B008A6ED586DBB51DB74E945CB90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148156501.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_ef0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: f07914bf5b14e3c5d895c2ad6c4cb1b563dbec041d6829f35eb847912e0d0a65
                                                                  • Instruction ID: 485935b2e815239082c417676a79f40f0c35b95652a7f5ae87be3120ccee08a5
                                                                  • Opcode Fuzzy Hash: f07914bf5b14e3c5d895c2ad6c4cb1b563dbec041d6829f35eb847912e0d0a65
                                                                  • Instruction Fuzzy Hash: FD618871A00209DFDB14EFB4D858BAEBBB2AF85304F108529EA52A7394DF799945CB40
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010F680A
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 0cc7e1d3f675f06b3dc2b75c8df10eb04c9b5e91f513992ee0ad55e82bc3ac53
                                                                  • Instruction ID: d12a932d61638e40bc97ab77bd36934d17a336f105ae5b6e90ec2959cd8b9096
                                                                  • Opcode Fuzzy Hash: 0cc7e1d3f675f06b3dc2b75c8df10eb04c9b5e91f513992ee0ad55e82bc3ac53
                                                                  • Instruction Fuzzy Hash: 6B5111B1C04349AFDF01CFA9C980ADEBFB1BF48310F19816AE508AB221D3759955CF50
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010F680A
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 8e4c7281bb1b02645f794bff12bee09932545e76c6942f2d1166f4006524ecb4
                                                                  • Instruction ID: 4771ff96aa073de52c0d5b108c37a16c7ce979d5bc66c8b4382aa3b3c9c2358f
                                                                  • Opcode Fuzzy Hash: 8e4c7281bb1b02645f794bff12bee09932545e76c6942f2d1166f4006524ecb4
                                                                  • Instruction Fuzzy Hash: A641AFB1D003099FDB14CF9AC984ADEBFB5BF48310F24822EE519AB210D775A945CF91
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 010FB579
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: e2f5a58d8b7f4b1a428ddbe8718895f1fc7a62a3e9f4826dfd7aeceb63fe156b
                                                                  • Instruction ID: 05ad7d7c2c7c7332779ac32243bc7c825a567cef55fae9940a080c85c559c96b
                                                                  • Opcode Fuzzy Hash: e2f5a58d8b7f4b1a428ddbe8718895f1fc7a62a3e9f4826dfd7aeceb63fe156b
                                                                  • Instruction Fuzzy Hash: 744107B4A00305CFDB14CF99C489AAEBBF5FB88714F24C459D659AB721D774A841CFA0
                                                                  APIs
                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 05F36461
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197652305.0000000005F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5f30000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID:
                                                                  • API String ID: 3660427363-0
                                                                  • Opcode ID: 4ad77b2ff19ad8ccdd1eb93c8497a5e2f50a616940809443f47a465d6db38d37
                                                                  • Instruction ID: a897c311a86d9ade8923331107f0598d7063a9d12fe3cd3677e10027958a52d8
                                                                  • Opcode Fuzzy Hash: 4ad77b2ff19ad8ccdd1eb93c8497a5e2f50a616940809443f47a465d6db38d37
                                                                  • Instruction Fuzzy Hash: 953112B1D04258EFDB20CFAAC880A8EBFF5BF48300F14802AE859AB314D7749905CF90
                                                                  APIs
                                                                  • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 05F36461
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197652305.0000000005F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5f30000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: QueryValue
                                                                  • String ID:
                                                                  • API String ID: 3660427363-0
                                                                  • Opcode ID: 5f185e38c6239dd9cc4f48d76ed524eca5c8074e5b6a2fb854e139025361bf74
                                                                  • Instruction ID: 11402a50346473cfa8a7d2eac301d3ca4b6455f1e129175aaaabafb10d626893
                                                                  • Opcode Fuzzy Hash: 5f185e38c6239dd9cc4f48d76ed524eca5c8074e5b6a2fb854e139025361bf74
                                                                  • Instruction Fuzzy Hash: B131D1B1D04258EFDB24CF9AC985A9EBBF5BF48710F14802AE819AB314D7749945CF90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148156501.0000000000EF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EF0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_ef0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: e033204dd423ba15cf99be048c33929e49277b1a953b51e505982bf1c044c970
                                                                  • Instruction ID: 4e9357d948b6ffc3a773593b9db7b71059916aaf94d6b380642faaf8fe4a3cfa
                                                                  • Opcode Fuzzy Hash: e033204dd423ba15cf99be048c33929e49277b1a953b51e505982bf1c044c970
                                                                  • Instruction Fuzzy Hash: 5C312170A05348DFDB02DFB8D458BAEBFB2AF45300F1485ADE141AB791D73A9845CB50
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010FA67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 39de305b12068961378784c1079a1c011a58400769f1e07433116e0ada37176d
                                                                  • Instruction ID: 8881904bc00762831cbd788ea2b78163972bedc7bd63115941842b79e9247c80
                                                                  • Opcode Fuzzy Hash: 39de305b12068961378784c1079a1c011a58400769f1e07433116e0ada37176d
                                                                  • Instruction Fuzzy Hash: 5921E3B5D00208DFDB10CF9AD985ADEBBF8EB48310F14801AE958A7310D378A944CFA5
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010FA67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 509fd1fd98cff97bddb65d63299133d0a1065717cbcef3e312089300e33c469e
                                                                  • Instruction ID: c2f64ca608ca7a401cd9724837abb775ff86717e2d6fd644798cacbf0ea39183
                                                                  • Opcode Fuzzy Hash: 509fd1fd98cff97bddb65d63299133d0a1065717cbcef3e312089300e33c469e
                                                                  • Instruction Fuzzy Hash: F721B3B5D002589FDB10CF9AD584ADEBBF8EB48310F14841AE958A7250D378A954CFA5
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05F388BA), ref: 05F389A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197652305.0000000005F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5f30000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: 9fdffa1a60242fd46db44d4a206a28acaa1e7be4f5a097ba959fae954fe5e53c
                                                                  • Instruction ID: 124d9cba65c7446d5b74acb2ba21095ca62264777a461617463f9d1e6ee9c0ec
                                                                  • Opcode Fuzzy Hash: 9fdffa1a60242fd46db44d4a206a28acaa1e7be4f5a097ba959fae954fe5e53c
                                                                  • Instruction Fuzzy Hash: E61130B1C052599BDB10CF9AC544B9EFBF4BB48320F10812AE818B7240E378A940CFA6
                                                                  APIs
                                                                  • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,05F388BA), ref: 05F389A7
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4197652305.0000000005F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F30000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_5f30000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: GlobalMemoryStatus
                                                                  • String ID:
                                                                  • API String ID: 1890195054-0
                                                                  • Opcode ID: b8adbb707ab97d7716cf30dd7d8a88d571607b17bb33bbabb2405ee986a10760
                                                                  • Instruction ID: 2373228207237be92383ef788b47980842b008f51ac91bfcae2479c53d6a3607
                                                                  • Opcode Fuzzy Hash: b8adbb707ab97d7716cf30dd7d8a88d571607b17bb33bbabb2405ee986a10760
                                                                  • Instruction Fuzzy Hash: 1D1133B1C052699FDB10CFAAC545BEEFBF4BF48320F14816AD818A7251D378A944CFA1
                                                                  APIs
                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 010FFF2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: EncodePointer
                                                                  • String ID:
                                                                  • API String ID: 2118026453-0
                                                                  • Opcode ID: 07ab4909c38c556619c72ea51ae76f0ca7780d215a37f5afabbb3f90c47115de
                                                                  • Instruction ID: 8ea0b3c629face5bcded9d0c95ab0f36d0f8f02d5cc6ffa8311299e50e118777
                                                                  • Opcode Fuzzy Hash: 07ab4909c38c556619c72ea51ae76f0ca7780d215a37f5afabbb3f90c47115de
                                                                  • Instruction Fuzzy Hash: 3911BBB190034ACFDB60CFA9C40979EBFF4FB05314F24802AD554A3646DB39A544CFA1
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 010F56B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4151291955.00000000010F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010F0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_10f0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: e9ea1417dfd79dfb4106a6ed52e439fda14d1c2f83a05537e89d61d18982ae7d
                                                                  • Instruction ID: 064e04cff359f1cf0da4c729b3be8dca0d030f58ed573ede167cc695abf545ea
                                                                  • Opcode Fuzzy Hash: e9ea1417dfd79dfb4106a6ed52e439fda14d1c2f83a05537e89d61d18982ae7d
                                                                  • Instruction Fuzzy Hash: 58113FB5C003498FDB10DF9AD844BDEFBF4EB88220F14846ADA68B7610D378A545CFA4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq
                                                                  • API String ID: 0-1245868
                                                                  • Opcode ID: 909376e2e33d92f4563d7f88be4cedd29ce2bf0484cb7c89a6f499e585528aba
                                                                  • Instruction ID: 3ddb562d9d995c76dc4e2eae1beff246e7ceccd11521867157b730f6d67946a8
                                                                  • Opcode Fuzzy Hash: 909376e2e33d92f4563d7f88be4cedd29ce2bf0484cb7c89a6f499e585528aba
                                                                  • Instruction Fuzzy Hash: 9531F230A0A6848FCB45DB7CC8187AE7FB1AF81300F5485BAD048CBA92DA398D06DB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 17c4d36f91eebebf2afc2131ee78a80ec0b17fb1835c0619149674642a92c096
                                                                  • Instruction ID: fdc674987dbe80b826f470ac0aeaa113560bff71cb790dc334c0f4a63298a2c3
                                                                  • Opcode Fuzzy Hash: 17c4d36f91eebebf2afc2131ee78a80ec0b17fb1835c0619149674642a92c096
                                                                  • Instruction Fuzzy Hash: C7914671A056058FC711CF6CD8845AAFBB1FF85320B14C6AAE854DB396D731EC12DBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ad33a4740c611a62761c46f9b34bd44e2935e3a318f861a81e8778826fc8d77c
                                                                  • Instruction ID: f0c5cb8f2449642ecf3e3d08393b18a0a42e793ff3a95cd59c432c9fa0138817
                                                                  • Opcode Fuzzy Hash: ad33a4740c611a62761c46f9b34bd44e2935e3a318f861a81e8778826fc8d77c
                                                                  • Instruction Fuzzy Hash: 48616975E0024ADFCF05CFA4C844ADEBFB2FF88350F148126E845AB2A5DB349956EB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b2fcaff4eac803893d7b0ede273310ba9160e2383186ed70771342e021bb3c8c
                                                                  • Instruction ID: 2219aba7b4f0528d97d3fb4808a4d6c6d945bef7b0eb70186e97e020e55b4966
                                                                  • Opcode Fuzzy Hash: b2fcaff4eac803893d7b0ede273310ba9160e2383186ed70771342e021bb3c8c
                                                                  • Instruction Fuzzy Hash: A2618C71E007498FCF15CFA5C5406DEFBF2AF99350F248619E894AB281DB70AD86EB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5a7e4e74712eb2db5dabff8421ecf837e997e75f461d282161153302fa2585eb
                                                                  • Instruction ID: 2ed0b182872e4ae1ae4b6257e0016ac002565a5c86e55416f34c9e0ef4571f7c
                                                                  • Opcode Fuzzy Hash: 5a7e4e74712eb2db5dabff8421ecf837e997e75f461d282161153302fa2585eb
                                                                  • Instruction Fuzzy Hash: 5161A474D00218CFDB24DFB4E89859DBBB6FF89301F10856AE84AA7358DB399942CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a971064b2ce08814ea8359e89112ec16b72bfa3abd113a3b942be6d3f59c35d2
                                                                  • Instruction ID: e136465050820c560e5e4bbda74b7892b642873f217e66b8a46599354d3990c6
                                                                  • Opcode Fuzzy Hash: a971064b2ce08814ea8359e89112ec16b72bfa3abd113a3b942be6d3f59c35d2
                                                                  • Instruction Fuzzy Hash: F651C434A04289DFCF11CFA4C8506AEBFB1AF45360F144166E891EB2E2CB35DD16EB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b24f39b15184052472eab99a5dce4039e1d4baa9f7192fa28049875ca8df6a8d
                                                                  • Instruction ID: 79e93bd9e0e0c520daa83b977483428d1d85ce1b25033f423403400f457ba22c
                                                                  • Opcode Fuzzy Hash: b24f39b15184052472eab99a5dce4039e1d4baa9f7192fa28049875ca8df6a8d
                                                                  • Instruction Fuzzy Hash: 9F31E270A053458FCB05CBA8E94469EBFF2EB85314F2481BAD108EB395E735AC02DB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4d9f324220e3dbf2e48dc1e020132f0ccefdd0d6e4d441070bc345156fd317e2
                                                                  • Instruction ID: e22d2bb75f0e732dc9a025a841fefd02d91d5d99f3b00aded26ff1947f1db62b
                                                                  • Opcode Fuzzy Hash: 4d9f324220e3dbf2e48dc1e020132f0ccefdd0d6e4d441070bc345156fd317e2
                                                                  • Instruction Fuzzy Hash: 2031C3306042848FCB11CF68CC547AA7FB1AF05364F094599E4C6DB6E2CB71EC42EB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b012983e64feaef29c2c226609a263f9876f306c5b6504dca6e50fb347b28a43
                                                                  • Instruction ID: 92730ee58d395de5951ef1547d3b4575ec9694d2f67de71b42ba4db82364aae7
                                                                  • Opcode Fuzzy Hash: b012983e64feaef29c2c226609a263f9876f306c5b6504dca6e50fb347b28a43
                                                                  • Instruction Fuzzy Hash: D321BE75F002158FCB10EFB898046AF7BF6AB88B50F108029E945E7384EB78DD019F95
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4150083230.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_101d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ce4485a415116cff3567d8f035297273c8f11ffabee5a0695252781eb0c1dc94
                                                                  • Instruction ID: 4b870643c2386a82b6f1b4ffb2ebe2078e377a412898d089409edce9e7377ff3
                                                                  • Opcode Fuzzy Hash: ce4485a415116cff3567d8f035297273c8f11ffabee5a0695252781eb0c1dc94
                                                                  • Instruction Fuzzy Hash: 2F212575504200DFCB16DF58D988B16BFA5FB84314F20C5ADE9894B25AC33AD447CB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cdb4fd35ac5f216be176abf92cb5d11366a61dfa7fe30803191e7e4a7c16cf65
                                                                  • Instruction ID: 7d890f061855cd7d64d37727fda7713f38541c5fd82b36dfe57ebe93bcc602fc
                                                                  • Opcode Fuzzy Hash: cdb4fd35ac5f216be176abf92cb5d11366a61dfa7fe30803191e7e4a7c16cf65
                                                                  • Instruction Fuzzy Hash: 26215A70E10219DBDB24DFA0D956BAEBFF9BF84305F104429E501A73D4CB759A02EB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 90707a368321e1238f99a0af9dbe0617d85a6e49f5635f93a064abb8e87660b8
                                                                  • Instruction ID: f37a1164ccbf9b732eead76361c41488070418280abaf459a24df7946fef0071
                                                                  • Opcode Fuzzy Hash: 90707a368321e1238f99a0af9dbe0617d85a6e49f5635f93a064abb8e87660b8
                                                                  • Instruction Fuzzy Hash: 79215A70E012499FDB05DFA5D550AEEBFF6BF48315F14802AF411E62A4DB349A42EB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4be52107db87b6d8679f603df3ac169f13cfba4e61820affadcf36c16c34a6e0
                                                                  • Instruction ID: 4f50a9bf5de9c46ec714423933a3d4a0b6ed3e4c8b04b76c367f9e57b72ebb5c
                                                                  • Opcode Fuzzy Hash: 4be52107db87b6d8679f603df3ac169f13cfba4e61820affadcf36c16c34a6e0
                                                                  • Instruction Fuzzy Hash: D621F574E002099FDF14EFF4E85869DBBB1BF88304F008569E55AAB398DB3959468F41
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e0f58adc1ea0091d277ab5d878460cd5e76b68ae6f899dea31aa9b6a4c68b09d
                                                                  • Instruction ID: 9063846ed27328f4c0b07822229167cef68f0dc7475993c2b09d7223646b0cda
                                                                  • Opcode Fuzzy Hash: e0f58adc1ea0091d277ab5d878460cd5e76b68ae6f899dea31aa9b6a4c68b09d
                                                                  • Instruction Fuzzy Hash: 3E11E031B04114CFCB15EF29D95477DB3A2AB84721F688529E81ACB2D2EBB1DC41FB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d5788de6e3f47009d8e6e83d343274c60a2abd5e45276979926f9afe9faf3b0b
                                                                  • Instruction ID: ccef733fdebd79eec35ddb5a34f4b25a98a164eaa9c491ebce85bc2e783f6779
                                                                  • Opcode Fuzzy Hash: d5788de6e3f47009d8e6e83d343274c60a2abd5e45276979926f9afe9faf3b0b
                                                                  • Instruction Fuzzy Hash: 0D11BE70E142589FDB15DF64D955A9EBFB1BF80300F10492EE441A77D8CB349802EB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4150083230.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_101d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: e96775076a5ba4b1027b67bfa55b6291fda18b934bb889845dc19e27deddfd15
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 8C119075504280DFDB16CF58D5C8B16FFA2FB44314F24C6AAE8494B65AC33BD44ACB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cfcbdbf6ef4e61795777797731ef6e28f687a9ed33a4bec6d67d3931dcabf060
                                                                  • Instruction ID: fb297ff6b00de49f544a253f8b9aad916f34c7d6791ddde69113cbf905c0f37f
                                                                  • Opcode Fuzzy Hash: cfcbdbf6ef4e61795777797731ef6e28f687a9ed33a4bec6d67d3931dcabf060
                                                                  • Instruction Fuzzy Hash: 8AF030B1E441169FCB509FAC68492EE7FF5FBC9220B20067AEA49D3704D67949038BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c9f0665c85287372503f019ccc4161d540240eb5c781a1d6848759e055ec72b4
                                                                  • Instruction ID: 2cead402a05ec129e3e20c650c4b8bd9b498590d2ad4d3e2e444f75dd5f3612b
                                                                  • Opcode Fuzzy Hash: c9f0665c85287372503f019ccc4161d540240eb5c781a1d6848759e055ec72b4
                                                                  • Instruction Fuzzy Hash: 0DE012B2E041199F87509BADA8056AE7BF9FB88621B100476E609D3304EA744A019BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 85bc17243ef40ec31925dfe7c2c6ef3da9ea3d3cfa79c3b35b5b2274451dff53
                                                                  • Instruction ID: c3a666ddd5f4ab207ed3acc4f78a0c5be2697621ff57bfdff61314cde35ba995
                                                                  • Opcode Fuzzy Hash: 85bc17243ef40ec31925dfe7c2c6ef3da9ea3d3cfa79c3b35b5b2274451dff53
                                                                  • Instruction Fuzzy Hash: EFD01211B512669ECF842BBF151033E04C72BC43D2B708C7A6503CA2EAFC2CCE913255
                                                                  Memory Dump Source
                                                                  • Source File: 00000007.00000002.4148501426.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_7_2_f00000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e6c254f69953e60acc003e6c26ec02454d06583106e3568e4870754cc4a3812
                                                                  • Instruction ID: 32d1be376c2587a904bb37d0641709286ad81145a3c2b69bc4d1aabae293ecdd
                                                                  • Opcode Fuzzy Hash: 0e6c254f69953e60acc003e6c26ec02454d06583106e3568e4870754cc4a3812
                                                                  • Instruction Fuzzy Hash: C4C0486544E3C16FC703473C88640647F30281702038A02EB8081CA8A7E64E492A87A3

                                                                  Execution Graph

                                                                  Execution Coverage:7.1%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:111
                                                                  Total number of Limit Nodes:6
                                                                  execution_graph 38302 154fad0 38303 154fb38 CreateWindowExW 38302->38303 38305 154fbf4 38303->38305 38315 1547540 38316 1547586 GetCurrentProcess 38315->38316 38318 15475d8 GetCurrentThread 38316->38318 38320 15475d1 38316->38320 38319 1547615 GetCurrentProcess 38318->38319 38321 154760e 38318->38321 38324 154764b 38319->38324 38320->38318 38321->38319 38322 1547673 GetCurrentThreadId 38323 15476a4 38322->38323 38324->38322 38306 9cd9488 38307 9cd9613 38306->38307 38308 9cd94ae 38306->38308 38308->38307 38311 9cd9708 PostMessageW 38308->38311 38313 9cd9700 PostMessageW 38308->38313 38312 9cd9774 38311->38312 38312->38308 38314 9cd9774 38313->38314 38314->38308 38325 9cd7c18 38326 9cd7ca1 CreateProcessA 38325->38326 38328 9cd7e63 38326->38328 38329 1547788 38330 1547804 DuplicateHandle 38329->38330 38331 154781e 38330->38331 38332 154d6c8 38333 154d710 GetModuleHandleW 38332->38333 38334 154d70a 38332->38334 38335 154d73d 38333->38335 38334->38333 38336 9cd7fd0 38338 9cd7ff2 38336->38338 38337 9cd84b6 38338->38337 38340 9cd8517 38338->38340 38341 9cd8532 38340->38341 38342 9cd8559 38341->38342 38349 9cd8a7f 38341->38349 38354 9cd90e2 38341->38354 38363 9cd8d53 38341->38363 38368 9cd8d80 38341->38368 38382 9cd8b91 38341->38382 38397 9cd8a54 38341->38397 38342->38338 38350 9cd8a99 38349->38350 38402 9cd7598 38350->38402 38406 9cd7590 38350->38406 38351 9cd8af6 38351->38342 38351->38351 38355 9cd90ec 38354->38355 38410 9cd77cf 38355->38410 38414 9cd7808 38355->38414 38418 9cd7810 38355->38418 38356 9cd91e2 38357 9cd9258 38356->38357 38422 9cd78f8 38356->38422 38426 9cd7900 38356->38426 38364 9cd8d70 38363->38364 38365 9cd9258 38364->38365 38366 9cd78f8 WriteProcessMemory 38364->38366 38367 9cd7900 WriteProcessMemory 38364->38367 38366->38365 38367->38365 38369 9cd8d91 38368->38369 38370 9cd8e37 38369->38370 38378 9cd78f8 WriteProcessMemory 38369->38378 38379 9cd7900 WriteProcessMemory 38369->38379 38373 9cd8af6 38370->38373 38374 9cd78f8 WriteProcessMemory 38370->38374 38375 9cd7900 WriteProcessMemory 38370->38375 38371 9cd8eeb 38372 9cd8a7a 38371->38372 38371->38373 38430 9cd7678 38371->38430 38434 9cd7670 38371->38434 38372->38373 38376 9cd7598 ResumeThread 38372->38376 38377 9cd7590 ResumeThread 38372->38377 38373->38342 38374->38371 38375->38371 38376->38373 38377->38373 38378->38370 38379->38370 38383 9cd8ba2 38382->38383 38384 9cd8c2c 38383->38384 38395 9cd7678 Wow64SetThreadContext 38383->38395 38396 9cd7670 Wow64SetThreadContext 38383->38396 38438 9cd7a18 38384->38438 38442 9cd7a20 38384->38442 38385 9cd8d43 38385->38385 38386 9cd8d1d 38386->38385 38390 9cd77cf VirtualAllocEx 38386->38390 38391 9cd7808 VirtualAllocEx 38386->38391 38392 9cd7810 VirtualAllocEx 38386->38392 38387 9cd91e2 38387->38385 38388 9cd78f8 WriteProcessMemory 38387->38388 38389 9cd7900 WriteProcessMemory 38387->38389 38388->38385 38389->38385 38390->38387 38391->38387 38392->38387 38395->38384 38396->38384 38398 9cd8a5e 38397->38398 38400 9cd7598 ResumeThread 38398->38400 38401 9cd7590 ResumeThread 38398->38401 38399 9cd8af6 38399->38342 38399->38399 38400->38399 38401->38399 38403 9cd75d8 ResumeThread 38402->38403 38405 9cd7609 38403->38405 38405->38351 38407 9cd75d8 ResumeThread 38406->38407 38409 9cd7609 38407->38409 38409->38351 38411 9cd77ef 38410->38411 38411->38356 38412 9cd785a VirtualAllocEx 38411->38412 38413 9cd788d 38412->38413 38413->38356 38415 9cd7850 VirtualAllocEx 38414->38415 38417 9cd788d 38415->38417 38417->38356 38419 9cd7850 VirtualAllocEx 38418->38419 38421 9cd788d 38419->38421 38421->38356 38423 9cd7948 WriteProcessMemory 38422->38423 38425 9cd799f 38423->38425 38425->38357 38427 9cd7948 WriteProcessMemory 38426->38427 38429 9cd799f 38427->38429 38429->38357 38431 9cd76bd Wow64SetThreadContext 38430->38431 38433 9cd7705 38431->38433 38433->38372 38435 9cd76bd Wow64SetThreadContext 38434->38435 38437 9cd7705 38435->38437 38437->38372 38439 9cd7a6b ReadProcessMemory 38438->38439 38441 9cd7aaf 38439->38441 38441->38386 38443 9cd7a6b ReadProcessMemory 38442->38443 38445 9cd7aaf 38443->38445 38445->38386
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c05a4abdf2488f0c827f526ef840da1beb9258f279f1852b2bafb1767d93d0e
                                                                  • Instruction ID: fc783129086e50a9592baa06e2d921c9de902e0278778d88d55538f5a53f153d
                                                                  • Opcode Fuzzy Hash: 2c05a4abdf2488f0c827f526ef840da1beb9258f279f1852b2bafb1767d93d0e
                                                                  • Instruction Fuzzy Hash: 1E912870E012098BDB04DFE9D4546AEBFB2BF88350F15D469E814A7355EF34A982CF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 197bdfb07863006413d30ef9270562c2a829c59e8834defbae4521de64ad80bc
                                                                  • Instruction ID: 5a3566a742ef430665384a75d498f7d3f1db1a284cc1415529a41db52ccc7a74
                                                                  • Opcode Fuzzy Hash: 197bdfb07863006413d30ef9270562c2a829c59e8834defbae4521de64ad80bc
                                                                  • Instruction Fuzzy Hash: 88A11671E002198BEB14DFA9C8447ADBFB2BF89340F11D4A9E518B7244EB706A86CF51
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dbe8b66ddb96ca09cdf924faf2b6e7d62e063b91007da657d34ee9805891b2c6
                                                                  • Instruction ID: e08c5efb24e8f4956746d5c681cfcd4bf12febacc1b95f5ea26d5449abe9c13e
                                                                  • Opcode Fuzzy Hash: dbe8b66ddb96ca09cdf924faf2b6e7d62e063b91007da657d34ee9805891b2c6
                                                                  • Instruction Fuzzy Hash: 72814971E002198BDB14DFA9D8407AEBFB2BFC9340F11D4A9E518B7254EF706A868F51
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62728d02ace8b693f5535efe66a3dec8a6e1a4ab8c45e9ca912ed0528c2074e2
                                                                  • Instruction ID: aed344c7aba6d0c4eb3cbcabd8ed30779b817a4abb89adbec0bb524d947bbd3c
                                                                  • Opcode Fuzzy Hash: 62728d02ace8b693f5535efe66a3dec8a6e1a4ab8c45e9ca912ed0528c2074e2
                                                                  • Instruction Fuzzy Hash: 32711671E012098BDB04DFE9D4447AEBFF2BF88350F15D46AE814AB355EF34A9828B51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 551 1547540-15475cf GetCurrentProcess 555 15475d1-15475d7 551->555 556 15475d8-154760c GetCurrentThread 551->556 555->556 557 1547615-1547649 GetCurrentProcess 556->557 558 154760e-1547614 556->558 559 1547652-154766d call 154770f 557->559 560 154764b-1547651 557->560 558->557 564 1547673-15476a2 GetCurrentThreadId 559->564 560->559 565 15476a4-15476aa 564->565 566 15476ab-154770d 564->566 565->566
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 015475BE
                                                                  • GetCurrentThread.KERNEL32 ref: 015475FB
                                                                  • GetCurrentProcess.KERNEL32 ref: 01547638
                                                                  • GetCurrentThreadId.KERNEL32 ref: 01547691
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2150677810.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1540000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: fa1fd3d360596db7f5239405b9f5992121ce1e05a8682dc918604936ff9f52b2
                                                                  • Instruction ID: 4d6ff5f1e77491a55155f047d5c909f2303c248ee549c8046127566acf790c47
                                                                  • Opcode Fuzzy Hash: fa1fd3d360596db7f5239405b9f5992121ce1e05a8682dc918604936ff9f52b2
                                                                  • Instruction Fuzzy Hash: E95125B0D002498FDB18DFAAD548B9EBBF1BB48318F20C559D019AB360D774A988CF65

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 528 154753c-15475cf GetCurrentProcess 532 15475d1-15475d7 528->532 533 15475d8-154760c GetCurrentThread 528->533 532->533 534 1547615-1547649 GetCurrentProcess 533->534 535 154760e-1547614 533->535 536 1547652-154766d call 154770f 534->536 537 154764b-1547651 534->537 535->534 541 1547673-15476a2 GetCurrentThreadId 536->541 537->536 542 15476a4-15476aa 541->542 543 15476ab-154770d 541->543 542->543
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 015475BE
                                                                  • GetCurrentThread.KERNEL32 ref: 015475FB
                                                                  • GetCurrentProcess.KERNEL32 ref: 01547638
                                                                  • GetCurrentThreadId.KERNEL32 ref: 01547691
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2150677810.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1540000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 09bcc20742ce78301041fe29734687a643fde1c8a94f3fb8dfdbbea5bb21e2e4
                                                                  • Instruction ID: 39fe807c2bb6975d6dcb589dfd7b6759f37211c837d0d18d16961a1d82490cea
                                                                  • Opcode Fuzzy Hash: 09bcc20742ce78301041fe29734687a643fde1c8a94f3fb8dfdbbea5bb21e2e4
                                                                  • Instruction Fuzzy Hash: 6B5126B0D002498FDB18DFAAD548BDEBBF1BB48318F20C559D019AB360D734A988CF65

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 619 4f45940-4f45964 620 4f45966 619->620 621 4f4596d-4f45971 619->621 620->621 622 4f45994-4f459a8 620->622 623 4f459d6-4f45a36 620->623 624 4f45973-4f4597e 620->624 625 4f459aa-4f459b4 620->625 621->623 621->624 630 4f4598d-4f45991 622->630 631 4f45980-4f45983 624->631 632 4f459bd-4f459d4 624->632 627 4f459bb 625->627 627->630 635 4f4598b 631->635 632->635 635->630
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq$d8cq
                                                                  • API String ID: 0-70480990
                                                                  • Opcode ID: 54e57bbc5d5aea0b06a38adcd865e71e0cfab9c51258febe5848a13d715ee72a
                                                                  • Instruction ID: 9449df4fba9acb75970f8de45f4f02f037568bf81504eb0e0388bd8d24e95638
                                                                  • Opcode Fuzzy Hash: 54e57bbc5d5aea0b06a38adcd865e71e0cfab9c51258febe5848a13d715ee72a
                                                                  • Instruction Fuzzy Hash: 6021C1307542047FE7186A395C95B7E2E9BEBC5760F288429F60A9F2C0DE74AC028355

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 818 9cd7c14-9cd7cad 820 9cd7caf-9cd7cb9 818->820 821 9cd7ce6-9cd7d06 818->821 820->821 822 9cd7cbb-9cd7cbd 820->822 826 9cd7d3f-9cd7d6e 821->826 827 9cd7d08-9cd7d12 821->827 824 9cd7cbf-9cd7cc9 822->824 825 9cd7ce0-9cd7ce3 822->825 828 9cd7ccd-9cd7cdc 824->828 829 9cd7ccb 824->829 825->821 837 9cd7da7-9cd7e61 CreateProcessA 826->837 838 9cd7d70-9cd7d7a 826->838 827->826 830 9cd7d14-9cd7d16 827->830 828->828 831 9cd7cde 828->831 829->828 832 9cd7d39-9cd7d3c 830->832 833 9cd7d18-9cd7d22 830->833 831->825 832->826 835 9cd7d24 833->835 836 9cd7d26-9cd7d35 833->836 835->836 836->836 839 9cd7d37 836->839 849 9cd7e6a-9cd7ef0 837->849 850 9cd7e63-9cd7e69 837->850 838->837 840 9cd7d7c-9cd7d7e 838->840 839->832 842 9cd7da1-9cd7da4 840->842 843 9cd7d80-9cd7d8a 840->843 842->837 844 9cd7d8c 843->844 845 9cd7d8e-9cd7d9d 843->845 844->845 845->845 846 9cd7d9f 845->846 846->842 860 9cd7f00-9cd7f04 849->860 861 9cd7ef2-9cd7ef6 849->861 850->849 862 9cd7f14-9cd7f18 860->862 863 9cd7f06-9cd7f0a 860->863 861->860 864 9cd7ef8 861->864 866 9cd7f28-9cd7f2c 862->866 867 9cd7f1a-9cd7f1e 862->867 863->862 865 9cd7f0c 863->865 864->860 865->862 869 9cd7f3e-9cd7f45 866->869 870 9cd7f2e-9cd7f34 866->870 867->866 868 9cd7f20 867->868 868->866 871 9cd7f5c 869->871 872 9cd7f47-9cd7f56 869->872 870->869 873 9cd7f5d 871->873 872->871 873->873
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09CD7E4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: 4490f2bf759aa08f7280693fe789466cdb24d232ccb7e3f1b8e22ca850d6de57
                                                                  • Instruction ID: 6dd46490ab71f13bfa8d9da4a7a4c6f4c31180f25ef08bdbd83fb2833292b19b
                                                                  • Opcode Fuzzy Hash: 4490f2bf759aa08f7280693fe789466cdb24d232ccb7e3f1b8e22ca850d6de57
                                                                  • Instruction Fuzzy Hash: 80915FB1D01219CFEB20CF68D8417EEBBB2FF44314F1485A9E918A7254DB749A85CF91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 875 9cd7c18-9cd7cad 877 9cd7caf-9cd7cb9 875->877 878 9cd7ce6-9cd7d06 875->878 877->878 879 9cd7cbb-9cd7cbd 877->879 883 9cd7d3f-9cd7d6e 878->883 884 9cd7d08-9cd7d12 878->884 881 9cd7cbf-9cd7cc9 879->881 882 9cd7ce0-9cd7ce3 879->882 885 9cd7ccd-9cd7cdc 881->885 886 9cd7ccb 881->886 882->878 894 9cd7da7-9cd7e61 CreateProcessA 883->894 895 9cd7d70-9cd7d7a 883->895 884->883 887 9cd7d14-9cd7d16 884->887 885->885 888 9cd7cde 885->888 886->885 889 9cd7d39-9cd7d3c 887->889 890 9cd7d18-9cd7d22 887->890 888->882 889->883 892 9cd7d24 890->892 893 9cd7d26-9cd7d35 890->893 892->893 893->893 896 9cd7d37 893->896 906 9cd7e6a-9cd7ef0 894->906 907 9cd7e63-9cd7e69 894->907 895->894 897 9cd7d7c-9cd7d7e 895->897 896->889 899 9cd7da1-9cd7da4 897->899 900 9cd7d80-9cd7d8a 897->900 899->894 901 9cd7d8c 900->901 902 9cd7d8e-9cd7d9d 900->902 901->902 902->902 903 9cd7d9f 902->903 903->899 917 9cd7f00-9cd7f04 906->917 918 9cd7ef2-9cd7ef6 906->918 907->906 919 9cd7f14-9cd7f18 917->919 920 9cd7f06-9cd7f0a 917->920 918->917 921 9cd7ef8 918->921 923 9cd7f28-9cd7f2c 919->923 924 9cd7f1a-9cd7f1e 919->924 920->919 922 9cd7f0c 920->922 921->917 922->919 926 9cd7f3e-9cd7f45 923->926 927 9cd7f2e-9cd7f34 923->927 924->923 925 9cd7f20 924->925 925->923 928 9cd7f5c 926->928 929 9cd7f47-9cd7f56 926->929 927->926 930 9cd7f5d 928->930 929->928 930->930
                                                                  APIs
                                                                  • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 09CD7E4E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateProcess
                                                                  • String ID:
                                                                  • API String ID: 963392458-0
                                                                  • Opcode ID: cd8346767c98e66abd84d05f31ba9994efc61ef8f3edc41c06b768456236a78d
                                                                  • Instruction ID: d8a575431b9be22565338443da2db452ef83d59ca4c710aaf77b83a6efb71d5f
                                                                  • Opcode Fuzzy Hash: cd8346767c98e66abd84d05f31ba9994efc61ef8f3edc41c06b768456236a78d
                                                                  • Instruction Fuzzy Hash: 6C915EB1D01219CFEB20CF68D8417EEBBB2BF48314F1485A9E908A7244DB749A85CF91
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0154FBE2
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2150677810.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1540000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 1e44c07241f72e87f2564227e9167c2722fd8850979381946e007a44f4bc9a8e
                                                                  • Instruction ID: cb398570e0b736ae20e61d6e6dd4df828eba62c30291454f4964266edd49e0fa
                                                                  • Opcode Fuzzy Hash: 1e44c07241f72e87f2564227e9167c2722fd8850979381946e007a44f4bc9a8e
                                                                  • Instruction Fuzzy Hash: 0F41B0B1D103499FDB14CF99C984ADEBFB5FF48314F24862AE818AB210D7759845CF91
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09CD7990
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: 74c15cc3b4882d0ad14dc8d3162b9099619d40ed747b1d5d5c874f6054e93309
                                                                  • Instruction ID: ed3917edc9a6dff09036b3376d24751706a64b96a834ca07956f8e596fa86790
                                                                  • Opcode Fuzzy Hash: 74c15cc3b4882d0ad14dc8d3162b9099619d40ed747b1d5d5c874f6054e93309
                                                                  • Instruction Fuzzy Hash: 652146B2D012199FDB10DFA9C881BDEBBF1FF48310F108429E958A7250D7799945CBA4
                                                                  APIs
                                                                  • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 09CD7990
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessWrite
                                                                  • String ID:
                                                                  • API String ID: 3559483778-0
                                                                  • Opcode ID: d95cfdb626aa5daa1d828b6ecba7676b84b9c967495fe6fb4ac6f5ad1e52ce3f
                                                                  • Instruction ID: 8eb11c415a6f220ebf138d6a809ee15ad209b53c2ad58e7065b2b0aa561d4b06
                                                                  • Opcode Fuzzy Hash: d95cfdb626aa5daa1d828b6ecba7676b84b9c967495fe6fb4ac6f5ad1e52ce3f
                                                                  • Instruction Fuzzy Hash: 592136B2D003599FDB10DFA9C885BDEBBF5FF48310F10842AE958A7250C7789944CBA4
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09CD76F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: b28b8457f42bb976ea32ff03fbec6c3e5b78e772a47d488a02f5c0dc8651a7bf
                                                                  • Instruction ID: 0602860e126c0e154e10c1121fed6ea9a3ea3c81864e21cc438d43d6d0febe62
                                                                  • Opcode Fuzzy Hash: b28b8457f42bb976ea32ff03fbec6c3e5b78e772a47d488a02f5c0dc8651a7bf
                                                                  • Instruction Fuzzy Hash: A42138B1D002098FDB10DFAAC4857EEBBF4EF88324F10C42AD559A7240D7789A46CFA5
                                                                  APIs
                                                                  • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 09CD76F6
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ContextThreadWow64
                                                                  • String ID:
                                                                  • API String ID: 983334009-0
                                                                  • Opcode ID: c663a717953c5b73f708c5bfe7b0972426dc0ee7a1042de76812d293e2a69f6d
                                                                  • Instruction ID: ebbce3605d028bc8fe8f81fb6f96532fa465fa3df635177acd7e2b5bf7546934
                                                                  • Opcode Fuzzy Hash: c663a717953c5b73f708c5bfe7b0972426dc0ee7a1042de76812d293e2a69f6d
                                                                  • Instruction Fuzzy Hash: 0D2118B1D002098FDB10DFAAC4857EEBBF4EF48324F14842AD559A7241D7789945CFA5
                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09CD7AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: edab4f2fa7480c1ec670b7781d11a155921bdd149599c37344653076084b531b
                                                                  • Instruction ID: d8d2f9d0550d6f470c16ef0a1ffe8560b67b332fe9d07f33a59a2a04aec6ede1
                                                                  • Opcode Fuzzy Hash: edab4f2fa7480c1ec670b7781d11a155921bdd149599c37344653076084b531b
                                                                  • Instruction Fuzzy Hash: 7C2139B1C003599FDB10DFAAC880AEEFBF5FF48310F108429E558A7250C7749944CBA4
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0154780F
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2150677810.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1540000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: 69563cc9b9ca6de7e8e5ae16b186ac9f1da0530ded0e5dc789d81ca91d8e07a1
                                                                  • Instruction ID: fede5adc9c60ac9212c38edd0b2693394f6dca76b4ac078845375ee870a66269
                                                                  • Opcode Fuzzy Hash: 69563cc9b9ca6de7e8e5ae16b186ac9f1da0530ded0e5dc789d81ca91d8e07a1
                                                                  • Instruction Fuzzy Hash: 0921C2B5D002589FDB10CFAAD984ADEBFF8FB48324F14841AE958A7350D374A944CFA5
                                                                  APIs
                                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 09CD7AA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MemoryProcessRead
                                                                  • String ID:
                                                                  • API String ID: 1726664587-0
                                                                  • Opcode ID: 6f7dbb17f0d46f70e7ca4ab51bddab9f4439c539f0947ff0148f98470d93a90e
                                                                  • Instruction ID: 39b2ac5161ba6f6d7558e3a2370b41e59a5788e4dbae5b470e6c8852404d271d
                                                                  • Opcode Fuzzy Hash: 6f7dbb17f0d46f70e7ca4ab51bddab9f4439c539f0947ff0148f98470d93a90e
                                                                  • Instruction Fuzzy Hash: B72114B1D003498FDB10CFA9D9807EEFBF1BF48324F10842AE958A7250C7789951DBA4
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09CD787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: ccbf49d2e83a9a41f9db1aac8d8acc4ab1d6a14fedcc4951b07138729c01fe79
                                                                  • Instruction ID: 6f6217efe7109c42af960afb3aec37f6818303788fdc6b71b971138726412a4c
                                                                  • Opcode Fuzzy Hash: ccbf49d2e83a9a41f9db1aac8d8acc4ab1d6a14fedcc4951b07138729c01fe79
                                                                  • Instruction Fuzzy Hash: 7E1123B29002499FCB10DFAAD844ADEBBF5EF88324F208429E559A7250C775A944CFA4
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09CD787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: db50fc583cb95b87b74140de15947ee37e51f914225794bfebe9a50f4573b097
                                                                  • Instruction ID: b32add95e1878f0efc57c38dc705ba7b8364cf488a1f256de8a72c1851c2bc3d
                                                                  • Opcode Fuzzy Hash: db50fc583cb95b87b74140de15947ee37e51f914225794bfebe9a50f4573b097
                                                                  • Instruction Fuzzy Hash: 611137B5900349CFCB14CFA9D9407DEBBF1AF48324F14842AD959A7260C7759950CF94
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: b98e4b5b6f0e9aefbb213f13983714779a0f70235e72dbe3803cc98ddec7215d
                                                                  • Instruction ID: 812bca8de863e1698ab3796e585094062bcd1760368460cb43577b07d591208b
                                                                  • Opcode Fuzzy Hash: b98e4b5b6f0e9aefbb213f13983714779a0f70235e72dbe3803cc98ddec7215d
                                                                  • Instruction Fuzzy Hash: 4E1136B1D002488FDB20DFAAC4457DEFBF4EB88324F20882AD559A7250CB75A944CFA5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 0154D72E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2150677810.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1540000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: ef25999c35b9061c07360ff2f8b4c21f0bc022a5da6dedb2286d1859a1de562b
                                                                  • Instruction ID: 0de2e387095ea0791d3c2c2d6dbf96702eed4c7fe3c76fba482916fa019827e5
                                                                  • Opcode Fuzzy Hash: ef25999c35b9061c07360ff2f8b4c21f0bc022a5da6dedb2286d1859a1de562b
                                                                  • Instruction Fuzzy Hash: 0011E0B5D002498FDB10CF9AC444BDEFBF5AB88328F10852AD959B7210C375A545CFA5
                                                                  APIs
                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 09CD787E
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 473aaf49bbfc1bd62e0875225a772b4d76d30da33504814cb05ef59a7e802d72
                                                                  • Instruction ID: 45caf9338683aa60780a05dd28b3202953d208a837240645b0a3d78459f300d3
                                                                  • Opcode Fuzzy Hash: 473aaf49bbfc1bd62e0875225a772b4d76d30da33504814cb05ef59a7e802d72
                                                                  • Instruction Fuzzy Hash: E411E9B68043499FCB15CFA8E8047DFFFF2AF81318F14885AE658A7160C7398655CB92
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 80d40de51b4678d57b167cb6c69dd92200f516df9af60dab657da53a6b8169fd
                                                                  • Instruction ID: de08662d2125bbc1975526aed2a5602a41e49796bd248da44e3185df40c02e43
                                                                  • Opcode Fuzzy Hash: 80d40de51b4678d57b167cb6c69dd92200f516df9af60dab657da53a6b8169fd
                                                                  • Instruction Fuzzy Hash: 6B1136B5D003498FDB14CFA9C5453DEFBF1AF88324F24882AC559A7250CB75A945CF98
                                                                  APIs
                                                                  • PostMessageW.USER32(?,?,?,?), ref: 09CD9765
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 0969d29013e8b9f1ea54c9c7668ae672611ba46ec96f5c61a5fa39c5f20c7cb8
                                                                  • Instruction ID: 883bf3f5dfb12dd1336ec3ac07c95d3bdd03fd343a9c10e1be5ab35f9c31ea1f
                                                                  • Opcode Fuzzy Hash: 0969d29013e8b9f1ea54c9c7668ae672611ba46ec96f5c61a5fa39c5f20c7cb8
                                                                  • Instruction Fuzzy Hash: B611E2B9800349DFDB10DF9AD985BDEFBF8EB48324F10845AE558A7210C375A984CFA5
                                                                  APIs
                                                                  • PostMessageW.USER32(?,?,?,?), ref: 09CD9765
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2195187873.0000000009CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 09CD0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_9cd0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: MessagePost
                                                                  • String ID:
                                                                  • API String ID: 410705778-0
                                                                  • Opcode ID: 80db20c0a6ba3c769cac28647e3cef91525ac3ffc60430f111a4e1cb9b9674bf
                                                                  • Instruction ID: 4f461ab3d079da62062b9c5f6e23dceb8c898e51b8236ce7add193475a7e138c
                                                                  • Opcode Fuzzy Hash: 80db20c0a6ba3c769cac28647e3cef91525ac3ffc60430f111a4e1cb9b9674bf
                                                                  • Instruction Fuzzy Hash: 251115B9800349CFDB10CF99D584BDEBBF4FB48324F10855AD958A7250C375A940CFA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2150677810.0000000001540000.00000040.00000800.00020000.00000000.sdmp, Offset: 01540000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_1540000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b4ea0ce20153c9d21910ad5feb6cc7a237a7467e63351b3e84010772a685db44
                                                                  • Instruction ID: ef04357357709004b4978989d5c4eabc807514d5e4469702e3d20c629153c241
                                                                  • Opcode Fuzzy Hash: b4ea0ce20153c9d21910ad5feb6cc7a237a7467e63351b3e84010772a685db44
                                                                  • Instruction Fuzzy Hash: 98F08972908384CFEB2297ACD51839DBFE0EF89328F28889AC095DB152C3755445CB92
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8bq
                                                                  • API String ID: 0-187764589
                                                                  • Opcode ID: 87cb6f7e87ed6d9a40dc1d123f08e29653011947e157ca159ad195682dc84f22
                                                                  • Instruction ID: 608f02f6dd086436d4836563e1e2efad94c609650315cab9f98134391bf37368
                                                                  • Opcode Fuzzy Hash: 87cb6f7e87ed6d9a40dc1d123f08e29653011947e157ca159ad195682dc84f22
                                                                  • Instruction Fuzzy Hash: 5DB1A074E00218CFDB54DFA9D844AADBBB2FF89300F10846AE509AB355EF346986CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 8bq
                                                                  • API String ID: 0-187764589
                                                                  • Opcode ID: e257d260ae553c03c8865743844252bbf7a6f31a3b1052eee593af9a7753557b
                                                                  • Instruction ID: 2bb0b3bc2dd1cdf136ac21ad6d7b0b4e8e6bf0edc90bb223b7c6c1059fcde1a4
                                                                  • Opcode Fuzzy Hash: e257d260ae553c03c8865743844252bbf7a6f31a3b1052eee593af9a7753557b
                                                                  • Instruction Fuzzy Hash: 4DA1B374E04218CFDB54DFA9D844A9DBFB2FF89300F10846AE509AB355EB34A986CF51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Te^q
                                                                  • API String ID: 0-671973202
                                                                  • Opcode ID: b7e952f75f9b21012af7151a6b116feb4d77f743080e91294d1bb3ecd81c6b7f
                                                                  • Instruction ID: 4c342b6d1c7e56ea4c8a5613c088e62e35868d994b9a86246b3bb495dd168885
                                                                  • Opcode Fuzzy Hash: b7e952f75f9b21012af7151a6b116feb4d77f743080e91294d1bb3ecd81c6b7f
                                                                  • Instruction Fuzzy Hash: B5419E31B102168FCB15DF7988488AEBBF6FFC82247158529E559DB391EF30ED0687A0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Te^q
                                                                  • API String ID: 0-671973202
                                                                  • Opcode ID: 86a5e3e559b5aae6366e32ead00e7e882083342bd074a6a72f2c5d9310784e74
                                                                  • Instruction ID: ff36aca5bc8c3df0c7b27ea360c046833b8bf36a9755926535b6ff248fab757e
                                                                  • Opcode Fuzzy Hash: 86a5e3e559b5aae6366e32ead00e7e882083342bd074a6a72f2c5d9310784e74
                                                                  • Instruction Fuzzy Hash: AF112E71F0020A8FCB54EFB999105EFBAF6ABC8314B50446AC509E7344EF359E06CBA5
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 00bef51090c9522b6f25943f1939dfa5cb8c23d97f57a53c676a50ee8b7b3963
                                                                  • Instruction ID: b81a3a2910c7768ae6d1c530ffee381c9ef5e6573206dfc05244a4d3005e8297
                                                                  • Opcode Fuzzy Hash: 00bef51090c9522b6f25943f1939dfa5cb8c23d97f57a53c676a50ee8b7b3963
                                                                  • Instruction Fuzzy Hash: 79612A35A00619DFDB14DFA9C558A9DBBF1FF88314F218159E909AB360DB70ED85CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0e0a12b5729ea21e28a525c317cf6c337d62868d4efa7b585c88ec103d01a803
                                                                  • Instruction ID: 1be556429fac4d706b4e7516f44e7bf87c238721867be3b7953b03486a53a9e6
                                                                  • Opcode Fuzzy Hash: 0e0a12b5729ea21e28a525c317cf6c337d62868d4efa7b585c88ec103d01a803
                                                                  • Instruction Fuzzy Hash: 1E612935A007199FDB14DFA9C998A9DBBF2FF88314F118159E409AB364DB70ED85CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f5f3ac060cbb000e8bb68e4bdc58120764f112bb2b484e251637dd5f6d8c2a05
                                                                  • Instruction ID: e5c7c72d00d2789e546defffae361e5c8da764162b8a2fa1b55e7d7e6b2979a8
                                                                  • Opcode Fuzzy Hash: f5f3ac060cbb000e8bb68e4bdc58120764f112bb2b484e251637dd5f6d8c2a05
                                                                  • Instruction Fuzzy Hash: 6871C878902218CFD750EF69E998A49BFB2FB49311F0091A9F409DB365EB34AD85CF11
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e04b680ec8bc0f463a36e21650ab2fc12e4091027e7d7b1b632017aba4a62a8e
                                                                  • Instruction ID: 9503855afa4544c03521acfbfbe8b07c2e4f03b4ea43429036600baf064849aa
                                                                  • Opcode Fuzzy Hash: e04b680ec8bc0f463a36e21650ab2fc12e4091027e7d7b1b632017aba4a62a8e
                                                                  • Instruction Fuzzy Hash: C8710974D41219CFDB50DFA8E948A9DBBB2FF88301F108169E50AAB355DB386D85CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2148982414.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_124d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6e296d06a4833993b05b129938107205f18087b81e536db0ced6b5ef51f55855
                                                                  • Instruction ID: 6a75268807d6184fceb8ab91e2ebbffdc670e978840a6459d76dc0b358560efc
                                                                  • Opcode Fuzzy Hash: 6e296d06a4833993b05b129938107205f18087b81e536db0ced6b5ef51f55855
                                                                  • Instruction Fuzzy Hash: F2212571510208DFDB09DF98D9C0B67BF65FBA4324F20C569EA090B256C376E456CAB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2149086388.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_125d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c577b9a9fd90d6d3c3199a8d391d8d2ce61f932ccb3b98a945dc1b1c1df52730
                                                                  • Instruction ID: 4ea98efebf56826115d04568d59b6d5258d22cea70832a7517318eedacf58984
                                                                  • Opcode Fuzzy Hash: c577b9a9fd90d6d3c3199a8d391d8d2ce61f932ccb3b98a945dc1b1c1df52730
                                                                  • Instruction Fuzzy Hash: B9213471514208EFDB41DF98C9C0B26BBA5FB84324F20C66DED098B257C376D846CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2149086388.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_125d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a91c7cc28511680063751f0f6c207ae6e52534a81925dfc59c76696b876efaba
                                                                  • Instruction ID: b19b12d9ab0989d6be67036f02f1cbc906a246f81b5d0416aa32da94d0db8090
                                                                  • Opcode Fuzzy Hash: a91c7cc28511680063751f0f6c207ae6e52534a81925dfc59c76696b876efaba
                                                                  • Instruction Fuzzy Hash: 43214270214208DFCB51DF68D9C0B26BFA1EB84314F20C56DDD0A4B256C37AD407CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3e0a1c166b15faa83099969e03b5a147b7a2396b79b7ffd382c2fb49c90e8379
                                                                  • Instruction ID: 8e626497582b2f20728dafdf1bcc6f6f53bc4de7955b668b889fa9afa4595778
                                                                  • Opcode Fuzzy Hash: 3e0a1c166b15faa83099969e03b5a147b7a2396b79b7ffd382c2fb49c90e8379
                                                                  • Instruction Fuzzy Hash: D7214A74E05249DFCB14DFA9D0446AEFFB5BB88300F11D569D414A7340DB35AA82CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d3caa2fa66d594386d38fa422ac69b52de6eab692fb1eca8d461760fffeba180
                                                                  • Instruction ID: 3efd0e83f2a6370e24d766b10574d7581cdc29053c087e3ac3e10e48fb16160c
                                                                  • Opcode Fuzzy Hash: d3caa2fa66d594386d38fa422ac69b52de6eab692fb1eca8d461760fffeba180
                                                                  • Instruction Fuzzy Hash: 2D31D4B0D01219DFDB20DF99CA89BCEBFF5AB88314F14815AE404BB251C7B56986CF91
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 521ea83179c209774555affad10aa4452bcd10884836f474bc963e04f919ecb7
                                                                  • Instruction ID: c4e9245a520c4947a8e2dc0b4f2df13f2b6f5ee52dfe0775e007a8d078a72648
                                                                  • Opcode Fuzzy Hash: 521ea83179c209774555affad10aa4452bcd10884836f474bc963e04f919ecb7
                                                                  • Instruction Fuzzy Hash: A031D5B0D01218DFDB20DF99C688B8EBFF4AB88314F14805AE404BB251D7B56886CF95
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3b70a5f893dbb79c4240172e087f7e757f69831bdcb049dc4ceff174f546ad28
                                                                  • Instruction ID: f8d577fce1c2382d913337809aec0db2484759e6506d81c910fe5c65e9ba6c34
                                                                  • Opcode Fuzzy Hash: 3b70a5f893dbb79c4240172e087f7e757f69831bdcb049dc4ceff174f546ad28
                                                                  • Instruction Fuzzy Hash: 2731B73494025ACFDB64DFA4E844BADBB71FB84300F0085BAD50AA7754DB786E85CF61
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b1969117b4fb22c29dda184a0f2a666ea4ff9a6040549cd814f94af6b2f34dd9
                                                                  • Instruction ID: 6e8f6af439375da824aa14036f9bd5d269beead1880618554f6f6b813db02f1f
                                                                  • Opcode Fuzzy Hash: b1969117b4fb22c29dda184a0f2a666ea4ff9a6040549cd814f94af6b2f34dd9
                                                                  • Instruction Fuzzy Hash: B911C276B002165F9B15DF798C40ABFBAFBEBC8260B148528E514D7380EF30E90687A0
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2149086388.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_125d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e563794630f549067dcb6a8c441a60529d20a9fd6f4cf1a62ac90ef3231477e2
                                                                  • Instruction ID: d72c03bd0912ecfb5b9a86a252578b4bd197306b213ac2107cc62bb2812eb1d6
                                                                  • Opcode Fuzzy Hash: e563794630f549067dcb6a8c441a60529d20a9fd6f4cf1a62ac90ef3231477e2
                                                                  • Instruction Fuzzy Hash: 52219A755093848FDB03CF24D9D4B15BF71EB46314F28C5EAD9498B2A7C33A980ACB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2148982414.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_124d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction ID: e6123bea7a4cbcb97f5d4e6e87e4e37037ce25da891e2acc2abe2653d8e4a9b9
                                                                  • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                  • Instruction Fuzzy Hash: F4110376404244CFCB06CF54D5C4B56BF72FB94324F24C5A9D9090B657C33AE45ACBA1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2149086388.000000000125D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0125D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_125d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: e75c23c6e109590de3d3b1976566f37a838087c79484b64806e9adb727d4e433
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 4C11BB75504284DFDB02CF54C5C4B15BFA1FB84224F24C6AEDD498B297C33AD44ACB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9d89b28092c3b1c5e3ec61203c6e757caf87b91cb61408670dc4cd03f77be185
                                                                  • Instruction ID: 32d9c369332fefe490e9d0f187433376fc42d1ef131bd69f34a829a7c6bc8695
                                                                  • Opcode Fuzzy Hash: 9d89b28092c3b1c5e3ec61203c6e757caf87b91cb61408670dc4cd03f77be185
                                                                  • Instruction Fuzzy Hash: D101263178E109DFC305DBA8D8167EE7F76DB86314F044198E948872D2EF31AA42D780
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a209897643c0d991ad560676b88765c3b46137b12d8b3398878aac61f19c712e
                                                                  • Instruction ID: e716b2a4c5e94e76a7aeb4e93fee899d9227d72a2f8300e79486478f70070c4f
                                                                  • Opcode Fuzzy Hash: a209897643c0d991ad560676b88765c3b46137b12d8b3398878aac61f19c712e
                                                                  • Instruction Fuzzy Hash: 3DF02B3179E105DFC306DF74D5057ED7F22AB8A311F109158E859872D2DF319A07E680
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4eb319b9fff6b939673cd0d56dd5df648c620dbd9fd13e1ec464f2eb4ff5a631
                                                                  • Instruction ID: f7eabc462e99ecc82f2e02a51e51fc4286e5fe8180d08479b99ca8e8c52cd54f
                                                                  • Opcode Fuzzy Hash: 4eb319b9fff6b939673cd0d56dd5df648c620dbd9fd13e1ec464f2eb4ff5a631
                                                                  • Instruction Fuzzy Hash: 22F0E931A08289EFDB21DFA4E400698BFF0AF16324F0492D9E894522A2D7301A46DB00
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ad50026127a7ecda1ff7d05689782b3cf8d179a45b15ba0642c3866359aa85b5
                                                                  • Instruction ID: a0d238734809a3c9cc07cbe85a1c473e2167ec3ccaae3fcf681a4b9889a219b6
                                                                  • Opcode Fuzzy Hash: ad50026127a7ecda1ff7d05689782b3cf8d179a45b15ba0642c3866359aa85b5
                                                                  • Instruction Fuzzy Hash: 71E04831949208DFC704EF64E4455BDBF75BB8A311F109159F90553350EF306A55EB94
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8b96672b7a360a31a6a8fe0d1291ef2654dcab2eb557aa8a14acfb38db19f29d
                                                                  • Instruction ID: 0e354a52fdc7b0920d5b49faf433acbc126d042dd9011f98fc12b0e5f63e5ae8
                                                                  • Opcode Fuzzy Hash: 8b96672b7a360a31a6a8fe0d1291ef2654dcab2eb557aa8a14acfb38db19f29d
                                                                  • Instruction Fuzzy Hash: 2DE0C275E0520CEFCF54EFA8E80469CBFF5EB48310F0091A9E80892310EB355A55EF80
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bea83074f5934d5d4367ecdd3fc5d0cc8dd84ee192e2ff02801ca12f9ec6f04f
                                                                  • Instruction ID: fe3f56b0a9866fa26ff45a8dca061bd63578c9c75fad20ab83a9f7e2e886568d
                                                                  • Opcode Fuzzy Hash: bea83074f5934d5d4367ecdd3fc5d0cc8dd84ee192e2ff02801ca12f9ec6f04f
                                                                  • Instruction Fuzzy Hash: C0E0923150829ADFEB028F54D890AA97FB1FF97300F000696D199C7651DB382E49CF01
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 879a77d3da0b7cfc87563cba1161ed2e7b810d96e811a4fdf29cd8373ffcae5a
                                                                  • Instruction ID: 00306e644ff3143cad67481d49dc54919749e42c0eacd36268862148b611d82d
                                                                  • Opcode Fuzzy Hash: 879a77d3da0b7cfc87563cba1161ed2e7b810d96e811a4fdf29cd8373ffcae5a
                                                                  • Instruction Fuzzy Hash: 69D02B3298B009CAC3408EE0D6017A87B69ABC1208F04019D890A23190EF345E01D200
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 63891737b890ccb1ff1af861fe32d313d7ffa27c43c6db72b81188b9fb377bae
                                                                  • Instruction ID: 575893ed573f8e2f6ef11f7af3a021de833a0bbd49939b737fa31c965314ce17
                                                                  • Opcode Fuzzy Hash: 63891737b890ccb1ff1af861fe32d313d7ffa27c43c6db72b81188b9fb377bae
                                                                  • Instruction Fuzzy Hash: 05D0223298F10CEFC780DAE4D401AA97BEDD7C2208F0010ACEA0E23220EF712E01D685
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.2174280462.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_4f40000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d451aa70dd38680d520b26ad54edb0d7826219d3db2d454e7e524b603f9adb9d
                                                                  • Instruction ID: 019a08c450f03bc3cf0df106a89246caf01c824f5cfc45c313c91e5c1a3a3b87
                                                                  • Opcode Fuzzy Hash: d451aa70dd38680d520b26ad54edb0d7826219d3db2d454e7e524b603f9adb9d
                                                                  • Instruction Fuzzy Hash: 16C08C362152016EC302E658CD20B8C7BF6FF90344F4E80A0A080CB2B1C322C81AE791

                                                                  Execution Graph

                                                                  Execution Coverage:10%
                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:128
                                                                  Total number of Limit Nodes:12
                                                                  execution_graph 38073 15b7678 38074 15b7689 38073->38074 38076 15b76ac 38073->38076 38075 15b76d9 38076->38075 38077 15b78a3 LdrInitializeThunk 38076->38077 38078 15b78c0 38077->38078 38079 138d01c 38080 138d034 38079->38080 38081 138d08e 38080->38081 38088 146b1e0 38080->38088 38096 146477c 38080->38096 38100 146478c 38080->38100 38108 14668b0 38080->38108 38114 14668a0 38080->38114 38120 14669d0 38080->38120 38091 146b235 38088->38091 38089 146b269 38133 146a164 38089->38133 38091->38089 38092 146b259 38091->38092 38125 146b380 38092->38125 38129 146b390 38092->38129 38093 146b267 38097 1464787 38096->38097 38137 14647b4 38097->38137 38099 14669e7 38099->38081 38103 1464797 38100->38103 38101 146b269 38102 146a164 CallWindowProcW 38101->38102 38105 146b267 38102->38105 38103->38101 38104 146b259 38103->38104 38106 146b380 CallWindowProcW 38104->38106 38107 146b390 CallWindowProcW 38104->38107 38105->38105 38106->38105 38107->38105 38109 14668d6 38108->38109 38110 146477c GetModuleHandleW 38109->38110 38111 14668e2 38110->38111 38112 146478c CallWindowProcW 38111->38112 38113 14668f7 38112->38113 38113->38081 38115 14668d6 38114->38115 38116 146477c GetModuleHandleW 38115->38116 38117 14668e2 38116->38117 38118 146478c CallWindowProcW 38117->38118 38119 14668f7 38118->38119 38119->38081 38121 14669de 38120->38121 38124 1466992 38120->38124 38122 14647b4 GetModuleHandleW 38121->38122 38123 14669e7 38122->38123 38123->38081 38124->38081 38127 146b39e 38125->38127 38126 146a164 CallWindowProcW 38126->38127 38127->38126 38128 146b487 38127->38128 38128->38093 38131 146b39e 38129->38131 38130 146a164 CallWindowProcW 38130->38131 38131->38130 38132 146b487 38131->38132 38132->38093 38134 146a16f 38133->38134 38135 146b552 CallWindowProcW 38134->38135 38136 146b501 38134->38136 38135->38136 38136->38093 38138 14647bf 38137->38138 38143 14636ac 38138->38143 38140 1466a49 38142 1466ab7 38140->38142 38147 14636bc 38140->38147 38144 14636b7 38143->38144 38145 14650eb 38144->38145 38151 14652e0 38144->38151 38145->38140 38148 1465650 GetModuleHandleW 38147->38148 38150 14656c5 38148->38150 38150->38142 38152 1465305 38151->38152 38153 14636bc GetModuleHandleW 38152->38153 38154 146534a 38152->38154 38153->38154 38155 14636bc GetModuleHandleW 38154->38155 38160 1465516 38154->38160 38156 146549b 38155->38156 38157 14636bc GetModuleHandleW 38156->38157 38156->38160 38158 14654e9 38157->38158 38159 14636bc GetModuleHandleW 38158->38159 38158->38160 38159->38160 38160->38145 38203 146a3b0 38204 146a3f6 GetCurrentProcess 38203->38204 38206 146a441 38204->38206 38207 146a448 GetCurrentThread 38204->38207 38206->38207 38208 146a485 GetCurrentProcess 38207->38208 38209 146a47e 38207->38209 38210 146a4bb 38208->38210 38209->38208 38211 146a4e3 GetCurrentThreadId 38210->38211 38212 146a514 38211->38212 38213 146feb0 38214 146feea 38213->38214 38215 146ff14 RtlEncodePointer 38214->38215 38216 146ff3d 38214->38216 38215->38216 38161 15b4230 38162 15b424f LdrInitializeThunk 38161->38162 38164 15b4283 38162->38164 38165 14619a8 38166 14619d7 38165->38166 38169 1461730 38166->38169 38168 1461afc 38170 146173b 38169->38170 38171 146201a 38170->38171 38174 1464b83 38170->38174 38184 1464b98 38170->38184 38171->38168 38175 1464bc3 38174->38175 38176 14636ac GetModuleHandleW 38175->38176 38177 1464c2a 38176->38177 38183 14636ac GetModuleHandleW 38177->38183 38194 14650d0 38177->38194 38199 1465150 38177->38199 38178 1464c46 38179 1464c72 38178->38179 38180 14636bc GetModuleHandleW 38178->38180 38179->38179 38180->38179 38183->38178 38185 1464bc3 38184->38185 38186 14636ac GetModuleHandleW 38185->38186 38187 1464c2a 38186->38187 38191 1465150 GetModuleHandleW 38187->38191 38192 14650d0 GetModuleHandleW 38187->38192 38193 14636ac GetModuleHandleW 38187->38193 38188 1464c46 38189 14636bc GetModuleHandleW 38188->38189 38190 1464c72 38188->38190 38189->38190 38191->38188 38192->38188 38193->38188 38195 14650eb 38194->38195 38196 14650ef 38194->38196 38195->38178 38197 146522e 38196->38197 38198 14652e0 GetModuleHandleW 38196->38198 38198->38197 38200 14651ad 38199->38200 38201 146522e 38200->38201 38202 14652e0 GetModuleHandleW 38200->38202 38202->38201 38217 146a5f8 DuplicateHandle 38218 146a68e 38217->38218 38219 14666f8 38220 1466760 CreateWindowExW 38219->38220 38222 146681c 38220->38222

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 0 15c9f78-15c9f9f 2 15ca001-15ca009 0->2 3 15c9fa1-15c9fae 0->3 7 15ca00b-15ca01d 2->7 8 15ca063-15ca09f 2->8 3->2 4 15c9fb0-15ca000 3->4 9 15ca01f-15ca022 7->9 19 15ca37b-15ca391 8->19 20 15ca0a5-15ca146 call 15c94e8 call 15c3330 call 15c44f8 8->20 10 15ca029-15ca02b 9->10 11 15ca024 9->11 14 15ca02d 10->14 15 15ca032-15ca035 10->15 11->10 14->15 15->9 17 15ca037-15ca053 15->17 17->8 24 15ca3eb-15ca3ef 19->24 25 15ca393-15ca3cc 19->25 116 15ca14c-15ca1b1 20->116 117 15ca376 20->117 27 15ca3f2-15ca406 24->27 34 15ca3ce-15ca3d5 25->34 35 15ca3e7 25->35 36 15ca41c-15ca424 27->36 37 15ca408-15ca40f 27->37 38 15ca3de-15ca3e5 34->38 39 15ca3d7-15ca3dc 34->39 35->24 43 15ca426-15ca42a 36->43 40 15ca415-15ca41a 37->40 41 15ca411-15ca413 37->41 38->27 39->27 40->43 41->43 45 15ca42c-15ca441 43->45 46 15ca48a-15ca48d 43->46 45->46 56 15ca443-15ca446 45->56 48 15ca48f-15ca4a4 46->48 49 15ca4d5-15ca4db 46->49 48->49 61 15ca4a6-15ca4aa 48->61 50 15cafde 49->50 51 15ca4e1-15ca4e3 49->51 58 15cafe3-15cb5d5 50->58 51->50 54 15ca4e9-15ca4ee 51->54 59 15caf8c-15caf90 54->59 60 15ca4f4 54->60 62 15ca448-15ca44a 56->62 63 15ca465-15ca483 56->63 81 15cb626-15cb63d 58->81 82 15cb5d7-15cb5d9 58->82 65 15caf97-15cafdd 59->65 66 15caf92-15caf95 59->66 60->60 67 15ca4ac-15ca4b0 61->67 68 15ca4b2-15ca4d0 61->68 62->63 69 15ca44c-15ca44f 62->69 63->46 66->58 66->65 67->49 67->68 68->49 69->46 73 15ca451-15ca463 69->73 73->46 73->63 102 15cb63f-15cb64f 81->102 103 15cb677-15cb68c 81->103 85 15cb5db 82->85 86 15cb5e5-15cb5e8 82->86 87 15cb5dd-15cb5e3 85->87 88 15cb5f4-15cb604 85->88 86->88 90 15cb5ea 86->90 87->86 87->88 99 15cb622-15cb625 88->99 94 15cb5ec-15cb5f2 90->94 95 15cb606-15cb612 90->95 94->88 94->95 104 15cb61a-15cb61d 95->104 105 15cb614-15cb616 95->105 109 15cb674 102->109 110 15cb651-15cb65b 102->110 106 15cb68e 103->106 107 15cb705-15cb709 103->107 104->81 114 15cb61f 104->114 105->81 113 15cb618 105->113 106->107 109->103 111 15cb65d-15cb66e 110->111 112 15cb670-15cb673 110->112 111->112 113->114 114->99 116->19 126 15ca1b7-15ca1bf 116->126 117->19 126->19 127 15ca1c5-15ca1e0 126->127 129 15ca21a-15ca223 127->129 130 15ca1e2-15ca1e6 127->130 129->117 132 15ca229-15ca22c 129->132 130->19 131 15ca1ec-15ca217 130->131 131->129 132->19 133 15ca232-15ca28f 132->133 145 15ca2e6 133->145 146 15ca291-15ca2a0 133->146 147 15ca2eb-15ca2ef 145->147 150 15ca2a7-15ca2af 146->150 148 15ca2fa-15ca2fb 147->148 149 15ca2f1 147->149 148->117 149->148 151 15ca2c4-15ca2e4 150->151 152 15ca2b1-15ca2b8 150->152 151->147 152->145 154 15ca2ba-15ca2c2 152->154 154->151
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$Xbq$Xbq$Xbq$Xbq
                                                                  • API String ID: 0-1948246764
                                                                  • Opcode ID: fc8e602c023dec203d5fbc0b80530e476df73eee6d422b2e9131155d027087fa
                                                                  • Instruction ID: 3791e9d86c480888f70f404e500e27185e5625780f4cb9b2d8d80ce21ca6eaa8
                                                                  • Opcode Fuzzy Hash: fc8e602c023dec203d5fbc0b80530e476df73eee6d422b2e9131155d027087fa
                                                                  • Instruction Fuzzy Hash: 53827432A163099FE7A4CE68E4CA2FBB7A1FF45670B04416FD0008AA65F7755C448BDB

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 991 15c6030-15c6053 992 15c6095-15c6097 991->992 993 15c6055-15c605a 991->993 996 15c6099-15c609f 992->996 997 15c60a1-15c60b5 992->997 994 15c627b 993->994 995 15c6060-15c6063 993->995 999 15c6280-15c62f4 994->999 998 15c6069-15c606f 995->998 995->999 1000 15c60d6-15c60d8 996->1000 1011 15c60b7-15c60bb 997->1011 1012 15c60d0 997->1012 998->992 1001 15c6071-15c6090 998->1001 1044 15c62f6-15c62ff 999->1044 1045 15c6300-15c631f 999->1045 1002 15c60da-15c60df 1000->1002 1003 15c60e1-15c60ea 1000->1003 1022 15c61a5-15c61b9 1001->1022 1002->1003 1005 15c6144-15c6147 1002->1005 1014 15c60ec-15c60f5 1003->1014 1015 15c60fa-15c610c 1003->1015 1005->994 1008 15c614d-15c6150 1005->1008 1008->999 1013 15c6156-15c615c 1008->1013 1011->1012 1017 15c60bd-15c60ce 1011->1017 1012->1000 1019 15c617d-15c618e 1013->1019 1020 15c615e-15c617b 1013->1020 1014->1019 1015->994 1025 15c6112-15c6115 1015->1025 1017->1000 1017->1012 1019->1022 1030 15c6190-15c619f 1019->1030 1020->1019 1040 15c61c0-15c6257 1022->1040 1025->999 1029 15c611b-15c6121 1025->1029 1029->1019 1033 15c6123-15c6142 1029->1033 1030->1022 1033->1019 1051 15c625f-15c6265 1040->1051 1052 15c6259-15c625d 1040->1052 1056 15c632b-15c6337 1045->1056 1057 15c6321-15c632a 1045->1057 1055 15c626f-15c6278 1051->1055 1052->1051 1054 15c6267-15c626d 1052->1054 1054->1055 1058 15c633d-15c6346 1056->1058 1059 15c65df-15c65e9 1056->1059 1061 15c634c-15c6385 1058->1061 1062 15c65f8-15c661f 1058->1062 1077 15c6598-15c65bc 1061->1077 1078 15c638b-15c63c3 1061->1078 1065 15c6644-15c670d 1062->1065 1066 15c6621-15c662b 1062->1066 1097 15c670f-15c6718 1065->1097 1098 15c6719-15c6898 1065->1098 1068 15c662d-15c663e 1066->1068 1069 15c6640-15c6643 1066->1069 1068->1069 1084 15c65be 1077->1084 1085 15c65c7 1077->1085 1094 15c63c9-15c63e1 1078->1094 1095 15c646b-15c6483 1078->1095 1084->1085 1085->1059 1104 15c63e7-15c6402 1094->1104 1105 15c6571-15c6582 1094->1105 1106 15c64cf-15c64e7 1095->1106 1107 15c6485-15c649d 1095->1107 1171 15c689e-15c68a0 1098->1171 1172 15c689a 1098->1172 1104->1105 1118 15c6408-15c642e 1104->1118 1129 15c6587-15c6592 1105->1129 1119 15c64e9-15c6501 1106->1119 1120 15c652b-15c6561 1106->1120 1107->1105 1122 15c64a3-15c64be 1107->1122 1118->1105 1142 15c6434-15c644f 1118->1142 1119->1105 1135 15c6503-15c651e 1119->1135 1120->1129 1145 15c6563-15c656f 1120->1145 1122->1105 1136 15c64c4-15c64c7 1122->1136 1129->1077 1129->1078 1135->1105 1148 15c6520-15c6523 1135->1148 1136->1106 1142->1105 1152 15c6455-15c6463 1142->1152 1145->1129 1148->1120 1152->1095 1175 15c68a7-15c68c5 1171->1175 1173 15c689c 1172->1173 1174 15c68a2 1172->1174 1173->1171 1174->1175 1176 15c68c7-15c68d0 1175->1176 1177 15c68d1-15c693f 1175->1177 1185 15c6941-15c695a 1177->1185 1186 15c6962-15c69b3 1177->1186 1185->1186 1189 15c69b9-15c6a5e 1186->1189 1190 15c6ae0-15c6af5 1186->1190 1207 15c6acb-15c6ada 1189->1207 1208 15c6a60-15c6ac0 1189->1208 1207->1189 1207->1190 1208->1207
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: PH^q$\$\$\
                                                                  • API String ID: 0-2373583716
                                                                  • Opcode ID: bd3622817d5dbdbec2af223436c8b8ad27903bee4dc290fcc01824a628fb7bef
                                                                  • Instruction ID: bc276821e2ee324ea32c4d549ec579cce5c62bb1ae49a488f164307095e29866
                                                                  • Opcode Fuzzy Hash: bd3622817d5dbdbec2af223436c8b8ad27903bee4dc290fcc01824a628fb7bef
                                                                  • Instruction Fuzzy Hash: 70528D30B002158FDB249FB8D8547AEBBF2BF84714F2485A9D40ADB395EB35DD828B51
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq$Xbq$Xbq
                                                                  • API String ID: 0-3756318479
                                                                  • Opcode ID: 98c7f5cd6ad62b454bb2a4011cb4417135b8991edd2d8d5dbfea23e92dcdc4a7
                                                                  • Instruction ID: 29474706b5f6a7031c1bfd46333d11258cf740610068f198d8e15e446e9b2fbf
                                                                  • Opcode Fuzzy Hash: 98c7f5cd6ad62b454bb2a4011cb4417135b8991edd2d8d5dbfea23e92dcdc4a7
                                                                  • Instruction Fuzzy Hash: 45C27E71B01309CFDBA58E99D88A3FDB7B2FB81729F1445AED0019E641EA328D41CBD5
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6e310620812aeab0d3c7dc5e3e175288ee4630ffa6bd2648876ea6798e8c9dc6
                                                                  • Instruction ID: 6c4818f28649406e82a0fedc0742fe78396a631a381bc8876a38aeae2dace4d1
                                                                  • Opcode Fuzzy Hash: 6e310620812aeab0d3c7dc5e3e175288ee4630ffa6bd2648876ea6798e8c9dc6
                                                                  • Instruction Fuzzy Hash: F0426030E002488FEB25DFACC89479DBBF2BF89704F24846DD4099F296DA759C85CB52

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 157 15cc220-15cc22c 158 15cc22e-15cc231 157->158 159 15cc247-15cc24a 158->159 160 15cc233-15cc242 158->160 161 15cc24c 159->161 162 15cc251-15cc254 159->162 160->159 161->162 164 15cc279-15cc27c 162->164 165 15cc256-15cc25c 162->165 168 15cc27e-15cc28e 164->168 169 15cc293-15cc295 164->169 166 15cc25e-15cc261 165->166 167 15cc2a8-15cc388 165->167 166->167 172 15cc263-15cc266 166->172 190 15cc38e-15cc391 167->190 191 15cca4b-15cca74 167->191 168->169 170 15cc29c-15cc29f 169->170 171 15cc297 169->171 170->158 173 15cc2a1-15cc2a7 170->173 171->170 172->167 175 15cc268-15cc274 172->175 175->164 190->191 192 15cc397-15cc39a 190->192 192->191 193 15cc3a0-15cc3d8 192->193 201 15cc3de-15cc416 193->201 202 15cc495-15cc49c 193->202 213 15cc418 201->213 214 15cc41a-15cc426 201->214 203 15cc555-15cca86 202->203 204 15cc4a2-15cc4d9 202->204 217 15cc4dd-15cc4e9 204->217 218 15cc4db 204->218 216 15cc428-15cc442 213->216 214->216 236 15cc447 call 15ccb6b 216->236 237 15cc447 call 15ccaa0 216->237 220 15cc4eb-15cc52f 217->220 218->220 232 15cc549 220->232 233 15cc531-15cc541 220->233 226 15cc44d-15cc46c 230 15cc46e-15cc47e 226->230 231 15cc486 226->231 230->231 231->202 232->203 233->232 236->226 237->226
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q$PH^q$XPcq$\Ocq
                                                                  • API String ID: 0-2308457832
                                                                  • Opcode ID: 452dda3e22efa999f6753f1a2925714877c6f59a3f774694c831fb716f16e28d
                                                                  • Instruction ID: de2ca1d3e8d38c82aa3d4f35e5b5baeec23c2a9b04b9cf2fa287cdd6541da998
                                                                  • Opcode Fuzzy Hash: 452dda3e22efa999f6753f1a2925714877c6f59a3f774694c831fb716f16e28d
                                                                  • Instruction Fuzzy Hash: B3919270B002099FDB24AFF9D85476EBAE7FB88714F20846DE15ADB394DE748C418B51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 947 146a3a0-146a43f GetCurrentProcess 951 146a441-146a447 947->951 952 146a448-146a47c GetCurrentThread 947->952 951->952 953 146a485-146a4b9 GetCurrentProcess 952->953 954 146a47e-146a484 952->954 955 146a4c2-146a4dd call 146a580 953->955 956 146a4bb-146a4c1 953->956 954->953 960 146a4e3-146a512 GetCurrentThreadId 955->960 956->955 961 146a514-146a51a 960->961 962 146a51b-146a57d 960->962 961->962
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 0146A42E
                                                                  • GetCurrentThread.KERNEL32 ref: 0146A46B
                                                                  • GetCurrentProcess.KERNEL32 ref: 0146A4A8
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0146A501
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: 57cebfefd68eff4362dfa76d822e205c4b4aa72f72dcb3ab49fd6347bd21c2e5
                                                                  • Instruction ID: 1465cd39b0c7063795e5847ec5351d292de3e2525f65873cabb2894b999ccc9b
                                                                  • Opcode Fuzzy Hash: 57cebfefd68eff4362dfa76d822e205c4b4aa72f72dcb3ab49fd6347bd21c2e5
                                                                  • Instruction Fuzzy Hash: 525166B09017098FDB14DFA9D948BDEBBF5EF88308F208469D049A7364D7349984CF66

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 969 146a3b0-146a43f GetCurrentProcess 973 146a441-146a447 969->973 974 146a448-146a47c GetCurrentThread 969->974 973->974 975 146a485-146a4b9 GetCurrentProcess 974->975 976 146a47e-146a484 974->976 977 146a4c2-146a4dd call 146a580 975->977 978 146a4bb-146a4c1 975->978 976->975 982 146a4e3-146a512 GetCurrentThreadId 977->982 978->977 983 146a514-146a51a 982->983 984 146a51b-146a57d 982->984 983->984
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32 ref: 0146A42E
                                                                  • GetCurrentThread.KERNEL32 ref: 0146A46B
                                                                  • GetCurrentProcess.KERNEL32 ref: 0146A4A8
                                                                  • GetCurrentThreadId.KERNEL32 ref: 0146A501
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: Current$ProcessThread
                                                                  • String ID:
                                                                  • API String ID: 2063062207-0
                                                                  • Opcode ID: da1b1569816b1bc0e510080c96eb476b3ca56bff518cab3d6ee45fd2a31255d9
                                                                  • Instruction ID: d1580659fe57deddc5f7c85e346dd97d8c3ba8137b3758467036abc5e96dc72d
                                                                  • Opcode Fuzzy Hash: da1b1569816b1bc0e510080c96eb476b3ca56bff518cab3d6ee45fd2a31255d9
                                                                  • Instruction Fuzzy Hash: 3D5154B49017098FDB14DFAAD548BDEBBF5EF88308F208469D049A7364D7349984CF66

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1219 15b7678-15b7687 1220 15b7689-15b7693 1219->1220 1221 15b76ac-15b76d7 1219->1221 1222 15b76a8-15b76ab 1220->1222 1223 15b7695-15b76a6 1220->1223 1226 15b76d9-15b76e3 1221->1226 1227 15b76fc-15b7727 1221->1227 1223->1222 1228 15b76f8-15b76fb 1226->1228 1229 15b76e5-15b76f6 1226->1229 1232 15b7729-15b7733 1227->1232 1233 15b774c-15b7777 1227->1233 1229->1228 1234 15b7748-15b774b 1232->1234 1235 15b7735-15b7746 1232->1235 1239 15b7779-15b7783 1233->1239 1240 15b779c-15b77c4 1233->1240 1235->1234 1241 15b7798-15b779b 1239->1241 1242 15b7785-15b7796 1239->1242 1244 15b77e9-15b780f 1240->1244 1245 15b77c6-15b77d0 1240->1245 1242->1241 1251 15b7811-15b781b 1244->1251 1252 15b7834-15b78ba call 15b33b8 call 15b34c8 LdrInitializeThunk 1244->1252 1247 15b77d2-15b77e3 1245->1247 1248 15b77e5-15b77e8 1245->1248 1247->1248 1253 15b781d-15b782e 1251->1253 1254 15b7830-15b7833 1251->1254 1266 15b7a03-15b7a20 1252->1266 1267 15b78c0-15b78da 1252->1267 1253->1254 1279 15b7a25-15b7a2e 1266->1279 1267->1266 1270 15b78e0-15b78fa 1267->1270 1273 15b78fc-15b78fe 1270->1273 1274 15b7900 1270->1274 1276 15b7903-15b795e 1273->1276 1274->1276 1285 15b7960-15b7962 1276->1285 1286 15b7964 1276->1286 1287 15b7967-15b7a01 1285->1287 1286->1287 1287->1279
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149318465.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15b0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID: LR^q$LR^q
                                                                  • API String ID: 2994545307-4089051495
                                                                  • Opcode ID: 539475dd571d2b2f004e8e378f1b49fef65d50f59ec8cd0ff4db1f684d82930a
                                                                  • Instruction ID: 019d35f188098230ef28ca3bb70b3e16f07a411c041be0a7c4d76b13084ba277
                                                                  • Opcode Fuzzy Hash: 539475dd571d2b2f004e8e378f1b49fef65d50f59ec8cd0ff4db1f684d82930a
                                                                  • Instruction Fuzzy Hash: 47B1D730B053459FD7029BB9D854BAE7BE6AFC9304F1484AAE405CF392EA74EC49C752

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1791 15c94e8-15c94f4 1792 15c9519-15c9547 1791->1792 1793 15c94f6-15c9500 1791->1793 1799 15c9549-15c9560 call 15c7b90 1792->1799 1800 15c9562-15c9570 1792->1800 1794 15c9515-15c9518 1793->1794 1795 15c9502-15c9513 1793->1795 1795->1794 1803 15c9577-15c9589 1799->1803 1800->1803 1807 15c958f-15c959d 1803->1807 1808 15c9809-15c9829 1803->1808 1811 15c959f-15c95a6 1807->1811 1812 15c95f5-15c95fe 1807->1812 1813 15c982b-15c9844 1808->1813 1814 15c9846-15c9859 1808->1814 1815 15c95ac-15c95b1 1811->1815 1816 15c96fa-15c9726 1811->1816 1817 15c972d-15c9759 1812->1817 1818 15c9604-15c9608 1812->1818 1830 15c985f-15c9860 1813->1830 1814->1830 1819 15c95c9-15c95d7 1815->1819 1820 15c95b3-15c95b9 1815->1820 1816->1817 1854 15c9760-15c97ca 1817->1854 1822 15c9619-15c963d 1818->1822 1823 15c960a-15c9613 1818->1823 1838 15c95d9-15c95db 1819->1838 1839 15c95e0-15c95f0 1819->1839 1827 15c95bd-15c95c7 1820->1827 1828 15c95bb 1820->1828 1833 15c963f-15c964a 1822->1833 1834 15c9657-15c965b 1822->1834 1823->1817 1823->1822 1827->1819 1828->1819 1843 15c9652 1833->1843 1840 15c97d1-15c9802 1834->1840 1841 15c9661-15c9665 1834->1841 1842 15c96f0-15c96f7 1838->1842 1839->1842 1840->1808 1841->1840 1845 15c966b-15c9676 1841->1845 1843->1842 1845->1840 1853 15c967c-15c96a8 1845->1853 1853->1840 1858 15c96ae-15c96c9 1853->1858 1854->1840 1858->1854 1861 15c96cf-15c96e8 1858->1861 1861->1840 1865 15c96ee 1861->1865 1865->1842
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: ,bq$,bq$Hbq$Hbq
                                                                  • API String ID: 0-3042663465
                                                                  • Opcode ID: a561ae594b1c86c63a5f6fff69e3a3385bf5934cdd9c64e211e088815d35eb35
                                                                  • Instruction ID: 5c612857d66ed87a995cc2225972348704d9aff08670fb61838f9aa1a16a243d
                                                                  • Opcode Fuzzy Hash: a561ae594b1c86c63a5f6fff69e3a3385bf5934cdd9c64e211e088815d35eb35
                                                                  • Instruction Fuzzy Hash: 55A1B8347002099FDB05EFA8C854AAE7BE6BFC8B04F248829E506DF295DB75DC41CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1871 15c5e70-15c5e8f 1872 15c5eb4-15c5edf 1871->1872 1873 15c5e91-15c5e9b 1871->1873 1878 15c5f04-15c5f39 1872->1878 1879 15c5ee1-15c5eeb 1872->1879 1874 15c5e9d-15c5eae 1873->1874 1875 15c5eb0-15c5eb3 1873->1875 1874->1875 1884 15c5f3f-15c5f53 1878->1884 1885 15c5ff4-15c6004 1878->1885 1880 15c5eed-15c5efe 1879->1880 1881 15c5f00-15c5f03 1879->1881 1880->1881 1888 15c5f59 1884->1888 1889 15c5f55-15c5f57 1884->1889 2136 15c6006 call 15c61c4 1885->2136 2137 15c6006 call 15c6030 1885->2137 2138 15c6006 call 15c5e70 1885->2138 1891 15c5f5c-15c5f71 1888->1891 1889->1891 1890 15c600c-15c6013 1893 15c5fb8-15c5fe1 call 15c5900 1891->1893 1894 15c5f73-15c5f82 1891->1894 1900 15c5fec-15c5ff2 1893->1900 1901 15c5fe3-15c5fea 1893->1901 1898 15c5f88-15c5f8b 1894->1898 1899 15c6014 1894->1899 1902 15c6019-15c6053 1898->1902 1903 15c5f91-15c5f97 1898->1903 1899->1902 1900->1890 1901->1890 1908 15c6095-15c6097 1902->1908 1909 15c6055-15c605a 1902->1909 1903->1893 1904 15c5f99-15c5fb6 1903->1904 1904->1893 1912 15c6099-15c609f 1908->1912 1913 15c60a1-15c60b5 1908->1913 1910 15c627b 1909->1910 1911 15c6060-15c6063 1909->1911 1915 15c6280-15c62f4 1910->1915 1914 15c6069-15c606f 1911->1914 1911->1915 1917 15c60d6-15c60d8 1912->1917 1928 15c60b7-15c60bb 1913->1928 1929 15c60d0 1913->1929 1914->1908 1918 15c6071-15c6090 1914->1918 1961 15c62f6-15c62ff 1915->1961 1962 15c6300-15c631f 1915->1962 1919 15c60da-15c60df 1917->1919 1920 15c60e1-15c60ea 1917->1920 1939 15c61a5-15c61b9 1918->1939 1919->1920 1922 15c6144-15c6147 1919->1922 1931 15c60ec-15c60f5 1920->1931 1932 15c60fa-15c610c 1920->1932 1922->1910 1925 15c614d-15c6150 1922->1925 1925->1915 1930 15c6156-15c615c 1925->1930 1928->1929 1934 15c60bd-15c60ce 1928->1934 1929->1917 1936 15c617d-15c618e 1930->1936 1937 15c615e-15c617b 1930->1937 1931->1936 1932->1910 1942 15c6112-15c6115 1932->1942 1934->1917 1934->1929 1936->1939 1947 15c6190-15c619f 1936->1947 1937->1936 1957 15c61c0-15c6257 1939->1957 1942->1915 1946 15c611b-15c6121 1942->1946 1946->1936 1950 15c6123-15c6142 1946->1950 1947->1939 1950->1936 1968 15c625f-15c6265 1957->1968 1969 15c6259-15c625d 1957->1969 1973 15c632b-15c6337 1962->1973 1974 15c6321-15c632a 1962->1974 1972 15c626f-15c6278 1968->1972 1969->1968 1971 15c6267-15c626d 1969->1971 1971->1972 1975 15c633d-15c6346 1973->1975 1976 15c65df-15c65e9 1973->1976 1978 15c634c-15c6385 1975->1978 1979 15c65f8-15c661f 1975->1979 1994 15c6598-15c65bc 1978->1994 1995 15c638b-15c63c3 1978->1995 1982 15c6644-15c670d 1979->1982 1983 15c6621-15c662b 1979->1983 2014 15c670f-15c6718 1982->2014 2015 15c6719-15c6898 1982->2015 1985 15c662d-15c663e 1983->1985 1986 15c6640-15c6643 1983->1986 1985->1986 2001 15c65be 1994->2001 2002 15c65c7 1994->2002 2011 15c63c9-15c63e1 1995->2011 2012 15c646b-15c6483 1995->2012 2001->2002 2002->1976 2021 15c63e7-15c6402 2011->2021 2022 15c6571-15c6582 2011->2022 2023 15c64cf-15c64e7 2012->2023 2024 15c6485-15c649d 2012->2024 2088 15c689e-15c68a0 2015->2088 2089 15c689a 2015->2089 2021->2022 2035 15c6408-15c642e 2021->2035 2046 15c6587-15c6592 2022->2046 2036 15c64e9-15c6501 2023->2036 2037 15c652b-15c6561 2023->2037 2024->2022 2039 15c64a3-15c64be 2024->2039 2035->2022 2059 15c6434-15c644f 2035->2059 2036->2022 2052 15c6503-15c651e 2036->2052 2037->2046 2062 15c6563-15c656f 2037->2062 2039->2022 2053 15c64c4-15c64c7 2039->2053 2046->1994 2046->1995 2052->2022 2065 15c6520-15c6523 2052->2065 2053->2023 2059->2022 2069 15c6455-15c6463 2059->2069 2062->2046 2065->2037 2069->2012 2092 15c68a7-15c68c5 2088->2092 2090 15c689c 2089->2090 2091 15c68a2 2089->2091 2090->2088 2091->2092 2093 15c68c7-15c68d0 2092->2093 2094 15c68d1-15c693f 2092->2094 2102 15c6941-15c695a 2094->2102 2103 15c6962-15c69b3 2094->2103 2102->2103 2106 15c69b9-15c6a5e 2103->2106 2107 15c6ae0-15c6af5 2103->2107 2124 15c6acb-15c6ada 2106->2124 2125 15c6a60-15c6ac0 2106->2125 2124->2106 2124->2107 2125->2124 2136->1890 2137->1890 2138->1890
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: LR^q$\$\
                                                                  • API String ID: 0-2226078569
                                                                  • Opcode ID: 4604c18eccdccc919e8d1a601027acc8fc8b909a7d8e829c4c90a3b068e3a5bc
                                                                  • Instruction ID: ee3edc5cbbc9b9e7b401140d9443bdf190e8e40f278eb8712be6bedc55a548b9
                                                                  • Opcode Fuzzy Hash: 4604c18eccdccc919e8d1a601027acc8fc8b909a7d8e829c4c90a3b068e3a5bc
                                                                  • Instruction Fuzzy Hash: 4271E230B042058FDB19CFE9C8506AE7BF6BB85710F1484AEE518DF292EB78DD428791

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2139 15c6ed0-15c6f42 2148 15c6f44-15c6f5f 2139->2148 2149 15c6f76-15c6f9f 2139->2149 2157 15c6f67-15c6f6f 2148->2157 2158 15c6fa1-15c6fbc 2149->2158 2159 15c6fd3-15c700c 2149->2159 2157->2149 2170 15c6fc4-15c6fcc 2158->2170 2162 15c71d4-15c71f2 2159->2162 2163 15c7012-15c7067 call 15c7207 2159->2163 2167 15c71f3 2162->2167 2177 15c718d-15c71b1 2163->2177 2178 15c706d-15c70ce 2163->2178 2167->2167 2170->2159 2182 15c71bc-15c71bd 2177->2182 2183 15c71b3 2177->2183 2193 15c717c-15c7187 2178->2193 2194 15c70d4-15c70ee 2178->2194 2182->2162 2183->2182 2193->2177 2193->2178 2213 15c70f0 call 15ca058 2194->2213 2214 15c70f0 call 15c9f78 2194->2214 2215 15c70f0 call 15c9f68 2194->2215 2216 15c70f0 call 15c9e28 2194->2216 2199 15c70f6-15c712f call 15cc220 2204 15c7149-15c7160 2199->2204 2205 15c7131-15c7137 2199->2205 2211 15c7169 2204->2211 2206 15c7139 2205->2206 2207 15c713b-15c7147 2205->2207 2206->2204 2207->2204 2211->2193 2213->2199 2214->2199 2215->2199 2216->2199
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$ fcq$PH^q
                                                                  • API String ID: 0-4172635152
                                                                  • Opcode ID: 74796493cef1f3ded7bdfd88ae6f8e331806c467e73f95d8d40ca5dfc7f1b53f
                                                                  • Instruction ID: 1adb530457bdfc7ffd16a3e53c7141a5d188fcb41f529269ba5f3f878a5d42e3
                                                                  • Opcode Fuzzy Hash: 74796493cef1f3ded7bdfd88ae6f8e331806c467e73f95d8d40ca5dfc7f1b53f
                                                                  • Instruction Fuzzy Hash: AD715F35B002058FDB549FB9D55876E7AFBAFC8710F208429E40ADB384EF749C428B92

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 2266 15c6af8-15c6b24 2270 15c6b2a-15c6b32 2266->2270 2271 15c6e17-15c6e3f 2266->2271 2272 15c6d10-15c6d16 2270->2272 2278 15c6e64-15c6e8f 2271->2278 2279 15c6e41-15c6e4b 2271->2279 2274 15c6d1c-15c6d4a 2272->2274 2275 15c6b40-15c6b4a 2272->2275 2299 15c6ddc-15c6df1 2274->2299 2300 15c6d50-15c6d61 2274->2300 2276 15c6b4c-15c6b6c 2275->2276 2277 15c6b74-15c6bbe 2275->2277 2276->2277 2296 15c6ce4-15c6cf7 2277->2296 2297 15c6bc4-15c6bd3 2277->2297 2288 15c6eb4-15c6ec0 2278->2288 2289 15c6e91-15c6e9b 2278->2289 2281 15c6e4d-15c6e5e 2279->2281 2282 15c6e60-15c6e63 2279->2282 2281->2282 2301 15c6f20-15c6f42 2288->2301 2302 15c6ec2-15c6f19 2288->2302 2292 15c6e9d-15c6eae 2289->2292 2293 15c6eb0-15c6eb3 2289->2293 2292->2293 2303 15c6d03 2296->2303 2304 15c6cfe 2297->2304 2305 15c6bd9-15c6bea 2297->2305 2299->2271 2311 15c6dc7-15c6dd6 2300->2311 2312 15c6d63-15c6dc0 2300->2312 2324 15c6f44-15c6f58 2301->2324 2325 15c6f76-15c6f9f 2301->2325 2302->2301 2303->2272 2304->2303 2314 15c6ccf-15c6cde 2305->2314 2315 15c6bf0-15c6c11 2305->2315 2311->2299 2311->2300 2312->2311 2314->2296 2314->2297 2333 15c6cf9 2315->2333 2334 15c6c17-15c6c20 2315->2334 2342 15c6f5f 2324->2342 2347 15c6fa1-15c6fb5 2325->2347 2348 15c6fd3-15c700c 2325->2348 2333->2304 2334->2304 2337 15c6c26-15c6cc7 2334->2337 2337->2314 2346 15c6f67-15c6f6f 2342->2346 2346->2325 2363 15c6fbc 2347->2363 2353 15c71d4-15c71f2 2348->2353 2354 15c7012-15c701a call 15c7207 2348->2354 2362 15c71f3 2353->2362 2360 15c7020-15c7037 2354->2360 2370 15c703e 2360->2370 2362->2362 2366 15c6fc4-15c6fcc 2363->2366 2366->2348 2371 15c7046-15c7067 2370->2371 2379 15c718d-15c71b1 2371->2379 2380 15c706d-15c7093 2371->2380 2385 15c71bc-15c71bd 2379->2385 2386 15c71b3 2379->2386 2391 15c709a-15c70a4 2380->2391 2385->2353 2386->2385 2392 15c70ab-15c70ce 2391->2392 2396 15c717c-15c7187 2392->2396 2397 15c70d4-15c70e6 2392->2397 2396->2379 2396->2380 2401 15c70ec-15c70ee 2397->2401 2417 15c70f0 call 15ca058 2401->2417 2418 15c70f0 call 15c9f78 2401->2418 2419 15c70f0 call 15c9f68 2401->2419 2420 15c70f0 call 15c9e28 2401->2420 2402 15c70f6-15c70fa 2403 15c7104-15c7108 2402->2403 2404 15c7112-15c7121 call 15cc220 2403->2404 2406 15c712b-15c712f 2404->2406 2407 15c7149 2406->2407 2408 15c7131-15c7137 2406->2408 2411 15c714f-15c7160 2407->2411 2409 15c7139 2408->2409 2410 15c713b-15c7147 2408->2410 2409->2407 2410->2407 2414 15c7169 2411->2414 2414->2396 2417->2402 2418->2402 2419->2402 2420->2402
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q
                                                                  • API String ID: 0-2325994563
                                                                  • Opcode ID: 6db0ac8ba3dbffb7e0abca8490f2071c5ed45228b83c4d27b48436465964c34b
                                                                  • Instruction ID: ccb494fd7f450321b6accbb7cf9d68c32511ab5b0ee9f99ad77fdafe02eb688a
                                                                  • Opcode Fuzzy Hash: 6db0ac8ba3dbffb7e0abca8490f2071c5ed45228b83c4d27b48436465964c34b
                                                                  • Instruction Fuzzy Hash: 37025A30B002068FDB15DFB8D4546AE7BF6BF89710F20846AE40ADB395EF349D428B91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 3151 15c86a0-15c86ad 3152 15c86af-15c86b4 3151->3152 3153 15c86b9-15c86c5 3151->3153 3154 15c8a4e-15c8a53 3152->3154 3156 15c86d5-15c86da 3153->3156 3157 15c86c7-15c86c9 3153->3157 3156->3154 3158 15c86d1-15c86d3 3157->3158 3158->3156 3159 15c86df-15c86eb 3158->3159 3161 15c86ed-15c86f9 3159->3161 3162 15c86fb-15c8700 3159->3162 3161->3162 3164 15c8705-15c8710 3161->3164 3162->3154 3166 15c87ba-15c87c5 3164->3166 3167 15c8716-15c8721 3164->3167 3170 15c8868-15c8874 3166->3170 3171 15c87cb-15c87da 3166->3171 3172 15c8737 3167->3172 3173 15c8723-15c8735 3167->3173 3180 15c8884-15c8896 3170->3180 3181 15c8876-15c8882 3170->3181 3182 15c87dc-15c87e6 3171->3182 3183 15c87eb-15c87fa 3171->3183 3174 15c873c-15c873e 3172->3174 3173->3174 3177 15c875e-15c8763 3174->3177 3178 15c8740-15c874f 3174->3178 3177->3154 3178->3177 3189 15c8751-15c875c 3178->3189 3198 15c8898-15c88a4 3180->3198 3199 15c88ba-15c88bf 3180->3199 3181->3180 3190 15c88c4-15c88cf 3181->3190 3182->3154 3191 15c87fc-15c8808 3183->3191 3192 15c881e-15c8827 3183->3192 3189->3177 3196 15c8768-15c8771 3189->3196 3201 15c88d5-15c88de 3190->3201 3202 15c89b1-15c89bc 3190->3202 3205 15c880a-15c880f 3191->3205 3206 15c8814-15c8819 3191->3206 3203 15c883d 3192->3203 3204 15c8829-15c883b 3192->3204 3211 15c877d-15c878c 3196->3211 3212 15c8773-15c8778 3196->3212 3216 15c88a6-15c88ab 3198->3216 3217 15c88b0-15c88b5 3198->3217 3199->3154 3218 15c88f4 3201->3218 3219 15c88e0-15c88f2 3201->3219 3220 15c89be-15c89c8 3202->3220 3221 15c89e6-15c89f5 3202->3221 3208 15c8842-15c8844 3203->3208 3204->3208 3205->3154 3206->3154 3208->3170 3214 15c8846-15c8852 3208->3214 3229 15c878e-15c879a 3211->3229 3230 15c87b0-15c87b5 3211->3230 3212->3154 3231 15c885e-15c8863 3214->3231 3232 15c8854-15c8859 3214->3232 3216->3154 3217->3154 3222 15c88f9-15c88fb 3218->3222 3219->3222 3237 15c89df-15c89e4 3220->3237 3238 15c89ca-15c89d6 3220->3238 3234 15c8a49 3221->3234 3235 15c89f7-15c8a06 3221->3235 3227 15c88fd-15c8909 3222->3227 3228 15c890b 3222->3228 3236 15c8910-15c8912 3227->3236 3228->3236 3245 15c879c-15c87a1 3229->3245 3246 15c87a6-15c87ab 3229->3246 3230->3154 3231->3154 3232->3154 3234->3154 3235->3234 3249 15c8a08-15c8a20 3235->3249 3241 15c891e-15c8931 3236->3241 3242 15c8914-15c8919 3236->3242 3237->3154 3238->3237 3248 15c89d8-15c89dd 3238->3248 3250 15c8969-15c8973 3241->3250 3251 15c8933 3241->3251 3242->3154 3245->3154 3246->3154 3248->3154 3261 15c8a42-15c8a47 3249->3261 3262 15c8a22-15c8a40 3249->3262 3256 15c8975-15c8981 3250->3256 3257 15c8992-15c899e 3250->3257 3252 15c8936-15c8947 3251->3252 3259 15c894e-15c8953 3252->3259 3260 15c8949-15c894c 3252->3260 3266 15c8988-15c898d 3256->3266 3267 15c8983-15c8986 3256->3267 3269 15c89a7 3257->3269 3270 15c89a0-15c89a5 3257->3270 3259->3154 3260->3259 3264 15c8958-15c895b 3260->3264 3261->3154 3262->3154 3271 15c8a54-15c8a6d 3264->3271 3272 15c8961-15c8967 3264->3272 3266->3154 3267->3257 3267->3266 3273 15c89ac 3269->3273 3270->3273 3272->3250 3272->3252 3273->3154
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q
                                                                  • API String ID: 0-2697143702
                                                                  • Opcode ID: e66fd34827bcfd7a004a5601f41582c92f79671567faced76e6f5137674c6f46
                                                                  • Instruction ID: 75afe644d27332bd74186b21c78c0719b88914a2e12ed51c5e7d22b2c0b77cef
                                                                  • Opcode Fuzzy Hash: e66fd34827bcfd7a004a5601f41582c92f79671567faced76e6f5137674c6f46
                                                                  • Instruction Fuzzy Hash: A4B12D343045018FEB259FADC85473D7AE6FF85E24F1844AEE106CF3A6EA69CC528742

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 3315 15cbcf0-15cbd11 3316 15cbd19-15cbd20 3315->3316 3353 15cbd13 call 15cbcf0 3315->3353 3354 15cbd13 call 15cbad1 3315->3354 3317 15cbd2c-15cbd4c 3316->3317 3318 15cbd22-15cbd27 3316->3318 3321 15cbd4e-15cbd50 3317->3321 3322 15cbd87-15cbd89 3317->3322 3319 15cbdf5-15cbdfc 3318->3319 3323 15cbd5f-15cbd66 3321->3323 3324 15cbd52-15cbd57 3321->3324 3325 15cbd8b-15cbd91 3322->3325 3326 15cbdf0 3322->3326 3327 15cbd6c-15cbd85 3323->3327 3328 15cbdff-15cbe2b call 15cb6e0 3323->3328 3324->3323 3325->3326 3329 15cbd93-15cbdae 3325->3329 3326->3319 3327->3319 3341 15cbe2d-15cbe37 3328->3341 3342 15cbe39-15cbe42 call 15cb6e0 3328->3342 3334 15cbde5-15cbde7 3329->3334 3335 15cbdb0-15cbdb2 3329->3335 3334->3326 3336 15cbde9-15cbdee 3334->3336 3338 15cbdb4-15cbdb9 3335->3338 3339 15cbdc1-15cbdc8 3335->3339 3336->3319 3338->3339 3339->3328 3340 15cbdca-15cbde3 3339->3340 3340->3319 3341->3342 3347 15cbe44-15cbe4e 3342->3347 3348 15cbe50-15cbe59 3342->3348 3347->3348 3350 15cbe64-15cbe8d 3348->3350 3353->3316 3354->3316
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 4'^q$4'^q
                                                                  • API String ID: 0-2697143702
                                                                  • Opcode ID: 6925ae5d68fbe93e0517379ddf2dc5a8912861eb3955ce41a252fb95e512be80
                                                                  • Instruction ID: 09396d16dfa49b3a8f5843f72c6ce45ef722a41e3c37f3a6db4a409334cfdd16
                                                                  • Opcode Fuzzy Hash: 6925ae5d68fbe93e0517379ddf2dc5a8912861eb3955ce41a252fb95e512be80
                                                                  • Instruction Fuzzy Hash: 16518F347042499FDB05DFA9C844B6EBBEAFF88750F14846AE908CF256DB75CC418B52
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: fcq$PH^q
                                                                  • API String ID: 0-2325994563
                                                                  • Opcode ID: 5c8310d67938df6f6306d1c5d6da1180c884c8c55a65bc9296a6b2bea7d2a292
                                                                  • Instruction ID: b8ed9fe7280cd0ba6fda6bfe314309c64db2eea19f9665086f7679d3175bbb8d
                                                                  • Opcode Fuzzy Hash: 5c8310d67938df6f6306d1c5d6da1180c884c8c55a65bc9296a6b2bea7d2a292
                                                                  • Instruction Fuzzy Hash: 22413F35B002058FDB64AFB8D55877E7AFBBBC8B51F244429E506DB394EE748C028B91
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149318465.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15b0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: eb6446a4ae4ed53ce49986fe810630203d40fddd9dc06410d95366a119a20d05
                                                                  • Instruction ID: 5264baa0d6444169bcf4040f969cbb5e1648a60ad5a73a4ab5381f943c969319
                                                                  • Opcode Fuzzy Hash: eb6446a4ae4ed53ce49986fe810630203d40fddd9dc06410d95366a119a20d05
                                                                  • Instruction Fuzzy Hash: 88614A30A00305DFDB24EBB9D4987AEBBB6BF85304F148929E402AB395DF799C45CB51
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0146680A
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: d7eea5053f9dafdc0fc4f163777aa5465c5c35cd9a7c8d25ef7cd4a8002defc4
                                                                  • Instruction ID: 79ffc7626bf24a2be3b59c71bbcf7c57b20b51febda85c3623f474cdf7741c8b
                                                                  • Opcode Fuzzy Hash: d7eea5053f9dafdc0fc4f163777aa5465c5c35cd9a7c8d25ef7cd4a8002defc4
                                                                  • Instruction Fuzzy Hash: 7E51D1B1D003199FDB14CFA9C884ADEBFB5BF48314F25812AE818AB210D7749841CF91
                                                                  APIs
                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0146680A
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CreateWindow
                                                                  • String ID:
                                                                  • API String ID: 716092398-0
                                                                  • Opcode ID: 9fca2da49845656d80e2e259200745c787047df08da883d28d524e36fe3c7f73
                                                                  • Instruction ID: ab1dd9d4bfb46a4391b8e5eea16f0cdc0b8e10aece418051b2eca1a1489e8473
                                                                  • Opcode Fuzzy Hash: 9fca2da49845656d80e2e259200745c787047df08da883d28d524e36fe3c7f73
                                                                  • Instruction Fuzzy Hash: 9741C0B1D003099FDB14CFAAD884ADEBFB5FF48314F24812AE418AB220D775A845CF91
                                                                  APIs
                                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 0146B579
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: CallProcWindow
                                                                  • String ID:
                                                                  • API String ID: 2714655100-0
                                                                  • Opcode ID: 532abfb3d200578d50979abe8f00e9e4947b7aa4d319fad247f0e980beef864d
                                                                  • Instruction ID: 347cd0d4e15c40a0effeac6c8d723ae6922cd5d8129b3b0a6dab3a18bf1f98b3
                                                                  • Opcode Fuzzy Hash: 532abfb3d200578d50979abe8f00e9e4947b7aa4d319fad247f0e980beef864d
                                                                  • Instruction Fuzzy Hash: 90411AB4A00345CFCB14CF99C488AAABBF9FF88318F14C459D519AB321D774A841CFA1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149318465.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15b0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: InitializeThunk
                                                                  • String ID:
                                                                  • API String ID: 2994545307-0
                                                                  • Opcode ID: a7467e9f5b703b7bc092195d20b2f464bd327e6a3ce0a19d1e21064ae2608634
                                                                  • Instruction ID: a936a52430dbb2d6c7e6817c1e939422b4b93fdb0be1e3b49af6ba8d1647b5b6
                                                                  • Opcode Fuzzy Hash: a7467e9f5b703b7bc092195d20b2f464bd327e6a3ce0a19d1e21064ae2608634
                                                                  • Instruction Fuzzy Hash: 9931AF70A01345DFDB11DFB9E494AEDBBB2FF85314F24886DD4029B252DB399845CB50
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0146A67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: c47b0278a0fc954a0c4ca81043672748108d9840dbab6eb4340401522ac8f76f
                                                                  • Instruction ID: 07aadf242ecdcfe8e034dd6c87b2b9994333b928ad1f7d3ff58a4827e86b8ffe
                                                                  • Opcode Fuzzy Hash: c47b0278a0fc954a0c4ca81043672748108d9840dbab6eb4340401522ac8f76f
                                                                  • Instruction Fuzzy Hash: 002105B5D002189FDB10CFA9D884AEEBBF8EB48314F14801AE958A3320D374A950CFA5
                                                                  APIs
                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0146A67F
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: DuplicateHandle
                                                                  • String ID:
                                                                  • API String ID: 3793708945-0
                                                                  • Opcode ID: aa40d4a85c8cffd47c59a56b55271418c4e04b026ff210ce6fa133ec6cd632b5
                                                                  • Instruction ID: a7dd4db0034e804b5087ca78d12fbd4d8daed9397fd72d2b57f30436ef46dbf9
                                                                  • Opcode Fuzzy Hash: aa40d4a85c8cffd47c59a56b55271418c4e04b026ff210ce6fa133ec6cd632b5
                                                                  • Instruction Fuzzy Hash: 3721E4B59002189FDB10CF9AD584ADEBFF8EB48314F14801AE958A7310D374A954CFA5
                                                                  APIs
                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 0146FF2A
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: EncodePointer
                                                                  • String ID:
                                                                  • API String ID: 2118026453-0
                                                                  • Opcode ID: bf2ef83ead8aca83e8ae7aa4eb5597dba4760fb47ec22eab5eded185b2a843fe
                                                                  • Instruction ID: e61a8a951cd551a98ff4cddf9ea103be3797c138fa30a75ac0fdbb01087bba50
                                                                  • Opcode Fuzzy Hash: bf2ef83ead8aca83e8ae7aa4eb5597dba4760fb47ec22eab5eded185b2a843fe
                                                                  • Instruction Fuzzy Hash: BB11AC75901349CFDB20DFA9D42879EBFF8FB09328F24802AD454A3256D739A544CFA2
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 014656B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: ae27463c1e6c24be975e58b7148b45df96be6d69da8116bc65d0b8085d2bc13d
                                                                  • Instruction ID: 06fa54ba2e6a60c35d74569faa6c0fae74e6e68f336f2de555e3cb2e1fe96188
                                                                  • Opcode Fuzzy Hash: ae27463c1e6c24be975e58b7148b45df96be6d69da8116bc65d0b8085d2bc13d
                                                                  • Instruction Fuzzy Hash: 351102B5D007498FDB10DF9AD444ADEFBF8EB88224F10846AD519BB320C375A945CFA5
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 014656B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4142906213.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_1460000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID: HandleModule
                                                                  • String ID:
                                                                  • API String ID: 4139908857-0
                                                                  • Opcode ID: a89976ac987a859ef9e0865886b147a65646433915eb6da28132431cc9e68d68
                                                                  • Instruction ID: afc29e65dec351e6b1efa15b4831808ba1ff8ec93cc5a4a55d133d0782a719b3
                                                                  • Opcode Fuzzy Hash: a89976ac987a859ef9e0865886b147a65646433915eb6da28132431cc9e68d68
                                                                  • Instruction Fuzzy Hash: A811FDB5D002498FDB20CFAAE444ADEFBF5AF88314F14846AD469A7320C379A545CFA5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Hbq
                                                                  • API String ID: 0-1245868
                                                                  • Opcode ID: 418b8ac9cac5ce0296344a1b184a138237b7e3f2ae2dbc23706178922939f598
                                                                  • Instruction ID: 38793becdf70113ed1bc458e0380fc82706482b4b40f339037912b4f1e150b70
                                                                  • Opcode Fuzzy Hash: 418b8ac9cac5ce0296344a1b184a138237b7e3f2ae2dbc23706178922939f598
                                                                  • Instruction Fuzzy Hash: FA319934A053459FC745DFB8D4186AE7BF1BB81310F2484BAD049CF291EA389E86CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 842f577fe74f11508bb5694d00a3982edd776ffe5607d7cff74203b34fb86c5c
                                                                  • Instruction ID: 109e25b6d7284a4a5fcfc5dbbb3f63bf356b9f9cd2b9c837b5128f959d181299
                                                                  • Opcode Fuzzy Hash: 842f577fe74f11508bb5694d00a3982edd776ffe5607d7cff74203b34fb86c5c
                                                                  • Instruction Fuzzy Hash: 71D16A30B002058FDB15DFF8D8986ADBBE2BF88710F248469E506DB365EA75EC42CB51
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c6ea3d4efeb30211e0e0c56fd1d1c12299375d22cb2721e9f262efba33a6fe0
                                                                  • Instruction ID: e5ee2c48d903bfda59c30bbd82ab3f04bb5de07d78ccd275eebfd09b72f1ca79
                                                                  • Opcode Fuzzy Hash: 2c6ea3d4efeb30211e0e0c56fd1d1c12299375d22cb2721e9f262efba33a6fe0
                                                                  • Instruction Fuzzy Hash: 49C1B231A006058FDB21CFEDD8906AEBBB2FF85710F10896AE159CF366D634D845CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 373a78ca6155ddead240d19431fede8130e71117169938a0e834ef8a088301c3
                                                                  • Instruction ID: ad072ca40e7fd901e6a0f664a337e974e6d22c842ffdff0c308f5200aa92520a
                                                                  • Opcode Fuzzy Hash: 373a78ca6155ddead240d19431fede8130e71117169938a0e834ef8a088301c3
                                                                  • Instruction Fuzzy Hash: D6A1E230B142028FDB229FFDD85466E7BE6FB85B10F24447AE505CF292EA74EC468752
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 811595773e1c247d95a724b1e50ccd2c5703d716af0889e9ad1050dcc6a3f267
                                                                  • Instruction ID: 19f634a1f74c1c6ce8b09cb9e84709946085b4c4010e9dc6082774da08bba61f
                                                                  • Opcode Fuzzy Hash: 811595773e1c247d95a724b1e50ccd2c5703d716af0889e9ad1050dcc6a3f267
                                                                  • Instruction Fuzzy Hash: 2FA156317002458FDB16DFA8C894A6E7BE5BF89A00F1940AAE915CF7A2DB74DC41CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3534e2fd092c9e868227aee274cb7694ce8c4b8cc759ecbbe53b8c0ae4917419
                                                                  • Instruction ID: c5df18ffe6e11225b3d2e1e5b262ac25e34c1a7216a3ec60abe1a5ca4b0f066f
                                                                  • Opcode Fuzzy Hash: 3534e2fd092c9e868227aee274cb7694ce8c4b8cc759ecbbe53b8c0ae4917419
                                                                  • Instruction Fuzzy Hash: 93A13A30901606CFC711CFACC88559ABBB5FF85364B15866ED968CF356D731E852CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e70cd5ae8e71fdc4ddb1a5f61e998b26014e5a0e4980b6d68f295e2349e67738
                                                                  • Instruction ID: f32fc666b44c8b63ef1ed9e18e7117184f831d85eff579edb05ed7aa05bfaa38
                                                                  • Opcode Fuzzy Hash: e70cd5ae8e71fdc4ddb1a5f61e998b26014e5a0e4980b6d68f295e2349e67738
                                                                  • Instruction Fuzzy Hash: 69A18931A002499FCF16CFE8C884ADEBFB2FF89310F14846AE945AF265D774A845CB54
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: edd8191510fbf3b64f9ce9c3ed5d8f5714ccb2a21d494f225a6f39900a557bcc
                                                                  • Instruction ID: c2f7c917b2d4fe30019a4c48c4e7007d05d4b1052c92b6548bef607d0d285741
                                                                  • Opcode Fuzzy Hash: edd8191510fbf3b64f9ce9c3ed5d8f5714ccb2a21d494f225a6f39900a557bcc
                                                                  • Instruction Fuzzy Hash: 77717E30B002199FD728ABB9C99876EBAE7BFC5704F24886DD0469F3A4DA759C41C781
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9ff30804008b85f13c15d755699376d0ddf8788fd3428cab40a714da7887a13
                                                                  • Instruction ID: 98185191692bcd5347912b333ffb785ec1805e2f79b13f657a65caafb822c655
                                                                  • Opcode Fuzzy Hash: b9ff30804008b85f13c15d755699376d0ddf8788fd3428cab40a714da7887a13
                                                                  • Instruction Fuzzy Hash: 84613570E007598FDF12CFE9C5406AEBBF2BF89700F24865AE855AF242D770A985CB50
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: df1cfc86170f92d761692a097a3dcb7544d45d98561b1930da67a658e663b27e
                                                                  • Instruction ID: 48ebfb3f89ee95fd1d083a56fdb2ffbf775b1a5929e0a61f0b3ad4fceaea632b
                                                                  • Opcode Fuzzy Hash: df1cfc86170f92d761692a097a3dcb7544d45d98561b1930da67a658e663b27e
                                                                  • Instruction Fuzzy Hash: 2C618F78E00318CFDB64EFB4D89899DBBB6BF48305F50456AE81AA7358DB349942CF50
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0de9e28fcb39b96e0f5c11f1489df0858f3d6b8e6d0c6c6c456a94e309891c0e
                                                                  • Instruction ID: 53e182f0007275b2ba07843704141569877bd9bb3c98d09f97d0967f24c35ac1
                                                                  • Opcode Fuzzy Hash: 0de9e28fcb39b96e0f5c11f1489df0858f3d6b8e6d0c6c6c456a94e309891c0e
                                                                  • Instruction Fuzzy Hash: 27419330B002095FEB14ABA8D994B6EB6F7BBD5704F24886DE405EF295CA75CC418791
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4ac01d505db1d7a032938c8e7e64694eaa0711c99f54efe27a6b2d7febb1d84a
                                                                  • Instruction ID: be39ee4be125b64903eae3d1916f318092fbd5a07063f6f7fe9489333cae4a92
                                                                  • Opcode Fuzzy Hash: 4ac01d505db1d7a032938c8e7e64694eaa0711c99f54efe27a6b2d7febb1d84a
                                                                  • Instruction Fuzzy Hash: A5514871E007499FDF12CFE9C5406AEBBF2BF89710F24465AE845AF242D770A985CB40
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 42fb4241f29a3b8bf880a68ad298376117a9ab66e81122dbe6f0ead22ae8b289
                                                                  • Instruction ID: 6e2a2ce2b8dabb5c0d157b35cba14499e6995e23e55bfe55d65c6d02b84c0f29
                                                                  • Opcode Fuzzy Hash: 42fb4241f29a3b8bf880a68ad298376117a9ab66e81122dbe6f0ead22ae8b289
                                                                  • Instruction Fuzzy Hash: 8241AD30A04249DFCF12CFA8C884A9EBFB1BF49714F048459E955AF2A6D374E954CBA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1235f04777ab332675e57c4586ce8358e8572c5858510978fb7c455c785a6e4b
                                                                  • Instruction ID: 54de1151ad3d5cf22143e61bc6bd635e4d3f1d937c426010062fb8894c5be71c
                                                                  • Opcode Fuzzy Hash: 1235f04777ab332675e57c4586ce8358e8572c5858510978fb7c455c785a6e4b
                                                                  • Instruction Fuzzy Hash: 37319C31801A029FC314CFACCC85549BBAABE817B9355CB59E5B94F6E2C771E8528AD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fba56e64a921aa719f28c26018250a5379d28bdb1f5ff6c18e4ab007575fdead
                                                                  • Instruction ID: 8176ce94825215683dce64ec4fbbfbfd97495aa985036eaf259de2bd1b94146d
                                                                  • Opcode Fuzzy Hash: fba56e64a921aa719f28c26018250a5379d28bdb1f5ff6c18e4ab007575fdead
                                                                  • Instruction Fuzzy Hash: A931B370A053498FCB01CFE9E95469DBBF2FB85324F25846AD104DB351E735AC42CB55
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 18566e415696c920920fac145f7bbbeff9642ec6de10d769d4218e9ade62cb46
                                                                  • Instruction ID: f8df308586ed8d73dc75ae1c2af7d9634c6dbb703f3ad2375f870491fa9b15bc
                                                                  • Opcode Fuzzy Hash: 18566e415696c920920fac145f7bbbeff9642ec6de10d769d4218e9ade62cb46
                                                                  • Instruction Fuzzy Hash: C121CC34B04205CFC711DFA8D464A6A7BE2BF95B29F1584AED40ACF292EB35DC41CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2c8155aa42f0c47648fc2aabe1920487fb376c515dd50465b9e726f278d76460
                                                                  • Instruction ID: 5d6ee75fffe04d2f5720ca49060642471a363696dc45af4c0986d4ec94953bc8
                                                                  • Opcode Fuzzy Hash: 2c8155aa42f0c47648fc2aabe1920487fb376c515dd50465b9e726f278d76460
                                                                  • Instruction Fuzzy Hash: 6D218E31801A028FC314CFACCC85558BB66BF817B9759CB59D5B94F7D2C772E8528AD0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4141673326.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_138d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4fe525d403c45a5ad86edf7d6317f6d6ab544ca51736af81b5c7b04d84d78602
                                                                  • Instruction ID: 17b582227c59ba50c3b5ae452d7ab4cebdbec33e3f05d3f282252574df9fdf76
                                                                  • Opcode Fuzzy Hash: 4fe525d403c45a5ad86edf7d6317f6d6ab544ca51736af81b5c7b04d84d78602
                                                                  • Instruction Fuzzy Hash: 542122B1604304DFDB15EF98D984B26BFA5FB84318F20C56DD80A4B396C33AD447CA61
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 610312d75f7f6b6ed47d7e65eb10b90e72312835ddfad515e159ed0f51debb0a
                                                                  • Instruction ID: 87aac67b3183b773eed68b99f0e11a0dc63d09a0322cfd0713d471a9f7dd3df2
                                                                  • Opcode Fuzzy Hash: 610312d75f7f6b6ed47d7e65eb10b90e72312835ddfad515e159ed0f51debb0a
                                                                  • Instruction Fuzzy Hash: 62217674E00219DFEB24DFA6D956BAEBBF5BF44740F10402DE801AB284CB799941CBA0
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5579f2afa9c934cc90d07b947d253f4c175eba0845c2c0148ff2bbf1d2f191c6
                                                                  • Instruction ID: 645ef8c80a4350f6c0cef1dca267fa83f3ec9df3917ad565f005fb7d5af2eabe
                                                                  • Opcode Fuzzy Hash: 5579f2afa9c934cc90d07b947d253f4c175eba0845c2c0148ff2bbf1d2f191c6
                                                                  • Instruction Fuzzy Hash: B4217774E012489FDB05DFEAD550AEEBFB6FF48741F14802AE411AA250DB38D941DB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 92d6f63ac9755f91857eeef2ae992409063cd16e13bfb311beae2275daad3d68
                                                                  • Instruction ID: cd44819f4769092d522b1a90fc7876410356c000f4f62d5621cfc88bff47fa88
                                                                  • Opcode Fuzzy Hash: 92d6f63ac9755f91857eeef2ae992409063cd16e13bfb311beae2275daad3d68
                                                                  • Instruction Fuzzy Hash: C021E578E002099BDF24EFF8D85869DBBB1FF88300F10846AD51AA7258EB3459468F41
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 720ac6d560b4e8399693b0f8d9157aa7e46db026ea916724db713a4093cba5d0
                                                                  • Instruction ID: 37430250eb3652e4fadd661768a2b6de900edb9bbe0242b83a38e5b9a643d875
                                                                  • Opcode Fuzzy Hash: 720ac6d560b4e8399693b0f8d9157aa7e46db026ea916724db713a4093cba5d0
                                                                  • Instruction Fuzzy Hash: B911BE70A01219DFEB28EFA5D9556AEBBF5FF40740F10442DE801AB394CB789C41CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4141673326.000000000138D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0138D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_138d000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction ID: af53d568839933dc112eab31eca0de8df607c81ea012b28f3e35ef4ab21a8390
                                                                  • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                  • Instruction Fuzzy Hash: 7311BEB5504380CFDB12DF54D5C4B15BF61FB44318F24C6AAD8494B696C33AD40BCB61
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 57b753cc4c26bec54ba4fd0f7abe4d7dfd0924c2bda52f53ce0cb9eac05e340c
                                                                  • Instruction ID: f05e43c2ad2e0dcb217bfcd1d1fe589ffe4cb39fc8edad049fc4878a91fed9ae
                                                                  • Opcode Fuzzy Hash: 57b753cc4c26bec54ba4fd0f7abe4d7dfd0924c2bda52f53ce0cb9eac05e340c
                                                                  • Instruction Fuzzy Hash: A001D371A002199FCF08CF99D9458DEBBF9FF88310F01816AE905AB254DB359A19CB90
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 74c6405989f7b8cb34963b3cfb38dc2dc9c4dadeec89c97d6450b85fb47f7365
                                                                  • Instruction ID: c4181bb710b1cabac38c6d84cb9eac8980d1d03b80e95ebc57b58422c3c0695e
                                                                  • Opcode Fuzzy Hash: 74c6405989f7b8cb34963b3cfb38dc2dc9c4dadeec89c97d6450b85fb47f7365
                                                                  • Instruction Fuzzy Hash: 21F08272E042164F87509FA868451FE7BF9EAC9271B10083AD909D3204D67549528BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0c39c53f2a6d8db24ffe757a3a2ec85e358e31ada48f9e56df5e3b3e2c073ee4
                                                                  • Instruction ID: 0bfdc0e0527dc599c77397a131f91e6c67ed784637339d02b789fcd8c8910c08
                                                                  • Opcode Fuzzy Hash: 0c39c53f2a6d8db24ffe757a3a2ec85e358e31ada48f9e56df5e3b3e2c073ee4
                                                                  • Instruction Fuzzy Hash: ACE01271E042199F8B50ABADA8046AE7BF9EA88621B110476D609D3304E6704A018BD1
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8e90086cc1a06663108507a445f515ab5964ae4f8efbf359c5f24f345fc6c626
                                                                  • Instruction ID: a29e3677a1133a337c8bd8c14accb7860412a51864cafef1c07d4a1134854a9c
                                                                  • Opcode Fuzzy Hash: 8e90086cc1a06663108507a445f515ab5964ae4f8efbf359c5f24f345fc6c626
                                                                  • Instruction Fuzzy Hash: FDD0C905B516669E8F852EBE151023E04C63AC4293B608C6A6502CE2EAFC2CCA801255
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4731f6803d34fd56438afd2b5340030834c27d3ec3a2db8268e7ba17315bf5d1
                                                                  • Instruction ID: 08bf191982edc63babb2ef8fc8a858b390ab074aa68fd60693d1b13beda488cd
                                                                  • Opcode Fuzzy Hash: 4731f6803d34fd56438afd2b5340030834c27d3ec3a2db8268e7ba17315bf5d1
                                                                  • Instruction Fuzzy Hash: 1AC04C7544FBC26FC343477894500507FB06D0313035605D6C180C94A7D59D48958791
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 77feae0a15cf731329377b516f7db5e80c8a220b363959e51006f876f4dcbac3
                                                                  • Instruction ID: f0ff9655b10eb7f401bdd49e0ba572759a162163f7d0104df83485936f10e8fe
                                                                  • Opcode Fuzzy Hash: 77feae0a15cf731329377b516f7db5e80c8a220b363959e51006f876f4dcbac3
                                                                  • Instruction Fuzzy Hash: 70C09B31449680CFCF179734D5552513FB4AB86345F3540DF8485C955BD6A84555C713
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.4149527271.00000000015C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015C0000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_15c0000_qXLPL.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: Xbq$Xbq$Xbq$Xbq
                                                                  • API String ID: 0-2732225958
                                                                  • Opcode ID: 127a1d91ab4e144eab4b66b0e5ada4cb2b8cf56590ef82f6cdac4ced67d11d85
                                                                  • Instruction ID: 76ad8b2357c610863d428b6a19fa63ca290aff6cbbfea65913fd37a0195bb3af
                                                                  • Opcode Fuzzy Hash: 127a1d91ab4e144eab4b66b0e5ada4cb2b8cf56590ef82f6cdac4ced67d11d85
                                                                  • Instruction Fuzzy Hash: 1741AC30D0435D8FDB268FAC889436EBFB5BB81700F1440ADC5159B296EB748985CB92