Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8yprhxqBVs.exe

Overview

General Information

Sample name:8yprhxqBVs.exe
renamed because original name is a hash value
Original sample name:7acc6aaa73ad3bb7b36771f3c9311a0c.exe
Analysis ID:1464584
MD5:7acc6aaa73ad3bb7b36771f3c9311a0c
SHA1:da764b355b5f6c54f55ce7f1087de4b0de462478
SHA256:93255a8d0cd55878926f556e68a34cdc802c5316bd469f035a1a3481299ac133
Tags:32exetrojan
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Detected potential crypto function
Entry point lies outside standard sections
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 8yprhxqBVs.exe (PID: 7412 cmdline: "C:\Users\user\Desktop\8yprhxqBVs.exe" MD5: 7ACC6AAA73AD3BB7B36771F3C9311A0C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["deadtrainingactioniw.xyzn", "qualificationjdwko.xyz", "grandcommonyktsju.xyz", "wordingnatturedowo.xyz", "crisisrottenyjs.xyz", "sweetcalcutangkdow.xyz", "cooperatvassquaidmew.xyzn", "exuberanttjdkwo.xyz"], "Build id": "bOKHNM--"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:06/29/24-06:37:59.658353
    SID:2054129
    Source Port:54788
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.622454
    SID:2054123
    Source Port:52161
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.738932
    SID:2054117
    Source Port:56912
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.687585
    SID:2054125
    Source Port:52303
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.724299
    SID:2054119
    Source Port:64410
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.673048
    SID:2054127
    Source Port:55158
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.635221
    SID:2054131
    Source Port:55481
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:06/29/24-06:37:59.702795
    SID:2054121
    Source Port:53151
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 8yprhxqBVs.exe.7412.0.memstrminMalware Configuration Extractor: LummaC {"C2 url": ["deadtrainingactioniw.xyzn", "qualificationjdwko.xyz", "grandcommonyktsju.xyz", "wordingnatturedowo.xyz", "crisisrottenyjs.xyz", "sweetcalcutangkdow.xyz", "cooperatvassquaidmew.xyzn", "exuberanttjdkwo.xyz"], "Build id": "bOKHNM--"}
    Source: https://sweetcalcutangkdow.xyz/apiVirustotal: Detection: 5%Perma Link
    Source: 8yprhxqBVs.exeReversingLabs: Detection: 58%
    Source: 8yprhxqBVs.exeVirustotal: Detection: 28%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
    Source: 8yprhxqBVs.exeJoe Sandbox ML: detected
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: deadtrainingactioniw.xyzn
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: qualificationjdwko.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: grandcommonyktsju.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: wordingnatturedowo.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: crisisrottenyjs.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: sweetcalcutangkdow.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: cooperatvassquaidmew.xyzn
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: exuberanttjdkwo.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: wordingnatturedowo.xyz
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
    Source: 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString decryptor: bOKHNM--
    Source: 8yprhxqBVs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 8yprhxqBVs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esp]0_2_00EB4700
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then movzx ebx, di0_2_00EA8066
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_00EA8066
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then movzx ebx, di0_2_00EA8075
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_00EA8075
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then movzx ebx, di0_2_00EA8021
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_00EA8021
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_00E9E033
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov byte ptr [eax], bl0_2_00E8F000
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov byte ptr [ecx], al0_2_00E971AC
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp eax0_2_00E9E1AF
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, edi0_2_00E871A2
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], E4AA2089h0_2_00EA1170
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esi]0_2_00EA4149
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov word ptr [eax], dx0_2_00EA4149
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h0_2_00E924A8
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp ecx0_2_00EB94A9
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h0_2_00E92487
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov dword ptr [esi], eax0_2_00EA6490
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov dword ptr [esi], ecx0_2_00EA6490
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esi+68h]0_2_00EA6490
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov byte ptr [ebx], al0_2_00EA6490
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov edi, dword ptr [esi+04h]0_2_00EB8494
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ebx, eax0_2_00E83430
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov edx, dword ptr [esp+10h]0_2_00E89400
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00EA0410
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp eax0_2_00E8E5C7
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then cmp dword ptr [ebx+edi*8], 11081610h0_2_00E9F580
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_00EA5580
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then inc ebx0_2_00E95510
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [00EC4FE8h]0_2_00EB76C4
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]0_2_00EB8600
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_00EA5580
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp edx0_2_00E9D7DE
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_00EA67AF
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then lea ecx, dword ptr [esi+40h]0_2_00EA77A1
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp eax0_2_00E81787
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then lea ecx, dword ptr [esi+40h]0_2_00EA7731
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00E93737
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00EA48DF
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_00E978AF
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp edx0_2_00E9D84F
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov byte ptr [ebx], cl0_2_00EA684D
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov word ptr [ebx], cx0_2_00E9394D
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esp]0_2_00E89AD0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esp]0_2_00E89AD0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_00E8CCB0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_00E97864
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then cmp byte ptr [esi], 00000000h0_2_00E93C08
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp ecx0_2_00EB5D98
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov byte ptr [ecx], al0_2_00EA7D6E
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_00E93D70
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then cmp word ptr [edi+eax+02h], 0000h0_2_00E96D24
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esi+18h]0_2_00EA6EBE
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esi+18h]0_2_00EA6EB7
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp eax0_2_00E91FEF
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then movzx ebx, di0_2_00EA7F8F
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]0_2_00EA7F8F
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_00EAFF40
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov word ptr [eax], cx0_2_00EA1F23
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then mov ecx, dword ptr [esp+5Ch]0_2_00E95F09
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 4x nop then jmp eax0_2_00E9DF00

    Networking

    barindex
    Source: TrafficSnort IDS: 2054123 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (wordingnatturedowo .xyz) 192.168.2.4:52161 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054131 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (exuberanttjdkwo .xyz) 192.168.2.4:55481 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054129 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (cooperatvassquaidmew .xyz) 192.168.2.4:54788 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054127 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (sweetcalcutangkdow .xyz) 192.168.2.4:55158 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054125 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (crisisrottenyjs .xyz) 192.168.2.4:52303 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054121 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (grandcommonyktsju .xyz) 192.168.2.4:53151 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054119 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (qualificationjdwko .xyz) 192.168.2.4:64410 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2054117 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (deadtrainingactioniw .xyz) 192.168.2.4:56912 -> 1.1.1.1:53
    Source: Malware configuration extractorURLs: deadtrainingactioniw.xyzn
    Source: Malware configuration extractorURLs: qualificationjdwko.xyz
    Source: Malware configuration extractorURLs: grandcommonyktsju.xyz
    Source: Malware configuration extractorURLs: wordingnatturedowo.xyz
    Source: Malware configuration extractorURLs: crisisrottenyjs.xyz
    Source: Malware configuration extractorURLs: sweetcalcutangkdow.xyz
    Source: Malware configuration extractorURLs: cooperatvassquaidmew.xyzn
    Source: Malware configuration extractorURLs: exuberanttjdkwo.xyz
    Source: DNS query: wordingnatturedowo.xyz
    Source: DNS query: exuberanttjdkwo.xyz
    Source: DNS query: cooperatvassquaidmew.xyz
    Source: DNS query: sweetcalcutangkdow.xyz
    Source: DNS query: crisisrottenyjs.xyz
    Source: DNS query: grandcommonyktsju.xyz
    Source: DNS query: qualificationjdwko.xyz
    Source: DNS query: deadtrainingactioniw.xyz
    Source: unknownDNS traffic detected: query: grandcommonyktsju.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: deadtrainingactioniw.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: sweetcalcutangkdow.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: crisisrottenyjs.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: wordingnatturedowo.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: cooperatvassquaidmew.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: exuberanttjdkwo.xyz replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: qualificationjdwko.xyz replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: wordingnatturedowo.xyz
    Source: global trafficDNS traffic detected: DNS query: exuberanttjdkwo.xyz
    Source: global trafficDNS traffic detected: DNS query: cooperatvassquaidmew.xyz
    Source: global trafficDNS traffic detected: DNS query: sweetcalcutangkdow.xyz
    Source: global trafficDNS traffic detected: DNS query: crisisrottenyjs.xyz
    Source: global trafficDNS traffic detected: DNS query: grandcommonyktsju.xyz
    Source: global trafficDNS traffic detected: DNS query: qualificationjdwko.xyz
    Source: global trafficDNS traffic detected: DNS query: deadtrainingactioniw.xyz
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cooperatvassquaidmew.xyz/
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crisisrottenyjs.xyz/SOR
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693326538.000000000192E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crisisrottenyjs.xyz/api
    Source: 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001974000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/)G4
    Source: 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/api
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz/api(
    Source: 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001974000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001974000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://deadtrainingactioniw.xyz:443/api
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://exuberanttjdkwo.xyz/es(
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://grandcommonyktsju.xyz/B
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/a
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001952000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/api
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001952000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001952000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://qualificationjdwko.xyz/api4
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sweetcalcutangkdow.xyz/
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sweetcalcutangkdow.xyz/api
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693036124.00000000017A8000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://turbosms.ua
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wordingnatturedowo.xyz/
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693326538.000000000192E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wordingnatturedowo.xyz/api
    Source: 8yprhxqBVs.exe, 00000000.00000002.1693326538.000000000192E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://wordingnatturedowo.xyz/apisX
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EADC70 OpenClipboard,GetClipboardData,GlobalFix,GlobalUnWire,CloseClipboard,0_2_00EADC70
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EADC70 OpenClipboard,GetClipboardData,GlobalFix,GlobalUnWire,CloseClipboard,0_2_00EADC70
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E860AC0_2_00E860AC
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EB50700_2_00EB5070
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EA80750_2_00EA8075
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EA80210_2_00EA8021
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EA11700_2_00EA1170
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E882100_2_00E88210
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E8436F0_2_00E8436F
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EBA4100_2_00EBA410
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EA35F70_2_00EA35F7
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E865C00_2_00E865C0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EBA7300_2_00EBA730
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E9C8700_2_00E9C870
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EA58300_2_00EA5830
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E89AD00_2_00E89AD0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E85BF80_2_00E85BF8
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EB1DC00_2_00EB1DC0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E85D9D0_2_00E85D9D
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E84D600_2_00E84D60
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E9FECD0_2_00E9FECD
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E8EE600_2_00E8EE60
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EA7F8F0_2_00EA7F8F
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: String function: 00E89170 appears 131 times
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: String function: 00E88B50 appears 72 times
    Source: 8yprhxqBVs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@8/0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 8yprhxqBVs.exeReversingLabs: Detection: 58%
    Source: 8yprhxqBVs.exeVirustotal: Detection: 28%
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeFile read: C:\Users\user\Desktop\8yprhxqBVs.exeJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeSection loaded: msasn1.dllJump to behavior
    Source: 8yprhxqBVs.exeStatic file information: File size 6253568 > 1048576
    Source: 8yprhxqBVs.exeStatic PE information: Raw size of .vmp is bigger than: 0x100000 < 0x5ed400
    Source: 8yprhxqBVs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp
    Source: 8yprhxqBVs.exeStatic PE information: section name: .vmp
    Source: 8yprhxqBVs.exeStatic PE information: section name: .vmp
    Source: 8yprhxqBVs.exeStatic PE information: section name: .vmp
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00E8802D push eax; ret 0_2_00E88033

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 166BCC0
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 1374981
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 1740D60
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 11BDE75
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 1685F2E
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 133CA72
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 17818E2
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeAPI/Special instruction interceptor: Address: 11BA5AE
    Source: C:\Users\user\Desktop\8yprhxqBVs.exe TID: 7428Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\8yprhxqBVs.exe TID: 7428Thread sleep time: -30000s >= -30000sJump to behavior
    Source: 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllA
    Source: C:\Users\user\Desktop\8yprhxqBVs.exeCode function: 0_2_00EB6B90 LdrInitializeThunk,0_2_00EB6B90

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: deadtrainingactioniw.xyzn
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: qualificationjdwko.xyz
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: grandcommonyktsju.xyz
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: wordingnatturedowo.xyz
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: crisisrottenyjs.xyz
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: sweetcalcutangkdow.xyz
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: cooperatvassquaidmew.xyzn
    Source: 8yprhxqBVs.exe, 00000000.00000002.1690923515.0000000000EBB000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: exuberanttjdkwo.xyz

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts11
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol2
    Clipboard Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager11
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    8yprhxqBVs.exe58%ReversingLabsWin32.Spyware.Lummastealer
    8yprhxqBVs.exe28%VirustotalBrowse
    8yprhxqBVs.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    qualificationjdwko.xyz1%VirustotalBrowse
    deadtrainingactioniw.xyz1%VirustotalBrowse
    cooperatvassquaidmew.xyz1%VirustotalBrowse
    exuberanttjdkwo.xyz1%VirustotalBrowse
    grandcommonyktsju.xyz0%VirustotalBrowse
    wordingnatturedowo.xyz1%VirustotalBrowse
    crisisrottenyjs.xyz1%VirustotalBrowse
    sweetcalcutangkdow.xyz1%VirustotalBrowse
    SourceDetectionScannerLabelLink
    cooperatvassquaidmew.xyzn0%Avira URL Cloudsafe
    https://sweetcalcutangkdow.xyz/0%Avira URL Cloudsafe
    https://cooperatvassquaidmew.xyz/0%Avira URL Cloudsafe
    https://crisisrottenyjs.xyz/SOR0%Avira URL Cloudsafe
    https://qualificationjdwko.xyz/api0%Avira URL Cloudsafe
    https://sweetcalcutangkdow.xyz/api0%Avira URL Cloudsafe
    https://cooperatvassquaidmew.xyz/0%VirustotalBrowse
    grandcommonyktsju.xyz0%Avira URL Cloudsafe
    https://turbosms.ua0%Avira URL Cloudsafe
    exuberanttjdkwo.xyz0%Avira URL Cloudsafe
    grandcommonyktsju.xyz0%VirustotalBrowse
    https://sweetcalcutangkdow.xyz/api5%VirustotalBrowse
    qualificationjdwko.xyz0%Avira URL Cloudsafe
    https://deadtrainingactioniw.xyz:443/api0%Avira URL Cloudsafe
    https://deadtrainingactioniw.xyz/api0%Avira URL Cloudsafe
    https://turbosms.ua0%VirustotalBrowse
    https://qualificationjdwko.xyz/api4%VirustotalBrowse
    https://qualificationjdwko.xyz/0%Avira URL Cloudsafe
    qualificationjdwko.xyz1%VirustotalBrowse
    https://deadtrainingactioniw.xyz:443/api4%VirustotalBrowse
    https://deadtrainingactioniw.xyz/api4%VirustotalBrowse
    exuberanttjdkwo.xyz1%VirustotalBrowse
    https://wordingnatturedowo.xyz/0%Avira URL Cloudsafe
    https://crisisrottenyjs.xyz/api0%Avira URL Cloudsafe
    wordingnatturedowo.xyz0%Avira URL Cloudsafe
    https://deadtrainingactioniw.xyz/0%Avira URL Cloudsafe
    https://sweetcalcutangkdow.xyz/0%VirustotalBrowse
    https://wordingnatturedowo.xyz/apisX0%Avira URL Cloudsafe
    https://qualificationjdwko.xyz/0%VirustotalBrowse
    deadtrainingactioniw.xyzn0%Avira URL Cloudsafe
    wordingnatturedowo.xyz1%VirustotalBrowse
    https://exuberanttjdkwo.xyz/es(0%Avira URL Cloudsafe
    https://crisisrottenyjs.xyz/api4%VirustotalBrowse
    https://qualificationjdwko.xyz/api40%Avira URL Cloudsafe
    https://deadtrainingactioniw.xyz/0%VirustotalBrowse
    crisisrottenyjs.xyz0%Avira URL Cloudsafe
    https://wordingnatturedowo.xyz/api0%Avira URL Cloudsafe
    https://qualificationjdwko.xyz/a0%Avira URL Cloudsafe
    https://deadtrainingactioniw.xyz/api(0%Avira URL Cloudsafe
    https://deadtrainingactioniw.xyz/)G40%Avira URL Cloudsafe
    crisisrottenyjs.xyz1%VirustotalBrowse
    https://wordingnatturedowo.xyz/0%VirustotalBrowse
    sweetcalcutangkdow.xyz0%Avira URL Cloudsafe
    https://wordingnatturedowo.xyz/api4%VirustotalBrowse
    https://grandcommonyktsju.xyz/B0%Avira URL Cloudsafe
    sweetcalcutangkdow.xyz1%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    qualificationjdwko.xyz
    unknown
    unknowntrueunknown
    crisisrottenyjs.xyz
    unknown
    unknowntrueunknown
    deadtrainingactioniw.xyz
    unknown
    unknowntrueunknown
    grandcommonyktsju.xyz
    unknown
    unknowntrueunknown
    cooperatvassquaidmew.xyz
    unknown
    unknowntrueunknown
    sweetcalcutangkdow.xyz
    unknown
    unknowntrueunknown
    wordingnatturedowo.xyz
    unknown
    unknowntrueunknown
    exuberanttjdkwo.xyz
    unknown
    unknowntrueunknown
    NameMaliciousAntivirus DetectionReputation
    cooperatvassquaidmew.xyzntrue
    • Avira URL Cloud: safe
    unknown
    grandcommonyktsju.xyztrue
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    exuberanttjdkwo.xyztrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    qualificationjdwko.xyztrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    wordingnatturedowo.xyztrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    deadtrainingactioniw.xyzntrue
    • Avira URL Cloud: safe
    unknown
    crisisrottenyjs.xyztrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    sweetcalcutangkdow.xyztrue
    • 1%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://sweetcalcutangkdow.xyz/8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://cooperatvassquaidmew.xyz/8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://crisisrottenyjs.xyz/SOR8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://qualificationjdwko.xyz/api8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001952000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001952000.00000004.00000020.00020000.00000000.sdmpfalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://sweetcalcutangkdow.xyz/api8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpfalse
    • 5%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://turbosms.ua8yprhxqBVs.exe, 00000000.00000002.1693036124.00000000017A8000.00000002.00000001.01000000.00000003.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://deadtrainingactioniw.xyz/api8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001952000.00000004.00000020.00020000.00000000.sdmpfalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://deadtrainingactioniw.xyz:443/api8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001974000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001974000.00000004.00000020.00020000.00000000.sdmpfalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://qualificationjdwko.xyz/8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://wordingnatturedowo.xyz/8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://crisisrottenyjs.xyz/api8yprhxqBVs.exe, 00000000.00000002.1693326538.000000000192E000.00000004.00000020.00020000.00000000.sdmpfalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://deadtrainingactioniw.xyz/8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001974000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://wordingnatturedowo.xyz/apisX8yprhxqBVs.exe, 00000000.00000002.1693326538.000000000192E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://exuberanttjdkwo.xyz/es(8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://qualificationjdwko.xyz/api48yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001952000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001952000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://wordingnatturedowo.xyz/api8yprhxqBVs.exe, 00000000.00000002.1693326538.000000000192E000.00000004.00000020.00020000.00000000.sdmpfalse
    • 4%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://qualificationjdwko.xyz/a8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://deadtrainingactioniw.xyz/)G48yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://deadtrainingactioniw.xyz/api(8yprhxqBVs.exe, 00000000.00000002.1693473089.0000000001966000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001965000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://grandcommonyktsju.xyz/B8yprhxqBVs.exe, 00000000.00000002.1693446277.000000000194B000.00000004.00000020.00020000.00000000.sdmp, 8yprhxqBVs.exe, 00000000.00000003.1689828729.0000000001948000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1464584
    Start date and time:2024-06-29 06:37:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:1
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:8yprhxqBVs.exe
    renamed because original name is a hash value
    Original Sample Name:7acc6aaa73ad3bb7b36771f3c9311a0c.exe
    Detection:MAL
    Classification:mal100.troj.evad.winEXE@1/0@8/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 84%
    • Number of executed functions: 6
    • Number of non-executed functions: 71
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    TimeTypeDescription
    00:37:59API Interceptor2x Sleep call for process: 8yprhxqBVs.exe modified
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.889633564730536
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:8yprhxqBVs.exe
    File size:6'253'568 bytes
    MD5:7acc6aaa73ad3bb7b36771f3c9311a0c
    SHA1:da764b355b5f6c54f55ce7f1087de4b0de462478
    SHA256:93255a8d0cd55878926f556e68a34cdc802c5316bd469f035a1a3481299ac133
    SHA512:7b968b9e8bb606e27123c7b3db0453d19c008934abe7b703f042913fd939b9bd5b998efb14b5ee400ab50d9dc253e70f5ff2d120ccd0fcab7dd8c3b10a9412df
    SSDEEP:98304:btnghTODQMh/GM2q7cHv7llLoL9oZE1wFLB3O0Qmp8t8PQkBRd++Gcoww0:bTDQMdGM2qYHRoaZlygLbf
    TLSH:C15623892E9F10E7C9C218709717BBE733B764E209D68D35AAC1B4C9B0B2EB7305B155
    File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....{f..............................S...........@.......................... ......G.`...@.................................\......
    Icon Hash:697031130b964e0d
    Entrypoint:0x9314d9
    Entrypoint Section:.vmp
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x667BA692 [Wed Jun 26 05:26:42 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:d14e6dd016a88df925ed3c16879f3d29
    Instruction
    call 00007FD7C8E94A7Ch
    dec esi
    lea edx, dword ptr [eax+edx-2C226511h]
    inc ecx
    mov edi, F920DD8Ah
    inc edx
    mov ecx, dword ptr [eax+edx-2C22650Dh]
    dec eax
    lea edx, dword ptr [eax+eax*8+7216F0A4h]
    inc cx
    btr edi, edx
    xor ecx, edi
    ror ecx, 1
    dec esp
    lea ebp, dword ptr [edx+edx-1E4304F9h]
    inc ecx
    mov ebx, 6EA37FAFh
    lea ecx, dword ptr [ecx+eax-555F2437h]
    dec eax
    cdq
    inc esp
    movsx esi, dl
    inc ecx
    shr ch, FFFFFFC6h
    bswap ecx
    dec eax
    mov dword ptr [esp+eax-2C22650Dh], 00958108h
    neg ecx
    inc ecx
    sub eax, ebp
    inc ecx
    or ebx, 1F85A928h
    inc ecx
    inc esp
    add byte ptr [esp+edx+06h], bl
    dec eax
    idiv dword ptr [esp+eax-4BCC6E0Dh]
    dec eax
    mov dword ptr [esp+eax*2], edi
    inc bp
    or ebx, esi
    xor dword ptr [esp+eax*2], ecx
    pop edi
    dec ebp
    lea esp, dword ptr [esi-4966A75Eh]
    dec eax
    arpl cx, cx
    sal edx, FFFFFF8Fh
    cdq
    setb dl
    dec esp
    adc ecx, ecx
    dec eax
    mov ebp, dword ptr [ebx+eax*2]
    cwde
    inc sp
    imul esi, edx
    inc sp
    mov ebp, dword ptr [ebx+eax+08h]
    neg al
    jnc 00007FD7C8A3D296h
    dec ecx
    not esp
    dec esp
    lea ebx, dword ptr [5923B8A6h+ecx*8]
    dec eax
    add eax, dword ptr [esp+esi*2]
    inc esi
    or byte ptr [esp+edi-7D366693h], bl
    dec ecx
    xor edi, esp
    ror esi, 00000000h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x81e45c0x8c.vmp
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x9200000x618dc.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x91f0000x68c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x3300000xb4.vmp
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x39d440x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x3b0000x2a8b0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x3e0000x113f00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .vmp0x500000x2dfedc0x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .vmp0x3300000x23c0x4009c767db86a723e15ba871d21c882be0dFalse0.1708984375data1.152124137303384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .vmp0x3310000x5ed3300x5ed400796886b4f0f5fbf6d5ff5b6b6a9b07dcunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .reloc0x91f0000x68c0x800b871f3d59f43409cbe2ae9f5e06c6632False0.42333984375data3.6442815333402208IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x9200000x618dc0x880004c8a09bd5c47a2afa563c7f9f63d0b9False0.17839499080882354data2.9917502072872417IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    UNICODEDATA0x9286ac0x2feddataFrenchFrance0.03823529411764706
    UNICODEDATA0x92b69c0x2989emptyFrenchFrance0
    UNICODEDATA0x92e0280x462emptyFrenchFrance0
    UNICODEDATA0x92e48c0xf04emptyFrenchFrance0
    UNICODEDATA0x92f3900x22faemptyFrenchFrance0
    UNICODEDATA0x93168c0xc36emptyFrenchFrance0
    RT_CURSOR0x9322c40x134emptyRussianRussia0
    RT_CURSOR0x9323f80x134emptyArabicSaudi Arabia0
    RT_CURSOR0x93252c0x134emptyRussianRussia0
    RT_CURSOR0x9326600x134empty0
    RT_CURSOR0x9327940x134empty0
    RT_CURSOR0x9328c80x2ecempty0
    RT_CURSOR0x932bb40x2ecempty0
    RT_CURSOR0x932ea00x2ecempty0
    RT_CURSOR0x93318c0x2ecempty0
    RT_CURSOR0x9334780x2ecempty0
    RT_CURSOR0x9337640x2ecempty0
    RT_CURSOR0x933a500x2ecempty0
    RT_CURSOR0x933d3c0x2ecempty0
    RT_CURSOR0x9340280x2ecempty0
    RT_CURSOR0x9343140x2ecempty0
    RT_CURSOR0x9346000x134empty0
    RT_CURSOR0x9347340x134empty0
    RT_CURSOR0x9348680x134empty0
    RT_CURSOR0x93499c0x134empty0
    RT_CURSOR0x934ad00x134empty0
    RT_CURSOR0x934c040x134empty0
    RT_CURSOR0x934d380x134empty0
    RT_BITMAP0x934e6c0x1d0empty0
    RT_BITMAP0x93503c0x1e4empty0
    RT_BITMAP0x9352200x1d0empty0
    RT_BITMAP0x9353f00x1d0empty0
    RT_BITMAP0x9355c00x1d0empty0
    RT_BITMAP0x9357900x1d0empty0
    RT_BITMAP0x9359600x1d0empty0
    RT_BITMAP0x935b300x1d0empty0
    RT_BITMAP0x935d000x1d0empty0
    RT_BITMAP0x935ed00x1d0empty0
    RT_BITMAP0x9360a00x5cempty0
    RT_BITMAP0x9360fc0x5cempty0
    RT_BITMAP0x9361580x5cempty0
    RT_BITMAP0x9361b40x5cempty0
    RT_BITMAP0x9362100x94emptyRussianRussia0
    RT_BITMAP0x9362a40x5cempty0
    RT_BITMAP0x9363000x5cempty0
    RT_BITMAP0x93635c0x5cempty0
    RT_BITMAP0x9363b80x5cempty0
    RT_BITMAP0x9364140x5cempty0
    RT_BITMAP0x9364700x5cempty0
    RT_BITMAP0x9364cc0x138empty0
    RT_BITMAP0x9366040x138empty0
    RT_BITMAP0x93673c0x138empty0
    RT_BITMAP0x9368740x138empty0
    RT_BITMAP0x9369ac0x138empty0
    RT_BITMAP0x936ae40x138empty0
    RT_BITMAP0x936c1c0x104empty0
    RT_BITMAP0x936d200x138empty0
    RT_BITMAP0x936e580x104empty0
    RT_BITMAP0x936f5c0x138empty0
    RT_BITMAP0x9370940xb0emptyRussianRussia0
    RT_BITMAP0x9371440xb0emptyRussianRussia0
    RT_BITMAP0x9371f40xe8empty0
    RT_BITMAP0x9372dc0xce8empty0
    RT_BITMAP0x937fc40xce8empty0
    RT_BITMAP0x938cac0xce8empty0
    RT_BITMAP0x9399940x268empty0
    RT_BITMAP0x939bfc0x268empty0
    RT_BITMAP0x939e640x268empty0
    RT_BITMAP0x93a0cc0xce8empty0
    RT_BITMAP0x93adb40xce8empty0
    RT_BITMAP0x93ba9c0xd28empty0
    RT_BITMAP0x93c7c40x4b2aempty0
    RT_BITMAP0x9412f00x126empty0
    RT_BITMAP0x9414180x126empty0
    RT_ICON0x923e000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.25902527075812276
    RT_ICON0x9246a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.25767148014440433
    RT_ICON0x924f500x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.24954873646209386
    RT_ICON0x9257f80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.2477436823104693
    RT_ICON0x9260a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.2477436823104693
    RT_ICON0x9269480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.2463898916967509
    RT_ICON0x9271f00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.259927797833935
    RT_ICON0x927a980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024RussianRussia0.2612815884476534
    RT_DIALOG0x9415400x52empty0
    RT_STRING0x9415940x260empty0
    RT_STRING0x9417f40x210empty0
    RT_STRING0x941a040x30cempty0
    RT_STRING0x941d100x324empty0
    RT_STRING0x9420340x444empty0
    RT_STRING0x9424780x3d0empty0
    RT_STRING0x9428480x3ecempty0
    RT_STRING0x942c340x290empty0
    RT_STRING0x942ec40x2d0empty0
    RT_STRING0x9431940x498empty0
    RT_STRING0x94362c0x2b8empty0
    RT_STRING0x9438e40x2d0empty0
    RT_STRING0x943bb40x36cempty0
    RT_STRING0x943f200x5b0empty0
    RT_STRING0x9444d00x35cempty0
    RT_STRING0x94482c0x4fcempty0
    RT_STRING0x944d280x1220empty0
    RT_STRING0x945f480x90cempty0
    RT_STRING0x9468540x994empty0
    RT_STRING0x9471e80x93cempty0
    RT_STRING0x947b240x65cempty0
    RT_STRING0x9481800x210empty0
    RT_STRING0x9483900x49cempty0
    RT_STRING0x94882c0x418empty0
    RT_STRING0x948c440x3ccempty0
    RT_STRING0x9490100x430empty0
    RT_STRING0x9494400x418empty0
    RT_STRING0x9498580x378empty0
    RT_STRING0x949bd00x3b4empty0
    RT_STRING0x949f840x2e8empty0
    RT_STRING0x94a26c0x448empty0
    RT_STRING0x94a6b40x390empty0
    RT_STRING0x94aa440x4c8empty0
    RT_STRING0x94af0c0x808empty0
    RT_STRING0x94b7140x570empty0
    RT_STRING0x94bc840x6f8empty0
    RT_STRING0x94c37c0x824empty0
    RT_STRING0x94cba00x6a0empty0
    RT_STRING0x94d2400x87cempty0
    RT_STRING0x94dabc0x94cempty0
    RT_STRING0x94e4080x414empty0
    RT_STRING0x94e81c0x27cempty0
    RT_STRING0x94ea980x20cempty0
    RT_STRING0x94eca40x3ecempty0
    RT_STRING0x94f0900x3dcempty0
    RT_STRING0x94f46c0x4ecempty0
    RT_STRING0x94f9580x66cempty0
    RT_STRING0x94ffc40x70cempty0
    RT_STRING0x9506d00x398empty0
    RT_STRING0x950a680x218empty0
    RT_STRING0x950c800x25cempty0
    RT_STRING0x950edc0x474empty0
    RT_STRING0x9513500x4b8empty0
    RT_STRING0x9518080x2fcempty0
    RT_STRING0x951b040x1ecempty0
    RT_STRING0x951cf00x13cempty0
    RT_STRING0x951e2c0x46cempty0
    RT_STRING0x9522980xcccempty0
    RT_STRING0x952f640x470empty0
    RT_STRING0x9533d40xc0empty0
    RT_STRING0x9534940x104empty0
    RT_STRING0x9535980x1a4empty0
    RT_STRING0x95373c0x448empty0
    RT_STRING0x953b840x3c0empty0
    RT_STRING0x953f440x574empty0
    RT_STRING0x9544b80x380empty0
    RT_STRING0x9548380x5b8empty0
    RT_STRING0x954df00x86cempty0
    RT_STRING0x95565c0xcd0empty0
    RT_STRING0x95632c0xb3cempty0
    RT_STRING0x956e680x898empty0
    RT_STRING0x9577000x6bcempty0
    RT_STRING0x957dbc0x838empty0
    RT_STRING0x9585f40xbc8empty0
    RT_STRING0x9591bc0xd78empty0
    RT_STRING0x959f340x6ccempty0
    RT_STRING0x95a6000x57cempty0
    RT_STRING0x95ab7c0xc94empty0
    RT_STRING0x95b8100x9f0empty0
    RT_STRING0x95c2000x990empty0
    RT_STRING0x95cb900x9a4empty0
    RT_STRING0x95d5340x7e4empty0
    RT_STRING0x95dd180xc64empty0
    RT_STRING0x95e97c0x9bcempty0
    RT_STRING0x95f3380xa34empty0
    RT_STRING0x95fd6c0xe44empty0
    RT_STRING0x960bb00x8b4empty0
    RT_STRING0x9614640xbc8empty0
    RT_STRING0x96202c0x544empty0
    RT_STRING0x9625700x760empty0
    RT_STRING0x962cd00x5d4empty0
    RT_STRING0x9632a40x888empty0
    RT_STRING0x963b2c0x7d0empty0
    RT_STRING0x9642fc0x290empty0
    RT_STRING0x96458c0x7dcempty0
    RT_STRING0x964d680x8a4empty0
    RT_STRING0x96560c0x7e0empty0
    RT_STRING0x965dec0x91cempty0
    RT_STRING0x9667080xa28empty0
    RT_STRING0x9671300x5d0empty0
    RT_STRING0x9677000x3e0empty0
    RT_STRING0x967ae00x3a4empty0
    RT_STRING0x967e840x404empty0
    RT_STRING0x9682880x234empty0
    RT_STRING0x9684bc0xecempty0
    RT_STRING0x9685a80x1f0empty0
    RT_STRING0x9687980x428empty0
    RT_STRING0x968bc00x3bcempty0
    RT_STRING0x968f7c0x2fcempty0
    RT_STRING0x9692780x358empty0
    RT_RCDATA0x9695d00x10empty0
    RT_RCDATA0x9695e00x15acempty0
    RT_RCDATA0x96ab8c0x19caempty0
    RT_RCDATA0x96c5580x79fempty0
    RT_RCDATA0x96ccf80x2bd7empty0
    RT_RCDATA0x96f8d00x3adempty0
    RT_RCDATA0x96fc800xda2empty0
    RT_RCDATA0x970a240x3d9empty0
    RT_RCDATA0x970e000x30dempty0
    RT_RCDATA0x9711100xab5empty0
    RT_RCDATA0x971bc80x5abempty0
    RT_RCDATA0x9721740xc11empty0
    RT_RCDATA0x972d880xb34empty0
    RT_RCDATA0x9738bc0x562empty0
    RT_RCDATA0x973e200x3b8empty0
    RT_RCDATA0x9741d80x3f6empty0
    RT_RCDATA0x9745d00x85eempty0
    RT_RCDATA0x974e300x84dempty0
    RT_RCDATA0x9756800xcceempty0
    RT_RCDATA0x9763500x5e2empty0
    RT_RCDATA0x9769340x25cempty0
    RT_RCDATA0x976b900x4d5empty0
    RT_RCDATA0x9770680x3ccempty0
    RT_RCDATA0x9774340xe74empty0
    RT_RCDATA0x9782a80x2912empty0
    RT_RCDATA0x97abbc0x14dbempty0
    RT_RCDATA0x97c0980x1245empty0
    RT_RCDATA0x97d2e00xbfeempty0
    RT_RCDATA0x97dee00xa55empty0
    RT_RCDATA0x97e9380x3b1empty0
    RT_RCDATA0x97ecec0xa56empty0
    RT_RCDATA0x97f7440xa53empty0
    RT_RCDATA0x9801980x783empty0
    RT_RCDATA0x98091c0x14aempty0
    RT_RCDATA0x980a680x461empty0
    RT_RCDATA0x980ecc0x494empty0
    RT_RCDATA0x9813600x3c4empty0
    RT_GROUP_CURSOR0x9817240x14emptyRussianRussia0
    RT_GROUP_CURSOR0x9817380x14emptyArabicSaudi Arabia0
    RT_GROUP_CURSOR0x98174c0x14emptyRussianRussia0
    RT_GROUP_CURSOR0x9817600x14empty0
    RT_GROUP_CURSOR0x9817740x14empty0
    RT_GROUP_CURSOR0x9817880x14empty0
    RT_GROUP_CURSOR0x98179c0x14empty0
    RT_GROUP_CURSOR0x9817b00x14empty0
    RT_GROUP_CURSOR0x9817c40x14empty0
    RT_GROUP_CURSOR0x9817d80x14empty0
    RT_GROUP_CURSOR0x9817ec0x14empty0
    RT_GROUP_CURSOR0x9818000x14empty0
    RT_GROUP_CURSOR0x9818140x14empty0
    RT_GROUP_CURSOR0x9818280x14empty0
    RT_GROUP_CURSOR0x98183c0x14empty0
    RT_GROUP_CURSOR0x9818500x14empty0
    RT_GROUP_CURSOR0x9818640x14empty0
    RT_GROUP_CURSOR0x9818780x14empty0
    RT_GROUP_CURSOR0x98188c0x14empty0
    RT_GROUP_CURSOR0x9818a00x14empty0
    RT_GROUP_CURSOR0x9818b40x14empty0
    RT_GROUP_CURSOR0x9818c80x14empty0
    RT_GROUP_ICON0x9283400x14dataRussianRussia1.25
    RT_GROUP_ICON0x9283540x14dataRussianRussia1.25
    RT_GROUP_ICON0x9283680x14dataRussianRussia1.25
    RT_GROUP_ICON0x92837c0x14dataRussianRussia1.25
    RT_GROUP_ICON0x9283900x14dataRussianRussia1.25
    RT_GROUP_ICON0x9283a40x14dataRussianRussia1.25
    RT_GROUP_ICON0x9283b80x14dataRussianRussia1.2
    RT_GROUP_ICON0x9283cc0x14dataRussianRussia1.25
    RT_MANIFEST0x9283e00x2caXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5028011204481793
    DLLImport
    KERNEL32.dllExitProcess, GetCurrentProcessId, GetCurrentThreadId, GetLogicalDrives, GetSystemDirectoryW, GlobalLock, GlobalUnlock
    ole32.dllCoCreateInstance, CoInitializeEx, CoInitializeSecurity, CoSetProxyBlanket, CoUninitialize
    OLEAUT32.dllSysAllocString, SysFreeString, SysStringLen, VariantClear, VariantInit
    USER32.dllCloseClipboard, GetClipboardData, GetDC, GetSystemMetrics, GetWindowLongW, OpenClipboard, ReleaseDC
    GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, DeleteDC, DeleteObject, GetCurrentObject, GetDIBits, GetObjectW, SelectObject
    KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, GetModuleHandleA, LoadLibraryA, GetProcAddress
    Language of compilation systemCountry where language is spokenMap
    FrenchFrance
    RussianRussia
    ArabicSaudi Arabia
    EnglishUnited States
    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    06/29/24-06:37:59.658353UDP2054129ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (cooperatvassquaidmew .xyz)5478853192.168.2.41.1.1.1
    06/29/24-06:37:59.622454UDP2054123ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (wordingnatturedowo .xyz)5216153192.168.2.41.1.1.1
    06/29/24-06:37:59.738932UDP2054117ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (deadtrainingactioniw .xyz)5691253192.168.2.41.1.1.1
    06/29/24-06:37:59.687585UDP2054125ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (crisisrottenyjs .xyz)5230353192.168.2.41.1.1.1
    06/29/24-06:37:59.724299UDP2054119ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (qualificationjdwko .xyz)6441053192.168.2.41.1.1.1
    06/29/24-06:37:59.673048UDP2054127ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (sweetcalcutangkdow .xyz)5515853192.168.2.41.1.1.1
    06/29/24-06:37:59.635221UDP2054131ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (exuberanttjdkwo .xyz)5548153192.168.2.41.1.1.1
    06/29/24-06:37:59.702795UDP2054121ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (grandcommonyktsju .xyz)5315153192.168.2.41.1.1.1
    TimestampSource PortDest PortSource IPDest IP
    Jun 29, 2024 06:37:59.622453928 CEST5216153192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.631309986 CEST53521611.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.635221004 CEST5548153192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.655337095 CEST53554811.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.658353090 CEST5478853192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.670190096 CEST53547881.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.673048019 CEST5515853192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.684755087 CEST53551581.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.687585115 CEST5230353192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.700440884 CEST53523031.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.702795029 CEST5315153192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.722750902 CEST53531511.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.724298954 CEST6441053192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.736095905 CEST53644101.1.1.1192.168.2.4
    Jun 29, 2024 06:37:59.738931894 CEST5691253192.168.2.41.1.1.1
    Jun 29, 2024 06:37:59.753070116 CEST53569121.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jun 29, 2024 06:37:59.622453928 CEST192.168.2.41.1.1.10xe006Standard query (0)wordingnatturedowo.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.635221004 CEST192.168.2.41.1.1.10x6efeStandard query (0)exuberanttjdkwo.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.658353090 CEST192.168.2.41.1.1.10xd9eStandard query (0)cooperatvassquaidmew.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.673048019 CEST192.168.2.41.1.1.10x9f9bStandard query (0)sweetcalcutangkdow.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.687585115 CEST192.168.2.41.1.1.10x783eStandard query (0)crisisrottenyjs.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.702795029 CEST192.168.2.41.1.1.10x5647Standard query (0)grandcommonyktsju.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.724298954 CEST192.168.2.41.1.1.10xa6c8Standard query (0)qualificationjdwko.xyzA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.738931894 CEST192.168.2.41.1.1.10x3b8cStandard query (0)deadtrainingactioniw.xyzA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jun 29, 2024 06:37:59.631309986 CEST1.1.1.1192.168.2.40xe006Name error (3)wordingnatturedowo.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.655337095 CEST1.1.1.1192.168.2.40x6efeName error (3)exuberanttjdkwo.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.670190096 CEST1.1.1.1192.168.2.40xd9eName error (3)cooperatvassquaidmew.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.684755087 CEST1.1.1.1192.168.2.40x9f9bName error (3)sweetcalcutangkdow.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.700440884 CEST1.1.1.1192.168.2.40x783eName error (3)crisisrottenyjs.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.722750902 CEST1.1.1.1192.168.2.40x5647Name error (3)grandcommonyktsju.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.736095905 CEST1.1.1.1192.168.2.40xa6c8Name error (3)qualificationjdwko.xyznonenoneA (IP address)IN (0x0001)false
    Jun 29, 2024 06:37:59.753070116 CEST1.1.1.1192.168.2.40x3b8cName error (3)deadtrainingactioniw.xyznonenoneA (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:00:37:58
    Start date:29/06/2024
    Path:C:\Users\user\Desktop\8yprhxqBVs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\8yprhxqBVs.exe"
    Imagebase:0xe80000
    File size:6'253'568 bytes
    MD5 hash:7ACC6AAA73AD3BB7B36771F3C9311A0C
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:2.6%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:21.7%
      Total number of Nodes:46
      Total number of Limit Nodes:2
      execution_graph 10660 eb0b0b 10661 eb0b10 10660->10661 10661->10661 10662 eb0c0f 10661->10662 10664 eb6b90 LdrInitializeThunk 10661->10664 10664->10662 10665 e890e0 10668 e890e9 10665->10668 10666 e890fa ExitProcess 10668->10666 10671 e89105 10668->10671 10672 e8a1b0 10668->10672 10676 eb6a30 10671->10676 10673 e8a2bc LoadLibraryExW 10672->10673 10674 e8a26e 10672->10674 10675 e8a2ee 10673->10675 10674->10673 10675->10671 10679 eb8360 10676->10679 10678 eb6a35 FreeLibrary 10678->10666 10680 eb8369 10679->10680 10680->10678 10712 eb6fd2 10714 eb702a 10712->10714 10713 eb709e 10714->10713 10716 eb6b90 LdrInitializeThunk 10714->10716 10716->10713 10717 eb74f1 10718 eb74f0 10717->10718 10718->10717 10721 eb74fe 10718->10721 10724 eb6b90 LdrInitializeThunk 10718->10724 10720 eb75de 10721->10720 10723 eb6b90 LdrInitializeThunk 10721->10723 10723->10720 10724->10721 10681 eb4660 10682 eb4666 RtlAllocateHeap 10681->10682 10683 eb4700 10684 eb472c 10683->10684 10685 eb4770 RtlFreeHeap 10683->10685 10684->10685 10686 eb1c27 10687 eb1c35 10686->10687 10690 eb9ca0 10687->10690 10691 eb9cd0 10690->10691 10691->10691 10694 eb9d3e 10691->10694 10696 eb6b90 LdrInitializeThunk 10691->10696 10692 eb1c5f 10694->10692 10697 eb6b90 LdrInitializeThunk 10694->10697 10696->10694 10697->10692 10703 eb0ca4 10704 eb0ca9 10703->10704 10707 eb9840 10704->10707 10706 eb0cd9 10709 eb9860 10707->10709 10708 eb999e 10708->10706 10709->10708 10711 eb6b90 LdrInitializeThunk 10709->10711 10711->10708

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 67 eb4700-eb472a 68 eb472c-eb472f 67->68 69 eb4770-eb4796 RtlFreeHeap 67->69 70 eb4730-eb476e 68->70 70->69 70->70
      APIs
      • RtlFreeHeap.NTDLL(?,00000000), ref: 00EB477D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: FreeHeap
      • String ID: vA@C$|:
      • API String ID: 3298025750-3337658132
      • Opcode ID: bfac9b60e06c0d1f3a8f83a0c2316ad9483a0d44edd2aa060ddc2a76bbbf99f9
      • Instruction ID: 7fe8443037e7664b94d50f91f555de3f9633e4f88fd93d3546c376445a43f272
      • Opcode Fuzzy Hash: bfac9b60e06c0d1f3a8f83a0c2316ad9483a0d44edd2aa060ddc2a76bbbf99f9
      • Instruction Fuzzy Hash: BB11397420C2818FD309DF18D8A0B6AFBF6EB95708F249A2CD5D6573E1CB319815CB86

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 193 eb6b90-eb6bb8 LdrInitializeThunk
      APIs
      • LdrInitializeThunk.NTDLL(00EB99CC,?,00000006,?,?,00000018,1C1D1E1F,?,ZW), ref: 00EB6BB6
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
      • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
      • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
      • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 71 e890e0-e890f8 call e89170 call eb5bb0 76 e890fa 71->76 77 e890fc-e89103 call eaffd0 71->77 78 e8913d-e89149 ExitProcess 76->78 81 e89105 77->81 82 e89107 call e8a1b0 77->82 83 e89136 call eb6a30 81->83 85 e8910c-e8910e 82->85 89 e8913b 83->89 87 e89110 85->87 88 e89112-e8912f call e89150 call e8f000 call e8b150 85->88 90 e89134 87->90 88->90 89->78 90->83
      APIs
      Strings
      • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 00E89112
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: ExitProcess
      • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
      • API String ID: 621844428-780655312
      • Opcode ID: 6ef4a8805e6ff63eb3c4cb05ff37e6d8b68c57f7b1a1f0f5ceed92c3e2e53f86
      • Instruction ID: 5482005bc218ca0f5f14b4854445a819103a80fbc775547bc583d5d2d1ed5d05
      • Opcode Fuzzy Hash: 6ef4a8805e6ff63eb3c4cb05ff37e6d8b68c57f7b1a1f0f5ceed92c3e2e53f86
      • Instruction Fuzzy Hash: ACF0A770C0F21199CA1037B45A4F3BE36F45F11754F1A7522F98E31113FA2C4408A3A3

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 121 e8a1b0-e8a26c 122 e8a2bc-e8a2f0 LoadLibraryExW call eb5b70 121->122 123 e8a26e-e8a274 121->123 128 e8a301-e8a4a0 call eb8b50 * 12 122->128 129 e8a2f2-e8a2fc 122->129 124 e8a276-e8a2b2 123->124 124->124 126 e8a2b4-e8a2ba 124->126 126->122 156 e8a4a2-e8a4a6 128->156 130 e8a5f9-e8a60a 129->130 157 e8a4a8-e8a4ae 156->157 158 e8a4b3-e8a4e1 call eb2d50 156->158 159 e8a5ea-e8a5ed 157->159 163 e8a4e3-e8a4ed 158->163 159->130 161 e8a5ef-e8a5f3 159->161 161->130 163->163 164 e8a4ef-e8a50a 163->164 165 e8a56a-e8a575 call e8a610 164->165 166 e8a50c-e8a514 164->166 171 e8a57a-e8a57f 165->171 167 e8a516-e8a519 166->167 169 e8a51b-e8a51d 167->169 170 e8a51f-e8a565 call e8ee60 167->170 172 e8a567 169->172 170->167 170->172 174 e8a581-e8a5be 171->174 175 e8a583-e8a5b0 call e8b110 171->175 172->165 179 e8a5c0-e8a5c5 174->179 175->179 183 e8a5cd-e8a5d4 179->183 184 e8a5c7 179->184 186 e8a5e8 183->186 187 e8a5d6-e8a5e3 183->187 184->183 186->159 187->156
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: LibraryLoad
      • String ID:
      • API String ID: 1029625771-0
      • Opcode ID: 31d49542ccab4ece9857e2154fb049d5873bee76e9d656f0da7314c5de4194ec
      • Instruction ID: 8aa0e61ca29cb507dc13dc0e2c6e80f90e023f1eef3b804708e6013ac71559d3
      • Opcode Fuzzy Hash: 31d49542ccab4ece9857e2154fb049d5873bee76e9d656f0da7314c5de4194ec
      • Instruction Fuzzy Hash: A5E1C0B1504B40CFD320EF39E98565ABFE0AB15314F088A6ED4DDAB792E731A449CB53

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 191 eb4660-eb4689 RtlAllocateHeap
      APIs
      • RtlAllocateHeap.NTDLL(?,00000000,?,?,00000000), ref: 00EB4674
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: AllocateHeap
      • String ID:
      • API String ID: 1279760036-0
      • Opcode ID: 4ac261ecf35a60ea8300762fb4432a25870a5f2f24a739fe553352768ef55cdd
      • Instruction ID: e841b0a0d6eb104e5b1badeb7fd3379f820ef5ad6b8b5ab2a9ad6a0088244637
      • Opcode Fuzzy Hash: 4ac261ecf35a60ea8300762fb4432a25870a5f2f24a739fe553352768ef55cdd
      • Instruction Fuzzy Hash: 3BC012202451406AD22887169C91FBF791AABD3A05F10801CA445152C0C62061038058

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 194 eb6a30-eb6a41 call eb8360 FreeLibrary
      APIs
      • FreeLibrary.KERNELBASE(00E8913B), ref: 00EB6A3B
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: FreeLibrary
      • String ID:
      • API String ID: 3664257935-0
      • Opcode ID: fb4fe095d0c677d1cbd4786202489364d1dbd0a3f82cfbd9806720303d9e4f69
      • Instruction ID: 50642eed4f33aae8f3ebfe3170d6d42c461d91f7525ad9ff8a329b163288f35d
      • Opcode Fuzzy Hash: fb4fe095d0c677d1cbd4786202489364d1dbd0a3f82cfbd9806720303d9e4f69
      • Instruction Fuzzy Hash: 5AA002745295849FCE026B6AEE1AD8B3AA5B7D1B437141070B44572132CF67141AEE08
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: "!g{$*$/9++$756.$KRUB$Z#$afd+$ck.{$p`ht$qlw6$xt2p$|gyz$~|mz
      • API String ID: 0-2687116054
      • Opcode ID: 44d148feb6a7c7ee06c7af6639e9c657f7cc6215e766b857b92672ffc5a4f573
      • Instruction ID: 12318db64782d053d61be8e30b89e4645dff22bae821c60475e6711870bbc95c
      • Opcode Fuzzy Hash: 44d148feb6a7c7ee06c7af6639e9c657f7cc6215e766b857b92672ffc5a4f573
      • Instruction Fuzzy Hash: 47A1B0B051C3808BDB25CF25C4907ABBBE2EFD6348F18995CE4C99B392D735844ACB52
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: U`aT$de$hVQl$hZYd$yA+$uw$y{
      • API String ID: 0-1977114858
      • Opcode ID: 74372037762ae296fe5e0d019d72d31067b54bc81e6c56eaada7e7956baeccbc
      • Instruction ID: 0b7db34468b4fc56206a9bf362b60e8d55f617a70edd5de45066c2780a0d64a2
      • Opcode Fuzzy Hash: 74372037762ae296fe5e0d019d72d31067b54bc81e6c56eaada7e7956baeccbc
      • Instruction Fuzzy Hash: 5BB152B15493C18BD331CF25C48879BBBE1BBC6348F184A6DD4DC6B255C3789A06CBA6
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: Clipboard$CloseDataOpen
      • String ID:
      • API String ID: 2058664381-0
      • Opcode ID: a526a68f7d12cab5c2a1dbc9f35aa34dda6cce249a0452fc1356c1c5b76beb6d
      • Instruction ID: c8a874bec928041e0019f675e43892cc57db6f174379434283922389169eb46c
      • Opcode Fuzzy Hash: a526a68f7d12cab5c2a1dbc9f35aa34dda6cce249a0452fc1356c1c5b76beb6d
      • Instruction Fuzzy Hash: 9A717E74508741CFC720DF28C984656BBE1EF5A320B248B9DE4DB9FB95D730A805DBA2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 0$N\KO$U^$X\
      • API String ID: 0-3470748801
      • Opcode ID: 9e45f3216b15aeaf05433f25fff08fd486631c7e2244673af0837365194dd7df
      • Instruction ID: 8e443fd5924b30f631df31db723a709c943661091d4f8e73837a5723b46f888e
      • Opcode Fuzzy Hash: 9e45f3216b15aeaf05433f25fff08fd486631c7e2244673af0837365194dd7df
      • Instruction Fuzzy Hash: A01256B16083819BD318EF28D490B6FBBE2FFD5308F18592DE0D99B252D7359806CB56
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: .x!h$D$hi$M
      • API String ID: 0-1457716288
      • Opcode ID: c15ab18f2095d522b0ca9b61e8363fb87713381a804b6689fa078904e518e777
      • Instruction ID: 57e5dcec36f1a7f207053579421700c52ef5b53124a726bbb14f207b30e372f1
      • Opcode Fuzzy Hash: c15ab18f2095d522b0ca9b61e8363fb87713381a804b6689fa078904e518e777
      • Instruction Fuzzy Hash: EEC134B02083808AE770DF14C8A6BDBBBE1FF85318F54590CE4C99B391D7BA5549CB96
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 1648$<>=8$> &>
      • API String ID: 0-3830843293
      • Opcode ID: b2b00891660ac5f61591d4943020528740cc97be1068b66db63b61b9719f0ad8
      • Instruction ID: 2cdfcdcc2b97fe0fd9d3dbedb5598567bb945d8510e29826da25011dfd5aa29a
      • Opcode Fuzzy Hash: b2b00891660ac5f61591d4943020528740cc97be1068b66db63b61b9719f0ad8
      • Instruction Fuzzy Hash: ACC1BC766083818FD724DF14C0917EBBBE2FB96340F18592DE48E9B382DB74A445CB92
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: *$AFr|$JBpp
      • API String ID: 0-2764207482
      • Opcode ID: 5acae142cb98e67e0bafb2dec1e5c4c8df9c83924799d23e106d1742ab102c41
      • Instruction ID: 21389dce4f333b16be15b3513bc8b19dd3eebe93d1ed7065009799c5fd85930a
      • Opcode Fuzzy Hash: 5acae142cb98e67e0bafb2dec1e5c4c8df9c83924799d23e106d1742ab102c41
      • Instruction Fuzzy Hash: FB71BE7190D3918BD311DF29C09071BFBE2EFD6718F188A8CE4D82B249D335990ACB96
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: X_$[[$]g
      • API String ID: 0-3867923182
      • Opcode ID: c75938adff79505ddf6449555818f969cf3db6c0a403131a2654096e1cba407e
      • Instruction ID: 30e392ade9f1848ce54da816e00fb40cfe11ae44615308f25d1b1f90c80617f5
      • Opcode Fuzzy Hash: c75938adff79505ddf6449555818f969cf3db6c0a403131a2654096e1cba407e
      • Instruction Fuzzy Hash: 45310EB02193819BD310EF05C880A5ABBF6FB86344F14AE1CE1D99B321D338C9028F57
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: Ap$}
      • API String ID: 0-1536016870
      • Opcode ID: 530f5486d0e740aa8c947d48d08ceb8e4a085865dc1a637ffb58c59f859d90fd
      • Instruction ID: a5a48b2f0264d323df71ca899299b37817a6b8b442f358db85f78c8825419659
      • Opcode Fuzzy Hash: 530f5486d0e740aa8c947d48d08ceb8e4a085865dc1a637ffb58c59f859d90fd
      • Instruction Fuzzy Hash: 7E427FB5600A419FD328CF29C851A16BBF1FF89310F644A1DE9E69BB85D730B816CBC5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: "$"
      • API String ID: 0-3758156766
      • Opcode ID: 0d478d159eb5e23174e8621513a1d7b01cacf184c68bedbbf88eb1d76ded9468
      • Instruction ID: 9b01ebdb6e7674620d474f4ac79482e2f182e4aca9b802b6a2cce7929aff86e4
      • Opcode Fuzzy Hash: 0d478d159eb5e23174e8621513a1d7b01cacf184c68bedbbf88eb1d76ded9468
      • Instruction Fuzzy Hash: FE020672608B119FC714CE24C49476FB7E5AFCA318F58992DE899AF381E734ED058781
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: )$IEND
      • API String ID: 0-707183367
      • Opcode ID: 7741ae9aeec12cd4cc7c7e1520e8acbd486ccd5c42e01384d1cd4eb09593b616
      • Instruction ID: 7f1e8511121636d9bf1bc60e0ca759f1d73160ed733ee06e5f957617e9f83811
      • Opcode Fuzzy Hash: 7741ae9aeec12cd4cc7c7e1520e8acbd486ccd5c42e01384d1cd4eb09593b616
      • Instruction Fuzzy Hash: 3EE1E1B2A087049FD714DF18C85179ABBE1FB84308F14952DF99DAB392DB74D909CB82
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID: fCA~$}@Ap
      • API String ID: 2994545307-3655289039
      • Opcode ID: 00c7591ac9335ac0cad74b4d690c366c212ddce1a1001bb394f7a5269c5247da
      • Instruction ID: 0c40bbb28015c73850c291886c3e33a651cf2db4aeb42fd501c80d3638ef3154
      • Opcode Fuzzy Hash: 00c7591ac9335ac0cad74b4d690c366c212ddce1a1001bb394f7a5269c5247da
      • Instruction Fuzzy Hash: 7ED123B5A083018BD714DF18C891B6BB7E2EB99354F18596CE4C6EB391E734EC05CB92
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 0$8
      • API String ID: 0-46163386
      • Opcode ID: e0604df92cb8a79ef1f637f116ee07255fd1f4de389e96f90f8011d7d7297fd1
      • Instruction ID: 0c9f9d8cb3a14990e4f1387da700d470baf48b8397461feb5c041578c95f635b
      • Opcode Fuzzy Hash: e0604df92cb8a79ef1f637f116ee07255fd1f4de389e96f90f8011d7d7297fd1
      • Instruction Fuzzy Hash: 8E0247722083409FD7219F18C884B9FBBE2BF98314F44891DF98897362D775D958DB92
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 0$8
      • API String ID: 0-46163386
      • Opcode ID: 87879d892af3ffa6779b4e7bf002e093aa90b58ed0787fcd520ff5134ee667e6
      • Instruction ID: d92015a45a00028d7a50b0ee323de339e98136c6ec72e44bcf537174de1c6f6e
      • Opcode Fuzzy Hash: 87879d892af3ffa6779b4e7bf002e093aa90b58ed0787fcd520ff5134ee667e6
      • Instruction Fuzzy Hash: BFB12671209380AFD7219F58C880B9EBBE1AF99314F44485DF9C897362D375D858DBA3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 0$8
      • API String ID: 0-46163386
      • Opcode ID: 1c96b9537c35fffde24d72eaf5f1441256b38159dc005c278a5ae1d72a7566a6
      • Instruction ID: 554aed1ab79feb9fa4fca2dbc505e5db40b76e5688b09898d1402625e6a8a6ef
      • Opcode Fuzzy Hash: 1c96b9537c35fffde24d72eaf5f1441256b38159dc005c278a5ae1d72a7566a6
      • Instruction Fuzzy Hash: BB914471208380AFD721DF58C880BAEBBE1ABD9314F44891DFAC897252D771D918CB63
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: by
      • API String ID: 0-1674299033
      • Opcode ID: 9ac23f82fa4e0c929308fe6e3f2ea0be2aee04ddc05e55d46fc1ce1f1165063e
      • Instruction ID: 3279ea6e582b455fbdf307fbc6a76fcea3721500880a05a93ebde0feabf873f3
      • Opcode Fuzzy Hash: 9ac23f82fa4e0c929308fe6e3f2ea0be2aee04ddc05e55d46fc1ce1f1165063e
      • Instruction Fuzzy Hash: 0D12D3B52007118FD728CF18C8A1B62B7F2FF9A304B24565CD9969FB95E779B801CB90
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: srox
      • API String ID: 0-3003179574
      • Opcode ID: d75a4aee91cb6f0af5c4c574a4d59ff2ac27a19cc6292a26fbec972c38e28f66
      • Instruction ID: 3a4815090488639702041d15fa5ab636b9d5eb6d2524d976eab8c6b70f0fdff4
      • Opcode Fuzzy Hash: d75a4aee91cb6f0af5c4c574a4d59ff2ac27a19cc6292a26fbec972c38e28f66
      • Instruction Fuzzy Hash: 00F18A70108B818BD736CF29C8A07A3BBF1AF6A308F44495CD1E79B692D776B449CB50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: WS_L
      • API String ID: 0-1529689294
      • Opcode ID: b5735d5f55fb78e7c8f4812e8fde611402fceea0d35673ff23bd44eac63ef4f9
      • Instruction ID: b17b829831e6ff10cedf3d46a37ed4c92bf3fbbf62f7a544e9b17e0bd052eeb1
      • Opcode Fuzzy Hash: b5735d5f55fb78e7c8f4812e8fde611402fceea0d35673ff23bd44eac63ef4f9
      • Instruction Fuzzy Hash: 6EE16B70104B418BD729CF29C590762FBE2BF5A304F28965DD4D69B792CB35F846CB90
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: srox
      • API String ID: 0-3003179574
      • Opcode ID: 4407b657e6011acb955dce32572ec8e001536d5c24aa43e43504fab106340450
      • Instruction ID: e089afa967113721ce84e0552091f5fe077b53eac22dce032d07bd1701c908a2
      • Opcode Fuzzy Hash: 4407b657e6011acb955dce32572ec8e001536d5c24aa43e43504fab106340450
      • Instruction Fuzzy Hash: 24E16C70508B908BD736CF25C4907A3BBF1AF2A308F48595CD0E79B692D77AB549CB90
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: WS_L
      • API String ID: 0-1529689294
      • Opcode ID: ee83cf5f3f2858f0079fd56f012efc3b152e04b57a88d3b72bb72da69d7d628e
      • Instruction ID: 52cade95071234cb7a337d0bba951fb34d3775aa7977ffdf152233adca7a0ca4
      • Opcode Fuzzy Hash: ee83cf5f3f2858f0079fd56f012efc3b152e04b57a88d3b72bb72da69d7d628e
      • Instruction Fuzzy Hash: 94D16C70104B428FD729CF29C690762FBE2BF5A304F28965DC4D69BB92CB35B845CB94
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: WS_L
      • API String ID: 0-1529689294
      • Opcode ID: a21a4565209c9b8ad7871bc9d49c4194f729e622c2a4d384361d6451f1be91a5
      • Instruction ID: 5cbe9bbd12cfd3ca287fdb454b5dfdae916725690ac4b89fc7c0a8cd2bd41e3e
      • Opcode Fuzzy Hash: a21a4565209c9b8ad7871bc9d49c4194f729e622c2a4d384361d6451f1be91a5
      • Instruction Fuzzy Hash: A5D17B70104B428FD729CF29C690762FBE2BF5A304F28965DC4D69BB92CB35B845CB94
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 8,
      • API String ID: 0-1688126183
      • Opcode ID: f7bf08cf2249894b6c472f25f4e6de2f6d6e857caf88ca37ff6d29ac0d6095a4
      • Instruction ID: 590473894586e8057d212aa6d28269e71ef9ad0661710c92cf4c1d1ea51df84e
      • Opcode Fuzzy Hash: f7bf08cf2249894b6c472f25f4e6de2f6d6e857caf88ca37ff6d29ac0d6095a4
      • Instruction Fuzzy Hash: 03D178706083809FDB65EF28C880BAEBBE5EF85304F44692DE5C997291D7399845CB53
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: WS_L
      • API String ID: 0-1529689294
      • Opcode ID: cc776be3998b84f4e07f2b72921ec9ef62d85af3e4813999a519d1b2a294e654
      • Instruction ID: aec68879668c43200ca15efaa2371ab147188e2de9d1953cbf8c5e530b7c3ed1
      • Opcode Fuzzy Hash: cc776be3998b84f4e07f2b72921ec9ef62d85af3e4813999a519d1b2a294e654
      • Instruction Fuzzy Hash: 61C19D70104B828FD729CF29C590762FBE2BF5A304F28969DC4D69BB92C735B845CB94
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: 8,
      • API String ID: 0-1688126183
      • Opcode ID: bbff7603088e0efc7a6450daadf2da4d454aec0a84c9d4bbc89d2f533476bfe0
      • Instruction ID: e31fccfe77a120aa27358c88b0be20814e44f10a432c2013977421cd01090bbd
      • Opcode Fuzzy Hash: bbff7603088e0efc7a6450daadf2da4d454aec0a84c9d4bbc89d2f533476bfe0
      • Instruction Fuzzy Hash: E8D157706083809FDB65EF28C881BAFBBE5EF85304F44292DE5C9972A1D7399845CB53
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: /*
      • API String ID: 0-764831015
      • Opcode ID: 2cd913d8aec2b2734fb2ee5f3855792953d0cac4ce6463724a07330582431b12
      • Instruction ID: ad73947ed600ba69e0276322cb0e832cd3f9e6892280b27d875ef95fae6c1463
      • Opcode Fuzzy Hash: 2cd913d8aec2b2734fb2ee5f3855792953d0cac4ce6463724a07330582431b12
      • Instruction Fuzzy Hash: E5D126B0514B128FC368DF29C59066ABBE1FF85710B509A2ED59BABED0E735F844CB04
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: s}
      • API String ID: 0-1555587195
      • Opcode ID: 4b98071e28d2aff4c0498dd63199efbee4ab02991ca00792bd7137d6df62e3a4
      • Instruction ID: edd5109ad52aa0df1b0c243dd50cf4c6caff871a690d833d218b31cd69c74be0
      • Opcode Fuzzy Hash: 4b98071e28d2aff4c0498dd63199efbee4ab02991ca00792bd7137d6df62e3a4
      • Instruction Fuzzy Hash: 56918AB15083019BD724DF18C89166BBBF1EFCA358F049A2CE4C5AB391E374D945CB86
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: zzcd
      • API String ID: 0-2024795975
      • Opcode ID: a64b2db0277d8d8116b64bded26556355968dedb0d411cd2200ec61f2cced391
      • Instruction ID: 292c466c28984af1feb551253cdb301ddaf492eb0942dcfd726e6e32a4c1ca7a
      • Opcode Fuzzy Hash: a64b2db0277d8d8116b64bded26556355968dedb0d411cd2200ec61f2cced391
      • Instruction Fuzzy Hash: 4C91DF345087808BD7298B29C050676FBF2AF9B318F286A5ED4E76F796D335E841CB14
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: slo{
      • API String ID: 0-1018248694
      • Opcode ID: 639c1a48cd58f1789e5a7577b5550af3c274baf05d60edbbbbee3f4dcf11b0e6
      • Instruction ID: 7f1905edc964de42c49315f8cdc9369f7ceb9584cb3284edd4803757e7b08010
      • Opcode Fuzzy Hash: 639c1a48cd58f1789e5a7577b5550af3c274baf05d60edbbbbee3f4dcf11b0e6
      • Instruction Fuzzy Hash: 85612B70145B908AE7268F26C4A0BA3BBE1AF1B308F48599DC0E79B756C739B446CB50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: slo{
      • API String ID: 0-1018248694
      • Opcode ID: 9d147fea3c11eb420b9be794e52d3f27bf5a7d988300f308afd8eea1595f1269
      • Instruction ID: 0c80880d04b9078c2be240577570442fb27ce48073f85740da0ec4d1a8a3ceba
      • Opcode Fuzzy Hash: 9d147fea3c11eb420b9be794e52d3f27bf5a7d988300f308afd8eea1595f1269
      • Instruction Fuzzy Hash: 28611D70145B908BE726CF2AC4A07A3BBE1AF5B304F48589DC0E79B756C739B545CB50
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID: 1>7m
      • API String ID: 2994545307-3827447187
      • Opcode ID: da2acd39fdc1f0fdd32424eb66615eea6f9f2ed32258b9c2eab7c7764b10aac7
      • Instruction ID: 7eda158f1822f67886c7a1d2dd59aa38ace0fa408c3f6193a846f6181659d399
      • Opcode Fuzzy Hash: da2acd39fdc1f0fdd32424eb66615eea6f9f2ed32258b9c2eab7c7764b10aac7
      • Instruction Fuzzy Hash: DA418E742047418FD729CF29C990B22BBF2EF5A704F18999CD4D69B692C735F806CB64
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: }s
      • API String ID: 0-2525031176
      • Opcode ID: 1e883fa51d4ac941e8f87a2d0ffe2231d0c4e18c71a64b79304a453846da8c28
      • Instruction ID: 2d843af61a3866c50ee387b24b501505889bea3bb19e31f4b1ff15ae05b87e8e
      • Opcode Fuzzy Hash: 1e883fa51d4ac941e8f87a2d0ffe2231d0c4e18c71a64b79304a453846da8c28
      • Instruction Fuzzy Hash: 824188B05042018BC724CF18C861722B7F2FF9A318F299A9CD4869F796E375E843CB84
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: e1c
      • API String ID: 0-2007318509
      • Opcode ID: cf78d1ba67b7c8aebe1b86a086aaa4718ba748b29cf34b8f8e1599e51f3a323f
      • Instruction ID: 0066780609863a8d847da5e17b13867ee1e8d45b41568a72b7c364dd2b42b1ee
      • Opcode Fuzzy Hash: cf78d1ba67b7c8aebe1b86a086aaa4718ba748b29cf34b8f8e1599e51f3a323f
      • Instruction Fuzzy Hash: 73410BB0108380AFD704DF19C881B2ABBE1EB95748F249E2CE1D59B361D775C846CF46
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID: D>
      • API String ID: 0-261516509
      • Opcode ID: 4a9df98eddecf21fdcbcfb8280d1d36d9f081d05925678d5c1caea212a1d8057
      • Instruction ID: 03fef745fc6488d22e69a9874f8fee7082c717b6d198fc6777d0fbb8cdb467df
      • Opcode Fuzzy Hash: 4a9df98eddecf21fdcbcfb8280d1d36d9f081d05925678d5c1caea212a1d8057
      • Instruction Fuzzy Hash: EAD05E78A092008BC745AA00FC1297AF2B15B82300F083439E85AE3261CA22D806C605
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9dad4efee47b3c792327815125dea94a364233b9e0e015133cfadaa3c9ce2aba
      • Instruction ID: 1ab51cdc33a1daefb75aded8d17f893301af8d25663c2b63465d9cb368213467
      • Opcode Fuzzy Hash: 9dad4efee47b3c792327815125dea94a364233b9e0e015133cfadaa3c9ce2aba
      • Instruction Fuzzy Hash: 093218716087118BC724EF18C9802BBB3E1FFD4315FA9992DD9CEA7285EB34A851C746
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8df5d4cbe5480aeeb5d43827f0a74f70c6df5b664f61ee096cf407ecdc664569
      • Instruction ID: 93e5028e6e912169545fc66d2d77d407cf83f796a6c1555831e13f0d523f89ec
      • Opcode Fuzzy Hash: 8df5d4cbe5480aeeb5d43827f0a74f70c6df5b664f61ee096cf407ecdc664569
      • Instruction Fuzzy Hash: 4432CD766087419FC714CF18C880B5BBBE1FBC4318F589A6DE8999B291D735EC45CB82
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3a06cd7a50e480f2fd3644927c7b415490564ba6db03c6e0a7441d1c82f81653
      • Instruction ID: 78700cbca0e302f6f8fe8d5d71997ea4914ff1f7f167ab03275dbf2eac9374f5
      • Opcode Fuzzy Hash: 3a06cd7a50e480f2fd3644927c7b415490564ba6db03c6e0a7441d1c82f81653
      • Instruction Fuzzy Hash: A012BB715183118BCB18CF18C8A076BB7F2EFD5718F149A1CE8DA6B391E3749949CB82
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 83c79aeeb4bf2962c5c3d064dd8e9c1b27f6cbf5e8afc5f35450cb73ecbc114e
      • Instruction ID: 549ed4b466244486333418e390250e207dbfde1f3e20b7ea1f4fa2e5ecf6177b
      • Opcode Fuzzy Hash: 83c79aeeb4bf2962c5c3d064dd8e9c1b27f6cbf5e8afc5f35450cb73ecbc114e
      • Instruction Fuzzy Hash: 6A02E331608340CFC718DF28C48166ABBE1EF98304F58996DF99DAB392D771D805CB92
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0573986c0fe1e2557bc529d1eaf6dd1172f7fb588a36bb2163aaa4659fe37bd1
      • Instruction ID: 7b2097f3d2fa2a06cc789a6d40195227368e7514b54346f83ec53d8a04088b23
      • Opcode Fuzzy Hash: 0573986c0fe1e2557bc529d1eaf6dd1172f7fb588a36bb2163aaa4659fe37bd1
      • Instruction Fuzzy Hash: E9C155B55483408BDB14CF18D880A9FBBE1EF95398F54991DF8C89B362D334D989CB86
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f41af3700b732e2d32a05a8c54ae5ed99fc927a8907ab78a55e749edb3bcf266
      • Instruction ID: 0c5def3d90e2c8945499828d042225a2131b0bf1aeaea7ed2b9b09fa56c0f224
      • Opcode Fuzzy Hash: f41af3700b732e2d32a05a8c54ae5ed99fc927a8907ab78a55e749edb3bcf266
      • Instruction Fuzzy Hash: C9A189715183118BCB28CF18C8A076BB7F1EF85758F149A1CE8DA6B391E7749D49CB82
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7b1a7922bdce93d2563d039a70869f0a97c9d249153c1b80c0af1802eb6d3d67
      • Instruction ID: 5f4e30805739e02a68754100c0a34274f24c7b069b42eed92be07d9eb2742902
      • Opcode Fuzzy Hash: 7b1a7922bdce93d2563d039a70869f0a97c9d249153c1b80c0af1802eb6d3d67
      • Instruction Fuzzy Hash: 379193716053029FCB24CF19C890AABB7F2FF84714F19956CE885AB251E730DD55CB92
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e3c75e70359b8d0875d99dac8e65c52b2f57cf5410f505f1b8391c2724ec89ee
      • Instruction ID: 9935a9938feb6de6ff3c909c342f9471996dee5fe1cc9f92a344b1eb61d82cfe
      • Opcode Fuzzy Hash: e3c75e70359b8d0875d99dac8e65c52b2f57cf5410f505f1b8391c2724ec89ee
      • Instruction Fuzzy Hash: D5A1C072A083129BCB15CF18D8806ABB7E2FF88714F19992CE9D5A7351D731EC51CB92
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9c5f5414ce292a53184b31e1311154b0a7e93979e9fe6e79e2d02323025c4de6
      • Instruction ID: b7e4e2b69541a260c1983240b12e4b034fb51b9d4ef8d6f4a87fda28bda2628c
      • Opcode Fuzzy Hash: 9c5f5414ce292a53184b31e1311154b0a7e93979e9fe6e79e2d02323025c4de6
      • Instruction Fuzzy Hash: 259129B56043119BDB18EF18CC91BABB3E5FF84318F18552CF986A7281E774E901C792
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f910bf2a6c151de857ff6669ee13a497de501085b0fa4551315b95f813cc69a0
      • Instruction ID: 10ed93521d21d235d2c1dc063cb4238408a1e310c9ee4eae504e898f8cbf5366
      • Opcode Fuzzy Hash: f910bf2a6c151de857ff6669ee13a497de501085b0fa4551315b95f813cc69a0
      • Instruction Fuzzy Hash: 8271BCB52043108FC729CF28C8A0A63B7F2FF9A314B15495DC8D69F7A6DB75A805CB90
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d226ef02b08b46a8f3098081bf8a7eb4ea944671f5aec9448364783cf5645902
      • Instruction ID: 67540f35aefae7b3c587249857262a3b8667a03591e1e9e412718e6c77279de9
      • Opcode Fuzzy Hash: d226ef02b08b46a8f3098081bf8a7eb4ea944671f5aec9448364783cf5645902
      • Instruction Fuzzy Hash: 3E51A4756083918BD728CF24C4907ABB3E2FFC5328F19992CE4DA5B381DB749945CB86
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4bb0370c9591b2dda7ee638cfa83628f066fcf06faf596b5bbf642c656220fed
      • Instruction ID: 31223a944efe602533ce29b21483a82d35b4a4226e5510b06e6c922f70af97dd
      • Opcode Fuzzy Hash: 4bb0370c9591b2dda7ee638cfa83628f066fcf06faf596b5bbf642c656220fed
      • Instruction Fuzzy Hash: 83619CB15087048FE314DF29D8A43ABBBE1AB84318F04892DE5E687390D775DA08CF82
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 08b7cad896cc9c6cd066c2cb208e148ecb52771654487ebb3da9529df6f5e88c
      • Instruction ID: f870cbede7ac984e91168cca30db08acbcd45fa40e09ea3282305d04ca0296f6
      • Opcode Fuzzy Hash: 08b7cad896cc9c6cd066c2cb208e148ecb52771654487ebb3da9529df6f5e88c
      • Instruction Fuzzy Hash: 495191756083418BD728CF19C8907ABB3E2FFC5328F19992CE4D95B381DB749945CB86
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d6eddaa78e8204bd80621a3726be6f2ddae0100b8a4110f86262e8cddb92d64d
      • Instruction ID: 615fe95a4620b7afa90cb13da52ef0ca5f64c6a7df969e5b83fdaaac993f57c3
      • Opcode Fuzzy Hash: d6eddaa78e8204bd80621a3726be6f2ddae0100b8a4110f86262e8cddb92d64d
      • Instruction Fuzzy Hash: 9641C432B081654BCB189A3DCC5027ABAD39FC5648F1ED539E8CDEB786E534D90093D4
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8c2e7c75917adee71637c1a773c0df819a64426b61f5d8981bfe3b22f4ffe6cb
      • Instruction ID: 1470da9d5fefed981c051554ac1501f3aa8655872421b8551fc480998007b522
      • Opcode Fuzzy Hash: 8c2e7c75917adee71637c1a773c0df819a64426b61f5d8981bfe3b22f4ffe6cb
      • Instruction Fuzzy Hash: E2415BB39087048BCB22AF54C880777B7E9EF52318F5A6569E88D67293EB71DC04C351
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d8e1a8092221a87039b6dc645e6517e85d3ec095e13d7040809745a20dd094b3
      • Instruction ID: 8073af8d25038687c8a4c5fb3dd8956bd5b40a9d3526e9ddcac72bb7f4c3d2b8
      • Opcode Fuzzy Hash: d8e1a8092221a87039b6dc645e6517e85d3ec095e13d7040809745a20dd094b3
      • Instruction Fuzzy Hash: 6841E17270C2604FE308DA3AC45476ABBD2AFC9350F198A2EF0DD877D5D6388945EB51
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c045a70e5f0107ed7f34553b7663974d22f4e4dfdddd1914720ec0ec0eb917bc
      • Instruction ID: 156d0ab494ef13c6b6529f61d45aaf7fc2634c32a1f5a48df7f5f4fe71200a7a
      • Opcode Fuzzy Hash: c045a70e5f0107ed7f34553b7663974d22f4e4dfdddd1914720ec0ec0eb917bc
      • Instruction Fuzzy Hash: 3D41A9752083518FC724CF18C4A1B6BB3F1EFC6314F049A1DE896AB291E7799906CB92
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8213815d06bb03da3631bf907528b364239abdefbf8c8edc567f674d91b2d71a
      • Instruction ID: b30c82c18b925e717160a355dba8e472c8bfae035e342dfcd7ca8c986a1eb38f
      • Opcode Fuzzy Hash: 8213815d06bb03da3631bf907528b364239abdefbf8c8edc567f674d91b2d71a
      • Instruction Fuzzy Hash: 1F31BE34108B528BD72CCF16C8E4622BBF2EF97305B18995DC5E30BBA6C635B845CB84
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2f517b90154633d8211b74b8634f04e7598053b121eae01471b33d3af2c4a2ff
      • Instruction ID: 9e222b054abb62bb4a6ca4ae3714d0c3d681a72d27b08c298e3c6019d96eb012
      • Opcode Fuzzy Hash: 2f517b90154633d8211b74b8634f04e7598053b121eae01471b33d3af2c4a2ff
      • Instruction Fuzzy Hash: A8212F352083819FDB28EF15C890BBAB3E3FBC5314F195A6CD5DD67692C73168058B91
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2357652fc7d8bfa9f65ce62146da6f3c2663d9a21049eb63a412019347533ab6
      • Instruction ID: a5b52848b3adaf7290639d211e5fe5fc1405e27137fc8437cb35c37dba3c53b1
      • Opcode Fuzzy Hash: 2357652fc7d8bfa9f65ce62146da6f3c2663d9a21049eb63a412019347533ab6
      • Instruction Fuzzy Hash: 99115E356083108FDB28CF24C4916AAF7E6EFCD328F1A692DD4C9B7351E734A9418B55
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 37071e649e76b4835ba3886bd6662782662ba5c517621aef609640bd6c67cdcd
      • Instruction ID: f2a8c4563bf86e9f37860895ce1f43f6529323e2c4937456c2e62ffcccb9299b
      • Opcode Fuzzy Hash: 37071e649e76b4835ba3886bd6662782662ba5c517621aef609640bd6c67cdcd
      • Instruction Fuzzy Hash: 1221F675215B008FD320CF15C694703BBA3EBDA718F29C96CC5AA1BB59C376E8078B80
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d02c027b12e39f8fbd949a90471b7f81c73cd850681345e8fa7de63032de86af
      • Instruction ID: 5273275d77df07e04defe10445a226830561a442db4c77aac80e16328205f5ed
      • Opcode Fuzzy Hash: d02c027b12e39f8fbd949a90471b7f81c73cd850681345e8fa7de63032de86af
      • Instruction Fuzzy Hash: EF21E575A01A008FD328CF19C5A1623B7F6EF89314F14C65CD8A64B7D9D730A815CBC5
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6259205c0c07459dc2a62cbee40b8fea04cdd1d17269642e5404a21918aad97a
      • Instruction ID: dc088893a8e2636dad987ae95f604f37580c9e831f51698e1e42e988d3d8dc8d
      • Opcode Fuzzy Hash: 6259205c0c07459dc2a62cbee40b8fea04cdd1d17269642e5404a21918aad97a
      • Instruction Fuzzy Hash: 5E0189A1A5DB140AC325DDA098E427ABA63EBD6314FAC526CC6EF932E3D661D519C300
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6f490cb8fd506112c139f442f86718d7986b1c10b23f60bafe3d52c99dee3746
      • Instruction ID: 78c69a300440ae474bf0ec33fae2e445472810cb6ac73219d5753a2deb1c5004
      • Opcode Fuzzy Hash: 6f490cb8fd506112c139f442f86718d7986b1c10b23f60bafe3d52c99dee3746
      • Instruction Fuzzy Hash: 7A218B34104B518BDB28CF16C4E0726BBF2EF9B319B18A94DC5D31BA96C739B405CB44
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
      • Instruction ID: a38f1d778e3f4057b11d1739dec044f83053c7d0f13a4fd02e132ec55ff9033e
      • Opcode Fuzzy Hash: a620e664b8a16c3b2027b821f47f9918b4c750b05e9443771526df122d28202b
      • Instruction Fuzzy Hash: C81129377091E50EC3128E7C88005A5BFA30A97238F1953A9F4B8AF2D6C6229D8B8350
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a644661a4e5abe859417051fff18ff8f17532f572549462d98e5231b5c783274
      • Instruction ID: 24a7a0139cb3033686f9cab774e6e6919e3891469bf81eaccfd8847eb4823d1b
      • Opcode Fuzzy Hash: a644661a4e5abe859417051fff18ff8f17532f572549462d98e5231b5c783274
      • Instruction Fuzzy Hash: F10175F6A00B0197D720AE54A5D1727B2EA6F8A708F59692DD8086F201EB75FC05C791
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
      • Instruction ID: 946efc96d933687b7ec883640d7b21800bf760201218de58eae2b0d09c40f071
      • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
      • Instruction Fuzzy Hash: 02D0A7615487A10E57598D3814E0477FBE8E947626B28249EE4DDF3105D230DC0197A8
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bb46a62c7e24d9387a6d4e439171ccac7aa47d4a9bfa07efddff81907ea6c259
      • Instruction ID: 7d26629b3cd68f5396bf8b092215800dfcbed7285356d1b522b570d6359ee636
      • Opcode Fuzzy Hash: bb46a62c7e24d9387a6d4e439171ccac7aa47d4a9bfa07efddff81907ea6c259
      • Instruction Fuzzy Hash: 43D0A732A444108FC358CF19C800936B3F6BFCD201386105DD0929B762EB34D204C254
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: fd7d6df8bbfbd989e30777f26423c92a89664f58ab54939dcad47fa85eb00c94
      • Instruction ID: 47cdc57d6af4d88142e85aa0c8dcbf0306c5da44c10fe866bbf90d663fc2a5fb
      • Opcode Fuzzy Hash: fd7d6df8bbfbd989e30777f26423c92a89664f58ab54939dcad47fa85eb00c94
      • Instruction Fuzzy Hash: 14C08CB1BA20424F93088A09E872C727332E783021B14B22D8433336EAC4269107454C
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ba6927de363cad90842903dfa6c3476182c71220c9759d287077fbd08114a93b
      • Instruction ID: f510473a3b8159edd6b03965cec76d53a5a891001e03d6d0e28809efa26f29ed
      • Opcode Fuzzy Hash: ba6927de363cad90842903dfa6c3476182c71220c9759d287077fbd08114a93b
      • Instruction Fuzzy Hash: F5C09B74B442004BC608CE05DC51477637953876117147538D402F3761C514D4068504
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 33a06dbae5731b22a5af71c749173cb23a4a33ce82a9caa6a52354d2bbba1ae6
      • Instruction ID: a1edf1fc81a4b2dc5e2f53a7ec66fb0ca7abf0f1900e77f34ace101bde72c614
      • Opcode Fuzzy Hash: 33a06dbae5731b22a5af71c749173cb23a4a33ce82a9caa6a52354d2bbba1ae6
      • Instruction Fuzzy Hash: 16B092B8A5C080CF924CCF02E8A0836B27AE787214B15B12A81063329EC23294078A4C
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 30fb567555a7f1d2431e8f06e634e797076a1683374cfece3f651e8d02b3755c
      • Instruction ID: b876e276b2b7a376f57585e2f91ef815e9d25d060f2b6f70ed6846cca7e853b8
      • Opcode Fuzzy Hash: 30fb567555a7f1d2431e8f06e634e797076a1683374cfece3f651e8d02b3755c
      • Instruction Fuzzy Hash: 3EA024D4C04000C7C300DD047431430F1744347101F403430D40CF3303D511D415430D
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f85cfd76783c087c23a198e56e33ed054bff0c33121c60fae58baf736877d008
      • Instruction ID: 5e6387758b0e6fdfc1665fa40b2a92a7cbc2c5d03681530b8617f4b9150c58b6
      • Opcode Fuzzy Hash: f85cfd76783c087c23a198e56e33ed054bff0c33121c60fae58baf736877d008
      • Instruction Fuzzy Hash: FEA011B0E0C0008ACB088E008A028B8E238038B202A20B2A8800A33202A220C002820C
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3902e4244f7b7bbc78cbd32d4aa57bb346cc8c75f42b6b4c27bae05219f5ea07
      • Instruction ID: 622d7b32a8f76fff71453c8759cb74d7396b9f0dc21a251981051feaddebcb0a
      • Opcode Fuzzy Hash: 3902e4244f7b7bbc78cbd32d4aa57bb346cc8c75f42b6b4c27bae05219f5ea07
      • Instruction Fuzzy Hash: A6B00279A481009FC244CE01D590875F376E7CF215F25E5599C59273568632E807CA49
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 46d48dc5cdc7b829b183b2079b7098ddb4b03d3b820891215619688df4f28f58
      • Instruction ID: 01ef58b30afcc6e3a144c11cb1b8012362a99142c3fb77b51beb4151f7615038
      • Opcode Fuzzy Hash: 46d48dc5cdc7b829b183b2079b7098ddb4b03d3b820891215619688df4f28f58
      • Instruction Fuzzy Hash: 5C900220D491058A81408E0595444B1E278538B101F503540D008F3112C210E408451D
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: String
      • String ID: J$O$P$V$[$]
      • API String ID: 2568140703-3337704060
      • Opcode ID: e06df139b7fac4a3a853f461a563586bd6aa02573b99ebba0b3b004a619751df
      • Instruction ID: 968bd5b5e50c6eb546bf9c6f9ea5d9ee19407239a1d7ff36e34d61e4919efff6
      • Opcode Fuzzy Hash: e06df139b7fac4a3a853f461a563586bd6aa02573b99ebba0b3b004a619751df
      • Instruction Fuzzy Hash: F291A5716097818FC735DF28C8917DABBE1BBDA310F184A6DD4E98B3C2D6359845CB42
      APIs
      • GetCurrentObject.GDI32(00000000,00000007), ref: 00EADEBF
      • GetObjectW.GDI32(00000000,00000018,?), ref: 00EADECF
      • DeleteObject.GDI32(00000000), ref: 00EADEE6
      • SelectObject.GDI32(00000000,00000000), ref: 00EADF07
      • SelectObject.GDI32(00000000,00000000), ref: 00EADF32
      • DeleteDC.GDI32(00000000), ref: 00EADF39
      • DeleteObject.GDI32(00000000), ref: 00EADF4D
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: Object$Delete$Select$Current
      • String ID:
      • API String ID: 932865934-0
      • Opcode ID: ee1043b8829d9b3744de5ec44bb451515738dd441ffa726adb4be7b7450bcc21
      • Instruction ID: e479a4cf09b3d853b62fab99b2dea6995334f9b0fdbf5c048bd91be4c886bcd1
      • Opcode Fuzzy Hash: ee1043b8829d9b3744de5ec44bb451515738dd441ffa726adb4be7b7450bcc21
      • Instruction Fuzzy Hash: C5215075108304BFD3056FA69C09F2F7BF8EF89712F000619FA45A21A0E7749909CFA6
      APIs
      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00E9077B
      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00E90787
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1690787182.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E81000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_e81000_8yprhxqBVs.jbxd
      Similarity
      • API ID: DirectorySystem
      • String ID: Rn!_
      • API String ID: 2188284642-1967302553
      • Opcode ID: 7807a2612dca921a0c82630d74c195ff19dbb9bf59a101253d2a5c115e107ab2
      • Instruction ID: 4e36eec94837f0795a6d5d5c57f4d9b4cdbaf0f21b3a08a23713bbef1c4a161b
      • Opcode Fuzzy Hash: 7807a2612dca921a0c82630d74c195ff19dbb9bf59a101253d2a5c115e107ab2
      • Instruction Fuzzy Hash: C4D012F52441109FC208CB15EC45D9B371CFF05755B004236F647F22A0DA7011058A14