Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tGm4SuP0sz.exe

Overview

General Information

Sample name:tGm4SuP0sz.exe
renamed because original name is a hash value
Original sample name:42dcacc7a076e1496d9650cf3fed897e3267577cf23fa47cf8591e508984cbbc.exe
Analysis ID:1465359
MD5:cabeb02d14a76418addc20a3943681c8
SHA1:7a059897e5f686c9421c772e88d60ab5239b22d2
SHA256:42dcacc7a076e1496d9650cf3fed897e3267577cf23fa47cf8591e508984cbbc
Tags:exe
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • tGm4SuP0sz.exe (PID: 7340 cmdline: "C:\Users\user\Desktop\tGm4SuP0sz.exe" MD5: CABEB02D14A76418ADDC20A3943681C8)
    • conhost.exe (PID: 7356 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • aspnet_regiis.exe (PID: 7440 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe" MD5: 5D1D74198D75640E889F0A577BBF31FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "employeedscratshj.shop"], "Build id": "HpOoIh--@MoneyPayin"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    Timestamp:07/01/24-15:56:54.800033
    SID:2053670
    Source Port:56366
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.063241
    SID:2053682
    Source Port:55154
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.580427
    SID:2053678
    Source Port:57904
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.811680
    SID:2053668
    Source Port:61148
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.696934
    SID:2053672
    Source Port:55221
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.683572
    SID:2053674
    Source Port:52482
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.563142
    SID:2053680
    Source Port:50222
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected
    Timestamp:07/01/24-15:56:54.595520
    SID:2053676
    Source Port:49552
    Destination Port:53
    Protocol:UDP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: https://falseaudiencekd.shop/apiAvira URL Cloud: Label: malware
    Source: https://feighminoritsjda.shop/api1Avira URL Cloud: Label: malware
    Source: employeedscratshj.shopAvira URL Cloud: Label: malware
    Source: marathonbeedksow.shopAvira URL Cloud: Label: malware
    Source: https://employeedscratshj.shop/apiAvira URL Cloud: Label: malware
    Source: https://pleasurenarrowsdla.shop/api?Avira URL Cloud: Label: malware
    Source: feighminoritsjda.shopAvira URL Cloud: Label: malware
    Source: https://richardflorespoew.shop/apiAvira URL Cloud: Label: malware
    Source: https://strwawrunnygjwu.shop/apiAvira URL Cloud: Label: malware
    Source: https://feighminoritsjda.shop/apiKAvira URL Cloud: Label: malware
    Source: https://justifycanddidatewd.shop/apiAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Roaming\d3d9.dllAvira: detection malicious, Label: HEUR/AGEN.1301971
    Source: 0.2.tGm4SuP0sz.exe.6d36f000.2.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["richardflorespoew.shop", "strwawrunnygjwu.shop", "justifycanddidatewd.shop", "raiseboltskdlwpow.shop", "falseaudiencekd.shop", "pleasurenarrowsdla.shop", "feighminoritsjda.shop", "marathonbeedksow.shop", "employeedscratshj.shop"], "Build id": "HpOoIh--@MoneyPayin"}
    Source: C:\Users\user\AppData\Roaming\d3d9.dllReversingLabs: Detection: 64%
    Source: tGm4SuP0sz.exeReversingLabs: Detection: 71%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: C:\Users\user\AppData\Roaming\d3d9.dllJoe Sandbox ML: detected
    Source: tGm4SuP0sz.exeJoe Sandbox ML: detected
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: richardflorespoew.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: strwawrunnygjwu.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: justifycanddidatewd.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: raiseboltskdlwpow.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: falseaudiencekd.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: pleasurenarrowsdla.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: feighminoritsjda.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: marathonbeedksow.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: employeedscratshj.shop
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: - Screen Resoluton:
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: Workgroup: -
    Source: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpString decryptor: HpOoIh--@MoneyPayin
    Source: tGm4SuP0sz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: tGm4SuP0sz.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D360B78 FindFirstFileExW,0_2_6D360B78
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_6D378530
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov word ptr [eax], cx0_2_6D390D8C
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+00000230h]0_2_6D381D80
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov word ptr [edx], cx0_2_6D383DF8
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_6D3A3DE0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_6D3A3DE0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then add ebx, 02h0_2_6D383C39
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_6D38D470
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then jmp eax0_2_6D38FC57
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, ecx0_2_6D391CE1
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp byte ptr [ecx+eax], 00000000h0_2_6D37ECE8
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov dword ptr [esp+00000A98h], 00000000h0_2_6D37ECE8
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+00000230h]0_2_6D37E724
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov word ptr [eax], cx0_2_6D384F2B
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]0_2_6D37B700
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_6D3A7F60
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp byte ptr [ebx+esi], 00000000h0_2_6D39079B
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp]0_2_6D3A37F0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then xor eax, eax0_2_6D38F61A
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then xor eax, eax0_2_6D38F53A
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]0_2_6D3A8130
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]0_2_6D371160
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp byte ptr [ebp+00h], 00000000h0_2_6D383190
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov byte ptr [edi], al0_2_6D3939D8
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]0_2_6D38081C
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]0_2_6D38281B
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]0_2_6D38081C
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h0_2_6D392070
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]0_2_6D38081C
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+000000D8h]0_2_6D37F889
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]0_2_6D3910F7
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov byte ptr [edx], al0_2_6D3780D0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov byte ptr [ecx], al0_2_6D390310
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h0_2_6D392300
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h0_2_6D37F3A5
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp word ptr [eax], 0000h0_2_6D381399
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+00000888h]0_2_6D38C38A
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov eax, dword ptr [esp+00000888h]0_2_6D38C3F0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then push esi0_2_6D3863D3
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov dword ptr [esp+00000A98h], 00000000h0_2_6D3823C0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov edi, ecx0_2_6D385A1E
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]0_2_6D392A70
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then jmp eax0_2_6D38FABE
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then cmp dword ptr [ecx+ebx*8], 0850A6E6h0_2_6D3A82F0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 4x nop then mov ecx, edi0_2_6D375900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], B67AF9EBh3_2_004377D1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00421857
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then add ebx, 02h3_2_00415822
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [edx], cx3_2_00415822
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, dx3_2_004280C7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], B67AF9EBh3_2_004378CA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, ecx3_2_004238E3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ecx+eax], 00000000h3_2_004108E8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp+00000A98h], 00000000h3_2_004108E8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [eax], 00000000h3_2_00438950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00438950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_00438950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_00431120
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_0040A130
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_004359E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_004359E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_004391F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+00000230h]3_2_00413980
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ebx+esi], 00000000h3_2_004221B9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [eax], 00000000h3_2_00438AB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00438AB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_00438AB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_00439B60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movsx eax, byte ptr [esi+ecx]3_2_0040D300
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, dword ptr [esi]3_2_00438305
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [ecx], al3_2_00421B22
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+00000230h]3_2_00410324
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov word ptr [eax], cx3_2_00416B2B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edi, ecx3_2_00416B2B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [eax], 00000000h3_2_00438BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00438BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_00438BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_004353F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]3_2_0041241C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h3_2_00423C77
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]3_2_0041441B
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]3_2_0041241C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [004401D8h]3_2_0041241C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00421439
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edx], al3_2_00409CD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ecx, dword ptr [esp+04h]3_2_00422CF7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+000000D8h]3_2_00411489
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx edx, byte ptr [esi+edi]3_2_00402D60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [eax], 00000000h3_2_00438500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00438500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_00438500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]3_2_00439D30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then xor eax, eax3_2_00420DD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov byte ptr [edi], al3_2_004255D8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp ecx3_2_00426DF5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ebp+00h], 00000000h3_2_00414D90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov edx, dword ptr [esi]3_2_004365B5
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then xor eax, eax3_2_00420E4E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov ebx, dword ptr [edi+04h]3_2_00424670
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [eax+ebx+02h], 0000h3_2_00423E3F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [esi+eax+02h], 0000h3_2_00423E3F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [eax], 00000000h3_2_004386D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_004386D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_004386D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [ecx+ebx*8], 0850A6E6h3_2_00439EF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then movzx eax, dx3_2_00427F13
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, ecx3_2_00427F13
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then push esi3_2_00417F20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then jmp eax3_2_00438F30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then test edi, edi3_2_00438F30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov dword ptr [esp+00000A98h], 00000000h3_2_00413FC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp dword ptr [edi+edx*8], B67AF9EBh3_2_004377D6
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+00000888h]3_2_0041DFF0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp]3_2_0041EFFD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then mov eax, dword ptr [esp+00000888h]3_2_0041DF8A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp word ptr [eax], 0000h3_2_00412F99
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 4x nop then cmp byte ptr [ecx], 00000000h3_2_00410FA5

    Networking

    barindex
    Source: TrafficSnort IDS: 2053682 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (marathonbeedksow .shop) 192.168.2.8:55154 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053680 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (feighminoritsjda .shop) 192.168.2.8:50222 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053678 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pleasurenarrowsdla .shop) 192.168.2.8:57904 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053676 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (falseaudiencekd .shop) 192.168.2.8:49552 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053674 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (raiseboltskdlwpow .shop) 192.168.2.8:52482 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053672 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (justifycanddidatewd .shop) 192.168.2.8:55221 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053670 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strwawrunnygjwu .shop) 192.168.2.8:56366 -> 1.1.1.1:53
    Source: TrafficSnort IDS: 2053668 ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (richardflorespoew .shop) 192.168.2.8:61148 -> 1.1.1.1:53
    Source: Malware configuration extractorURLs: richardflorespoew.shop
    Source: Malware configuration extractorURLs: strwawrunnygjwu.shop
    Source: Malware configuration extractorURLs: justifycanddidatewd.shop
    Source: Malware configuration extractorURLs: raiseboltskdlwpow.shop
    Source: Malware configuration extractorURLs: falseaudiencekd.shop
    Source: Malware configuration extractorURLs: pleasurenarrowsdla.shop
    Source: Malware configuration extractorURLs: feighminoritsjda.shop
    Source: Malware configuration extractorURLs: marathonbeedksow.shop
    Source: Malware configuration extractorURLs: employeedscratshj.shop
    Source: unknownDNS traffic detected: query: feighminoritsjda.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: justifycanddidatewd.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: employeedscratshj.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: falseaudiencekd.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: pleasurenarrowsdla.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: richardflorespoew.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: marathonbeedksow.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: strwawrunnygjwu.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: raiseboltskdlwpow.shop replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: employeedscratshj.shop
    Source: global trafficDNS traffic detected: DNS query: marathonbeedksow.shop
    Source: global trafficDNS traffic detected: DNS query: feighminoritsjda.shop
    Source: global trafficDNS traffic detected: DNS query: pleasurenarrowsdla.shop
    Source: global trafficDNS traffic detected: DNS query: falseaudiencekd.shop
    Source: global trafficDNS traffic detected: DNS query: raiseboltskdlwpow.shop
    Source: global trafficDNS traffic detected: DNS query: justifycanddidatewd.shop
    Source: global trafficDNS traffic detected: DNS query: strwawrunnygjwu.shop
    Source: global trafficDNS traffic detected: DNS query: richardflorespoew.shop
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://employeedscratshj.shop/api
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://falseaudiencekd.shop/api
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://feighminoritsjda.shop/api1
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://feighminoritsjda.shop/apiK
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://justifycanddidatewd.shop/
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://justifycanddidatewd.shop/api
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pleasurenarrowsdla.shop/
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pleasurenarrowsdla.shop/api?
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raiseboltskdlwpow.shop/B
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/0
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/api
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/api7
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/apii
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/apiy
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://richardflorespoew.shop/g
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strwawrunnygjwu.shop//l
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://strwawrunnygjwu.shop/api
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0042E490 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_0042E490
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0042E490 OpenClipboard,GetWindowLongW,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_0042E490
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0042F0D2 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,3_2_0042F0D2

    System Summary

    barindex
    Source: tGm4SuP0sz.exeStatic PE information: section name: .$D$
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3530C0 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,0_2_6D3530C0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3535D00_2_6D3535D0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3530C00_2_6D3530C0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3513F00_2_6D3513F0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3671250_2_6D367125
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3510100_2_6D351010
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D35B7000_2_6D35B700
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3755300_2_6D375530
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D392DC00_2_6D392DC0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D37E4100_2_6D37E410
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D372CE00_2_6D372CE0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D374F200_2_6D374F20
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3737100_2_6D373710
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D39079B0_2_6D39079B
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3A86F00_2_6D3A86F0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3741900_2_6D374190
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3939D80_2_6D3939D8
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3769C00_2_6D3769C0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D38EB000_2_6D38EB00
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D38539C0_2_6D38539C
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3A8A100_2_6D3A8A10
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3722500_2_6D372250
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3759000_2_6D375900
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004100103_2_00410010
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004280C73_2_004280C7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004048E03_2_004048E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004200923_2_00420092
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004389503_2_00438950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004071303_2_00407130
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004249C03_2_004249C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004221B93_2_004221B9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0043A2F03_2_0043A2F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00438AB03_2_00438AB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004053103_2_00405310
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00406B203_2_00406B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00421B223_2_00421B22
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00438BD03_2_00438BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004204103_2_00420410
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004214393_2_00421439
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004385003_2_00438500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004085C03_2_004085C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00420DD03_2_00420DD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004255D83_2_004255D8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00405D903_2_00405D90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0041FDA03_2_0041FDA0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00420E4E3_2_00420E4E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00403E503_2_00403E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0042A6523_2_0042A652
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0043A6103_2_0043A610
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00401EC03_2_00401EC0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004386D03_2_004386D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00432F503_2_00432F50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00416F763_2_00416F76
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_004207003_2_00420700
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00427F133_2_00427F13
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00438F303_2_00438F30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0041C7EE3_2_0041C7EE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0041EFFD3_2_0041EFFD
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: String function: 6D37E5C0 appears 51 times
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: String function: 6D377470 appears 70 times
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: String function: 6D35C6A0 appears 33 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 004101C0 appears 162 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: String function: 00409070 appears 41 times
    Source: tGm4SuP0sz.exe, 00000000.00000002.1389292619.00000000015DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs tGm4SuP0sz.exe
    Source: tGm4SuP0sz.exe, 00000000.00000000.1385888334.000000000101C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNovaEdge31599575803.exeT vs tGm4SuP0sz.exe
    Source: tGm4SuP0sz.exeBinary or memory string: OriginalFilenameNovaEdge31599575803.exeT vs tGm4SuP0sz.exe
    Source: tGm4SuP0sz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: tGm4SuP0sz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@4/2@9/0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_0042B109 CoCreateInstance,3_2_0042B109
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7356:120:WilError_03
    Source: tGm4SuP0sz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: tGm4SuP0sz.exeReversingLabs: Detection: 71%
    Source: unknownProcess created: C:\Users\user\Desktop\tGm4SuP0sz.exe "C:\Users\user\Desktop\tGm4SuP0sz.exe"
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeSection loaded: msasn1.dllJump to behavior
    Source: tGm4SuP0sz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: tGm4SuP0sz.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: tGm4SuP0sz.exeStatic file information: File size 1609728 > 1048576
    Source: tGm4SuP0sz.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x14b200
    Source: tGm4SuP0sz.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: tGm4SuP0sz.exeStatic PE information: section name: .$D$
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D367854 push ecx; ret 0_2_6D367867
    Source: tGm4SuP0sz.exeStatic PE information: section name: .text entropy: 7.956028266051775
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeFile created: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory allocated: 1790000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory allocated: 3150000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeAPI coverage: 7.8 %
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exe TID: 7436Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7460Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe TID: 7472Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D360B78 FindFirstFileExW,0_2_6D360B78
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exeCode function: 3_2_00436A70 LdrInitializeThunk,3_2_00436A70
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D35C52A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D35C52A
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D36229E GetProcessHeap,0_2_6D36229E
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D35C52A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D35C52A
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D35C051 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6D35C051
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3604C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D3604C7
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D3535D0 HonorInc,GetConsoleWindow,ShowWindow,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,VirtualAllocEx,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,CloseHandle,CloseHandle,GetConsoleWindow,ShowWindow,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,0_2_6D3535D0
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: tGm4SuP0sz.exeString found in binary or memory: richardflorespoew.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: strwawrunnygjwu.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: falseaudiencekd.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: pleasurenarrowsdla.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: justifycanddidatewd.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: raiseboltskdlwpow.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: employeedscratshj.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: feighminoritsjda.shop
    Source: tGm4SuP0sz.exeString found in binary or memory: marathonbeedksow.shop
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 43B000Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 43E000Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 44F000Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe base: 790008Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"Jump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D35C6E8 cpuid 0_2_6D35C6E8
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeQueries volume information: C:\Users\user\Desktop\tGm4SuP0sz.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\tGm4SuP0sz.exeCode function: 0_2_6D35C173 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6D35C173

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory121
    Security Software Discovery
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin Shares2
    Clipboard Data
    11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA Secrets22
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    tGm4SuP0sz.exe71%ReversingLabsByteCode-MSIL.Spyware.Lummastealer
    tGm4SuP0sz.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\d3d9.dll100%AviraHEUR/AGEN.1301971
    C:\Users\user\AppData\Roaming\d3d9.dll100%Joe Sandbox ML
    C:\Users\user\AppData\Roaming\d3d9.dll65%ReversingLabsWin32.Trojan.LummaStealer
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://falseaudiencekd.shop/api100%Avira URL Cloudmalware
    https://pleasurenarrowsdla.shop/0%Avira URL Cloudsafe
    richardflorespoew.shop0%Avira URL Cloudsafe
    https://feighminoritsjda.shop/api1100%Avira URL Cloudmalware
    https://richardflorespoew.shop/apiy0%Avira URL Cloudsafe
    pleasurenarrowsdla.shop0%Avira URL Cloudsafe
    employeedscratshj.shop100%Avira URL Cloudmalware
    marathonbeedksow.shop100%Avira URL Cloudmalware
    justifycanddidatewd.shop0%Avira URL Cloudsafe
    https://richardflorespoew.shop/apii0%Avira URL Cloudsafe
    falseaudiencekd.shop0%Avira URL Cloudsafe
    https://richardflorespoew.shop/api70%Avira URL Cloudsafe
    https://strwawrunnygjwu.shop//l0%Avira URL Cloudsafe
    https://justifycanddidatewd.shop/0%Avira URL Cloudsafe
    https://employeedscratshj.shop/api100%Avira URL Cloudmalware
    https://pleasurenarrowsdla.shop/api?100%Avira URL Cloudmalware
    feighminoritsjda.shop100%Avira URL Cloudmalware
    https://richardflorespoew.shop/00%Avira URL Cloudsafe
    https://raiseboltskdlwpow.shop/B0%Avira URL Cloudsafe
    https://richardflorespoew.shop/api100%Avira URL Cloudmalware
    strwawrunnygjwu.shop0%Avira URL Cloudsafe
    https://richardflorespoew.shop/0%Avira URL Cloudsafe
    raiseboltskdlwpow.shop0%Avira URL Cloudsafe
    https://strwawrunnygjwu.shop/api100%Avira URL Cloudmalware
    https://feighminoritsjda.shop/apiK100%Avira URL Cloudmalware
    https://justifycanddidatewd.shop/api100%Avira URL Cloudmalware
    https://richardflorespoew.shop/g0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    justifycanddidatewd.shop
    unknown
    unknowntrue
      unknown
      richardflorespoew.shop
      unknown
      unknowntrue
        unknown
        strwawrunnygjwu.shop
        unknown
        unknowntrue
          unknown
          falseaudiencekd.shop
          unknown
          unknowntrue
            unknown
            raiseboltskdlwpow.shop
            unknown
            unknowntrue
              unknown
              employeedscratshj.shop
              unknown
              unknowntrue
                unknown
                marathonbeedksow.shop
                unknown
                unknowntrue
                  unknown
                  feighminoritsjda.shop
                  unknown
                  unknowntrue
                    unknown
                    pleasurenarrowsdla.shop
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      justifycanddidatewd.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      employeedscratshj.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      marathonbeedksow.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      pleasurenarrowsdla.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      richardflorespoew.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      falseaudiencekd.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      feighminoritsjda.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      strwawrunnygjwu.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      raiseboltskdlwpow.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://pleasurenarrowsdla.shop/aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://richardflorespoew.shop/apiiaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://feighminoritsjda.shop/api1aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://falseaudiencekd.shop/apiaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://richardflorespoew.shop/apiyaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://richardflorespoew.shop/api7aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://strwawrunnygjwu.shop//laspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://richardflorespoew.shop/apiaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://justifycanddidatewd.shop/aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://pleasurenarrowsdla.shop/api?aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://raiseboltskdlwpow.shop/Baspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://employeedscratshj.shop/apiaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://richardflorespoew.shop/0aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://richardflorespoew.shop/aspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://strwawrunnygjwu.shop/apiaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://richardflorespoew.shop/gaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AD8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://justifycanddidatewd.shop/apiaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000AFA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://feighminoritsjda.shop/apiKaspnet_regiis.exe, 00000003.00000002.1403267726.0000000000B0E000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1465359
                      Start date and time:2024-07-01 15:56:00 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 57s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:4
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:tGm4SuP0sz.exe
                      renamed because original name is a hash value
                      Original Sample Name:42dcacc7a076e1496d9650cf3fed897e3267577cf23fa47cf8591e508984cbbc.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@4/2@9/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 92%
                      • Number of executed functions: 12
                      • Number of non-executed functions: 104
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: tGm4SuP0sz.exe
                      TimeTypeDescription
                      09:56:53API Interceptor4x Sleep call for process: aspnet_regiis.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\tGm4SuP0sz.exe
                      File Type:CSV text
                      Category:dropped
                      Size (bytes):226
                      Entropy (8bit):5.360398796477698
                      Encrypted:false
                      SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                      MD5:3A8957C6382192B71471BD14359D0B12
                      SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                      SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                      SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                      Process:C:\Users\user\Desktop\tGm4SuP0sz.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):428544
                      Entropy (8bit):7.042134864297343
                      Encrypted:false
                      SSDEEP:6144:U92QoqVJjjpW8zZIfTkVtrhprdkBvxa/kWrPS5oKOh/C+ro2DvR86O/TpSr:U7JjjbBtPkoFpVro2l8X0r
                      MD5:93067106E6F192D5D32C5CEAA164405F
                      SHA1:A088015A8CCDD6AF72989FF0E8EE0B87D03D962A
                      SHA-256:16E0E92ED3C35C8D60E688B5AC6BE6D141492B67249B89A4A96A5B8BF908B39E
                      SHA-512:6C587D293FB75006F1C4566249F6713626D0DE58C560CB3C253EBA15F6EF8613737EB334FF9AB2DD2F4770DDFD4BE15A8A924C251769F00B70296A53EBD7F7AF
                      Malicious:true
                      Antivirus:
                      • Antivirus: Avira, Detection: 100%
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 65%
                      Reputation:low
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C.)...GQ..GQ..GQL.DP..GQL.BP..GQL.CP..GQL.FP..GQ z<Q..GQ..FQe.GQ.=BP..GQ.=CP..GQ.=DP..GQ..GQ..GQj=GP..GQj=EP..GQRich..GQ........................PE..L...3.xf...........!...&.l...$............................................................@.............................x...x...<................................... ...............................`...@...............P............................text....j.......l.................. ..`.rdata...d.......f...p..............@..@.data...T...........................@....reloc...............v..............@..B................................................................................................................................................................................................................................................................................................................................
                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.838685509247705
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                      • Win32 Executable (generic) a (10002005/4) 49.96%
                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      • DOS Executable Generic (2002/1) 0.01%
                      File name:tGm4SuP0sz.exe
                      File size:1'609'728 bytes
                      MD5:cabeb02d14a76418addc20a3943681c8
                      SHA1:7a059897e5f686c9421c772e88d60ab5239b22d2
                      SHA256:42dcacc7a076e1496d9650cf3fed897e3267577cf23fa47cf8591e508984cbbc
                      SHA512:779ec01582eb539ad2c3c7ec8ef0f14fa2a7a072cecd82cecbaae14c66e0e3a52fe510b1dc56d4e1ccff9e033349bde0e5145c90592247dd9b086c47a62b0865
                      SSDEEP:24576:PR0v48o9Tlzo+dJZujavgJSLZbM1S9ZhbrqyJ8pL4Fqgmpp/H1fmPOpz:y52TC8ZoI9Z9rqyI44Hpptflpz
                      TLSH:2B7512757FD8C090E62E3BBA19D916EC0325F3601B1B33A911FA18DE5F65782CA21727
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...3.xf................................. ........@.. ....................................@................................
                      Icon Hash:00928e8e8686b000
                      Entrypoint:0x54d0be
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66780833 [Sun Jun 23 11:34:11 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x14d0680x53.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x18c0000x6e0.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x18e0000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x1650000x48.$D$
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x14b0c40x14b200b88936036270ac618d1e6800e130ed02False0.8556545512457531data7.956028266051775IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .$D$0x14e0000x3c5fc0x3c6001e3f04af42e2a07560b81b99688e9b5dFalse0.5787477355072463data6.399106139375437IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x18c0000x6e00x8002e251c09b5e08853789f4cba562462e0False0.365234375data3.7663118946935565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x18e0000xc0x20050d3c35f580058964369e5f57c3783a4False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x18c0a00x450data0.40217391304347827
                      RT_MANIFEST0x18c4f00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                      07/01/24-15:56:54.800033UDP2053670ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (strwawrunnygjwu .shop)5636653192.168.2.81.1.1.1
                      07/01/24-15:56:54.063241UDP2053682ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (marathonbeedksow .shop)5515453192.168.2.81.1.1.1
                      07/01/24-15:56:54.580427UDP2053678ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (pleasurenarrowsdla .shop)5790453192.168.2.81.1.1.1
                      07/01/24-15:56:54.811680UDP2053668ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (richardflorespoew .shop)6114853192.168.2.81.1.1.1
                      07/01/24-15:56:54.696934UDP2053672ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (justifycanddidatewd .shop)5522153192.168.2.81.1.1.1
                      07/01/24-15:56:54.683572UDP2053674ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (raiseboltskdlwpow .shop)5248253192.168.2.81.1.1.1
                      07/01/24-15:56:54.563142UDP2053680ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (feighminoritsjda .shop)5022253192.168.2.81.1.1.1
                      07/01/24-15:56:54.595520UDP2053676ET TROJAN Lumma Stealer Related CnC Domain in DNS Lookup (falseaudiencekd .shop)4955253192.168.2.81.1.1.1
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 1, 2024 15:56:53.457998991 CEST5168453192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.051367998 CEST53516841.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.063241005 CEST5515453192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.073417902 CEST53551541.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.563142061 CEST5022253192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.577260017 CEST53502221.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.580426931 CEST5790453192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.592571974 CEST53579041.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.595520020 CEST4955253192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.680556059 CEST53495521.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.683572054 CEST5248253192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.695573092 CEST53524821.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.696933985 CEST5522153192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.796859980 CEST53552211.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.800033092 CEST5636653192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.809737921 CEST53563661.1.1.1192.168.2.8
                      Jul 1, 2024 15:56:54.811680079 CEST6114853192.168.2.81.1.1.1
                      Jul 1, 2024 15:56:54.821276903 CEST53611481.1.1.1192.168.2.8
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 1, 2024 15:56:53.457998991 CEST192.168.2.81.1.1.10x8d37Standard query (0)employeedscratshj.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.063241005 CEST192.168.2.81.1.1.10xf048Standard query (0)marathonbeedksow.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.563142061 CEST192.168.2.81.1.1.10x76f3Standard query (0)feighminoritsjda.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.580426931 CEST192.168.2.81.1.1.10xf067Standard query (0)pleasurenarrowsdla.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.595520020 CEST192.168.2.81.1.1.10x45c4Standard query (0)falseaudiencekd.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.683572054 CEST192.168.2.81.1.1.10x84e0Standard query (0)raiseboltskdlwpow.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.696933985 CEST192.168.2.81.1.1.10xf7bdStandard query (0)justifycanddidatewd.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.800033092 CEST192.168.2.81.1.1.10x6b8aStandard query (0)strwawrunnygjwu.shopA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.811680079 CEST192.168.2.81.1.1.10xe604Standard query (0)richardflorespoew.shopA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 1, 2024 15:56:54.051367998 CEST1.1.1.1192.168.2.80x8d37Name error (3)employeedscratshj.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.073417902 CEST1.1.1.1192.168.2.80xf048Name error (3)marathonbeedksow.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.577260017 CEST1.1.1.1192.168.2.80x76f3Name error (3)feighminoritsjda.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.592571974 CEST1.1.1.1192.168.2.80xf067Name error (3)pleasurenarrowsdla.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.680556059 CEST1.1.1.1192.168.2.80x45c4Name error (3)falseaudiencekd.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.695573092 CEST1.1.1.1192.168.2.80x84e0Name error (3)raiseboltskdlwpow.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.796859980 CEST1.1.1.1192.168.2.80xf7bdName error (3)justifycanddidatewd.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.809737921 CEST1.1.1.1192.168.2.80x6b8aName error (3)strwawrunnygjwu.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 1, 2024 15:56:54.821276903 CEST1.1.1.1192.168.2.80xe604Name error (3)richardflorespoew.shopnonenoneA (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:09:56:51
                      Start date:01/07/2024
                      Path:C:\Users\user\Desktop\tGm4SuP0sz.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\tGm4SuP0sz.exe"
                      Imagebase:0xe90000
                      File size:1'609'728 bytes
                      MD5 hash:CABEB02D14A76418ADDC20A3943681C8
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:2
                      Start time:09:56:52
                      Start date:01/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6ee680000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:09:56:52
                      Start date:01/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                      Imagebase:0xca0000
                      File size:43'016 bytes
                      MD5 hash:5D1D74198D75640E889F0A577BBF31FC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:8.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:9.9%
                        Total number of Nodes:634
                        Total number of Limit Nodes:10
                        execution_graph 16408 6d3535d0 16421 6d3535f0 __FrameHandler3::FrameUnwindToState 16408->16421 16409 6d35ad61 16462 6d35bce0 16409->16462 16411 6d35ad6b 16412 6d359fd1 WriteProcessMemory 16412->16421 16413 6d35b4fd WriteProcessMemory 16428 6d35ada0 16413->16428 16415 6d35b636 WriteProcessMemory 16415->16421 16416 6d359809 VirtualAlloc 16416->16421 16417 6d359c46 WriteProcessMemory 16417->16421 16418 6d3530c0 8 API calls 16418->16421 16419 6d355ac7 GetConsoleWindow ShowWindow 16436 6d3513f0 16419->16436 16421->16409 16421->16412 16421->16413 16421->16415 16421->16416 16421->16417 16421->16418 16421->16419 16422 6d3513f0 24 API calls 16421->16422 16423 6d359845 Wow64GetThreadContext 16421->16423 16424 6d35a89c WriteProcessMemory 16421->16424 16425 6d359a08 VirtualAllocEx 16421->16425 16426 6d35ad73 GetConsoleWindow ShowWindow 16421->16426 16430 6d35a70e ReadProcessMemory 16421->16430 16431 6d35aba8 WriteProcessMemory Wow64SetThreadContext ResumeThread 16421->16431 16432 6d359777 CreateProcessW 16421->16432 16433 6d35ac62 CloseHandle CloseHandle 16421->16433 16434 6d35b3e3 VirtualAllocEx 16421->16434 16435 6d359bf6 VirtualAllocEx 16421->16435 16458 6d351010 16421->16458 16422->16421 16423->16421 16424->16421 16425->16421 16427 6d3513f0 24 API calls 16426->16427 16427->16428 16428->16421 16429 6d3513f0 24 API calls 16428->16429 16429->16428 16430->16421 16431->16421 16432->16421 16433->16421 16434->16421 16435->16421 16442 6d35144f __InternalCxxFrameHandler 16436->16442 16437 6d352e4f 16438 6d35bce0 _ValidateLocalCookies 5 API calls 16437->16438 16439 6d352e59 16438->16439 16439->16421 16440 6d351bba GetCurrentProcess 16440->16442 16441 6d352ad2 VirtualProtect 16441->16442 16442->16437 16442->16440 16442->16441 16443 6d3522fe MapViewOfFile 16442->16443 16445 6d352e60 GetCurrentProcess 16442->16445 16446 6d351f17 K32GetModuleInformation 16442->16446 16447 6d352d5d FindCloseChangeNotification 16442->16447 16448 6d351dd6 __FrameHandler3::FrameUnwindToState 16442->16448 16450 6d352935 VirtualProtect 16442->16450 16451 6d35308e CloseHandle CloseHandle 16442->16451 16452 6d3522d1 CloseHandle 16442->16452 16453 6d352ef3 K32GetModuleInformation 16442->16453 16454 6d352dd4 CloseHandle CloseHandle 16442->16454 16455 6d352f39 CreateFileMappingA 16442->16455 16456 6d352112 CreateFileMappingA 16442->16456 16457 6d351fd6 GetModuleFileNameA CreateFileA 16442->16457 16443->16442 16444 6d351df9 GetModuleHandleA 16444->16442 16445->16442 16446->16442 16447->16442 16448->16444 16449 6d352ebd GetModuleHandleA 16448->16449 16449->16442 16450->16442 16451->16442 16452->16442 16453->16442 16454->16442 16455->16442 16456->16442 16457->16442 16459 6d35106f 16458->16459 16460 6d35bce0 _ValidateLocalCookies 5 API calls 16459->16460 16461 6d351384 16460->16461 16461->16421 16463 6d35bce9 IsProcessorFeaturePresent 16462->16463 16464 6d35bce8 16462->16464 16466 6d35c08e 16463->16466 16464->16411 16469 6d35c051 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16466->16469 16468 6d35c171 16468->16411 16469->16468 16470 6d35bcee 16471 6d35bd2c 16470->16471 16472 6d35bcf9 16470->16472 16509 6d35be48 16471->16509 16474 6d35bd1e 16472->16474 16475 6d35bcfe 16472->16475 16482 6d35bd41 16474->16482 16477 6d35bd14 16475->16477 16478 6d35bd03 16475->16478 16501 6d35c2fb 16477->16501 16481 6d35bd08 16478->16481 16496 6d35c31a 16478->16496 16483 6d35bd4d ___scrt_is_nonwritable_in_current_image 16482->16483 16536 6d35c38b 16483->16536 16485 6d35bd54 __DllMainCRTStartup@12 16486 6d35be40 16485->16486 16487 6d35bd7b 16485->16487 16493 6d35bdb7 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 16485->16493 16555 6d35c52a IsProcessorFeaturePresent 16486->16555 16547 6d35c2ed 16487->16547 16490 6d35be47 16491 6d35bd8a __RTC_Initialize 16491->16493 16550 6d35c20b InitializeSListHead 16491->16550 16493->16481 16494 6d35bd98 16494->16493 16551 6d35c2c2 16494->16551 16647 6d35f9a3 16496->16647 16952 6d35d1dc 16501->16952 16506 6d35c317 16506->16481 16507 6d35d1e7 21 API calls 16508 6d35c304 16507->16508 16508->16481 16510 6d35be54 ___scrt_is_nonwritable_in_current_image __DllMainCRTStartup@12 16509->16510 16511 6d35be85 16510->16511 16512 6d35bef0 16510->16512 16527 6d35be5d 16510->16527 16972 6d35c35b 16511->16972 16513 6d35c52a __DllMainCRTStartup@12 4 API calls 16512->16513 16515 6d35bef7 ___scrt_is_nonwritable_in_current_image 16513->16515 16519 6d35bf2d dllmain_raw 16515->16519 16520 6d35bf28 16515->16520 16532 6d35bf13 16515->16532 16516 6d35be8a 16981 6d35c217 16516->16981 16518 6d35be8f __RTC_Initialize __DllMainCRTStartup@12 16984 6d35c4fc 16518->16984 16521 6d35bf47 dllmain_crt_dispatch 16519->16521 16519->16532 16993 6d35b700 16520->16993 16521->16520 16521->16532 16527->16481 16528 6d35bf99 16529 6d35bfa2 dllmain_crt_dispatch 16528->16529 16528->16532 16530 6d35bfb5 dllmain_raw 16529->16530 16529->16532 16530->16532 16531 6d35b700 __DllMainCRTStartup@12 5 API calls 16533 6d35bf80 16531->16533 16532->16481 16534 6d35be48 __DllMainCRTStartup@12 81 API calls 16533->16534 16535 6d35bf8e dllmain_raw 16534->16535 16535->16528 16537 6d35c394 16536->16537 16559 6d35c6e8 IsProcessorFeaturePresent 16537->16559 16541 6d35c3a5 16546 6d35c3a9 16541->16546 16569 6d35f986 16541->16569 16544 6d35c3c0 16544->16485 16546->16485 16641 6d35c3c4 16547->16641 16549 6d35c2f4 16549->16491 16550->16494 16552 6d35c2c7 ___scrt_release_startup_lock 16551->16552 16553 6d35c6e8 IsProcessorFeaturePresent 16552->16553 16554 6d35c2d0 16552->16554 16553->16554 16554->16493 16556 6d35c540 __FrameHandler3::FrameUnwindToState 16555->16556 16557 6d35c5eb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16556->16557 16558 6d35c62f __FrameHandler3::FrameUnwindToState 16557->16558 16558->16490 16560 6d35c3a0 16559->16560 16561 6d35d1bd 16560->16561 16578 6d35d68c 16561->16578 16565 6d35d1ce 16566 6d35d1d9 16565->16566 16592 6d35d6c8 16565->16592 16566->16541 16568 6d35d1c6 16568->16541 16632 6d3624ab 16569->16632 16572 6d35d1ef 16573 6d35d202 16572->16573 16574 6d35d1f8 16572->16574 16573->16546 16575 6d35d671 ___vcrt_uninitialize_ptd 6 API calls 16574->16575 16576 6d35d1fd 16575->16576 16577 6d35d6c8 ___vcrt_uninitialize_locks DeleteCriticalSection 16576->16577 16577->16573 16581 6d35d695 16578->16581 16580 6d35d6be 16583 6d35d6c8 ___vcrt_uninitialize_locks DeleteCriticalSection 16580->16583 16581->16580 16582 6d35d1c2 16581->16582 16596 6d35dcbc 16581->16596 16582->16568 16584 6d35d63e 16582->16584 16583->16582 16613 6d35dbcd 16584->16613 16589 6d35d66e 16589->16565 16591 6d35d653 16591->16565 16593 6d35d6d3 16592->16593 16595 6d35d6f2 16592->16595 16594 6d35d6dd DeleteCriticalSection 16593->16594 16594->16594 16594->16595 16595->16568 16601 6d35dae2 16596->16601 16599 6d35dcf4 InitializeCriticalSectionAndSpinCount 16600 6d35dcdf 16599->16600 16600->16581 16602 6d35daff 16601->16602 16605 6d35db03 16601->16605 16602->16599 16602->16600 16603 6d35db6b GetProcAddress 16603->16602 16605->16602 16605->16603 16606 6d35db5c 16605->16606 16608 6d35db82 LoadLibraryExW 16605->16608 16606->16603 16607 6d35db64 FreeLibrary 16606->16607 16607->16603 16609 6d35db99 GetLastError 16608->16609 16610 6d35dbc9 16608->16610 16609->16610 16611 6d35dba4 ___vcrt_InitializeCriticalSectionEx 16609->16611 16610->16605 16611->16610 16612 6d35dbba LoadLibraryExW 16611->16612 16612->16605 16614 6d35dae2 ___vcrt_InitializeCriticalSectionEx 5 API calls 16613->16614 16615 6d35dbe7 16614->16615 16616 6d35dc00 TlsAlloc 16615->16616 16617 6d35d648 16615->16617 16617->16591 16618 6d35dc7e 16617->16618 16619 6d35dae2 ___vcrt_InitializeCriticalSectionEx 5 API calls 16618->16619 16620 6d35dc98 16619->16620 16621 6d35d661 16620->16621 16622 6d35dcb3 TlsSetValue 16620->16622 16621->16589 16623 6d35d671 16621->16623 16622->16621 16624 6d35d681 16623->16624 16625 6d35d67b 16623->16625 16624->16591 16627 6d35dc08 16625->16627 16628 6d35dae2 ___vcrt_InitializeCriticalSectionEx 5 API calls 16627->16628 16629 6d35dc22 16628->16629 16630 6d35dc3a TlsFree 16629->16630 16631 6d35dc2e 16629->16631 16630->16631 16631->16624 16633 6d35c3b2 16632->16633 16634 6d3624bb 16632->16634 16633->16544 16633->16572 16634->16633 16636 6d36236f 16634->16636 16637 6d362376 16636->16637 16638 6d3623b9 GetStdHandle 16637->16638 16639 6d36241b 16637->16639 16640 6d3623cc GetFileType 16637->16640 16638->16637 16639->16634 16640->16637 16642 6d35c3d4 16641->16642 16643 6d35c3d0 16641->16643 16644 6d35c3e1 ___scrt_release_startup_lock 16642->16644 16645 6d35c52a __DllMainCRTStartup@12 4 API calls 16642->16645 16643->16549 16644->16549 16646 6d35c44a 16645->16646 16653 6d36009b 16647->16653 16650 6d35d1e7 16932 6d35d573 16650->16932 16654 6d35c31f 16653->16654 16655 6d3600a5 16653->16655 16654->16650 16661 6d3620fa 16655->16661 16677 6d361f98 16661->16677 16663 6d362116 16664 6d362131 TlsGetValue 16663->16664 16665 6d3600ac 16663->16665 16665->16654 16666 6d362139 16665->16666 16667 6d361f98 __dosmaperr 5 API calls 16666->16667 16668 6d362155 16667->16668 16669 6d362173 TlsSetValue 16668->16669 16670 6d3600bf 16668->16670 16671 6d35ff62 16670->16671 16672 6d35ff6d 16671->16672 16673 6d35ff7d 16671->16673 16691 6d35ff83 16672->16691 16673->16654 16678 6d361fc8 16677->16678 16682 6d361fc4 __dosmaperr 16677->16682 16678->16682 16683 6d361eca 16678->16683 16681 6d361fe2 GetProcAddress 16681->16682 16682->16663 16685 6d361edb ___vcrt_InitializeCriticalSectionEx 16683->16685 16684 6d361f71 16684->16681 16684->16682 16685->16684 16686 6d361ef9 LoadLibraryExW 16685->16686 16690 6d361f47 LoadLibraryExW 16685->16690 16687 6d361f14 GetLastError 16686->16687 16688 6d361f78 16686->16688 16687->16685 16688->16684 16689 6d361f8a FreeLibrary 16688->16689 16689->16684 16690->16685 16690->16688 16692 6d35ff9e 16691->16692 16693 6d35ff98 16691->16693 16695 6d360814 ___free_lconv_mon 14 API calls 16692->16695 16694 6d360814 ___free_lconv_mon 14 API calls 16693->16694 16694->16692 16696 6d35ffaa 16695->16696 16697 6d360814 ___free_lconv_mon 14 API calls 16696->16697 16698 6d35ffb5 16697->16698 16699 6d360814 ___free_lconv_mon 14 API calls 16698->16699 16700 6d35ffc0 16699->16700 16701 6d360814 ___free_lconv_mon 14 API calls 16700->16701 16702 6d35ffcb 16701->16702 16703 6d360814 ___free_lconv_mon 14 API calls 16702->16703 16704 6d35ffd6 16703->16704 16705 6d360814 ___free_lconv_mon 14 API calls 16704->16705 16706 6d35ffe1 16705->16706 16707 6d360814 ___free_lconv_mon 14 API calls 16706->16707 16708 6d35ffec 16707->16708 16709 6d360814 ___free_lconv_mon 14 API calls 16708->16709 16710 6d35fff7 16709->16710 16711 6d360814 ___free_lconv_mon 14 API calls 16710->16711 16712 6d360005 16711->16712 16723 6d35fdaf 16712->16723 16717 6d360814 16718 6d36081f HeapFree 16717->16718 16719 6d360849 16717->16719 16718->16719 16720 6d360834 GetLastError 16718->16720 16719->16673 16721 6d360841 __dosmaperr 16720->16721 16863 6d3607a4 16721->16863 16724 6d35fdbb ___scrt_is_nonwritable_in_current_image 16723->16724 16739 6d3603f3 EnterCriticalSection 16724->16739 16726 6d35fdef 16740 6d35fe0e 16726->16740 16729 6d35fdc5 16729->16726 16730 6d360814 ___free_lconv_mon 14 API calls 16729->16730 16730->16726 16731 6d35fe1a 16732 6d35fe26 ___scrt_is_nonwritable_in_current_image 16731->16732 16744 6d3603f3 EnterCriticalSection 16732->16744 16734 6d35fe30 16745 6d360050 16734->16745 16736 6d35fe43 16749 6d35fe63 16736->16749 16739->16729 16743 6d36043b LeaveCriticalSection 16740->16743 16742 6d35fdfc 16742->16731 16743->16742 16744->16734 16746 6d36005f __dosmaperr 16745->16746 16748 6d360086 __dosmaperr 16745->16748 16746->16748 16752 6d3630ae 16746->16752 16748->16736 16862 6d36043b LeaveCriticalSection 16749->16862 16751 6d35fe51 16751->16717 16753 6d36312e 16752->16753 16756 6d3630c4 16752->16756 16754 6d36317c 16753->16754 16757 6d360814 ___free_lconv_mon 14 API calls 16753->16757 16820 6d36321f 16754->16820 16756->16753 16758 6d3630f7 16756->16758 16764 6d360814 ___free_lconv_mon 14 API calls 16756->16764 16759 6d363150 16757->16759 16760 6d363119 16758->16760 16769 6d360814 ___free_lconv_mon 14 API calls 16758->16769 16761 6d360814 ___free_lconv_mon 14 API calls 16759->16761 16763 6d360814 ___free_lconv_mon 14 API calls 16760->16763 16765 6d363163 16761->16765 16762 6d36318a 16767 6d3631ea 16762->16767 16776 6d360814 14 API calls ___free_lconv_mon 16762->16776 16766 6d363123 16763->16766 16768 6d3630ec 16764->16768 16770 6d360814 ___free_lconv_mon 14 API calls 16765->16770 16773 6d360814 ___free_lconv_mon 14 API calls 16766->16773 16774 6d360814 ___free_lconv_mon 14 API calls 16767->16774 16780 6d365036 16768->16780 16771 6d36310e 16769->16771 16772 6d363171 16770->16772 16808 6d365134 16771->16808 16778 6d360814 ___free_lconv_mon 14 API calls 16772->16778 16773->16753 16779 6d3631f0 16774->16779 16776->16762 16778->16754 16779->16748 16781 6d365047 16780->16781 16807 6d365130 16780->16807 16782 6d365058 16781->16782 16783 6d360814 ___free_lconv_mon 14 API calls 16781->16783 16784 6d36506a 16782->16784 16786 6d360814 ___free_lconv_mon 14 API calls 16782->16786 16783->16782 16785 6d36507c 16784->16785 16787 6d360814 ___free_lconv_mon 14 API calls 16784->16787 16788 6d36508e 16785->16788 16789 6d360814 ___free_lconv_mon 14 API calls 16785->16789 16786->16784 16787->16785 16790 6d360814 ___free_lconv_mon 14 API calls 16788->16790 16792 6d3650a0 16788->16792 16789->16788 16790->16792 16791 6d3650b2 16793 6d3650c4 16791->16793 16795 6d360814 ___free_lconv_mon 14 API calls 16791->16795 16792->16791 16794 6d360814 ___free_lconv_mon 14 API calls 16792->16794 16796 6d3650d6 16793->16796 16797 6d360814 ___free_lconv_mon 14 API calls 16793->16797 16794->16791 16795->16793 16798 6d3650e8 16796->16798 16799 6d360814 ___free_lconv_mon 14 API calls 16796->16799 16797->16796 16800 6d3650fa 16798->16800 16802 6d360814 ___free_lconv_mon 14 API calls 16798->16802 16799->16798 16801 6d36510c 16800->16801 16803 6d360814 ___free_lconv_mon 14 API calls 16800->16803 16804 6d36511e 16801->16804 16805 6d360814 ___free_lconv_mon 14 API calls 16801->16805 16802->16800 16803->16801 16806 6d360814 ___free_lconv_mon 14 API calls 16804->16806 16804->16807 16805->16804 16806->16807 16807->16758 16809 6d365141 16808->16809 16810 6d365199 16808->16810 16811 6d365151 16809->16811 16812 6d360814 ___free_lconv_mon 14 API calls 16809->16812 16810->16760 16813 6d365163 16811->16813 16814 6d360814 ___free_lconv_mon 14 API calls 16811->16814 16812->16811 16815 6d365175 16813->16815 16816 6d360814 ___free_lconv_mon 14 API calls 16813->16816 16814->16813 16817 6d365187 16815->16817 16818 6d360814 ___free_lconv_mon 14 API calls 16815->16818 16816->16815 16817->16810 16819 6d360814 ___free_lconv_mon 14 API calls 16817->16819 16818->16817 16819->16810 16821 6d36322c 16820->16821 16822 6d36324b 16820->16822 16821->16822 16826 6d3651c2 16821->16826 16822->16762 16825 6d360814 ___free_lconv_mon 14 API calls 16825->16822 16827 6d363245 16826->16827 16828 6d3651d3 16826->16828 16827->16825 16829 6d36519d __dosmaperr 14 API calls 16828->16829 16830 6d3651db 16829->16830 16831 6d36519d __dosmaperr 14 API calls 16830->16831 16832 6d3651e6 16831->16832 16833 6d36519d __dosmaperr 14 API calls 16832->16833 16834 6d3651f1 16833->16834 16835 6d36519d __dosmaperr 14 API calls 16834->16835 16836 6d3651fc 16835->16836 16837 6d36519d __dosmaperr 14 API calls 16836->16837 16838 6d36520a 16837->16838 16839 6d360814 ___free_lconv_mon 14 API calls 16838->16839 16840 6d365215 16839->16840 16841 6d360814 ___free_lconv_mon 14 API calls 16840->16841 16842 6d365220 16841->16842 16843 6d360814 ___free_lconv_mon 14 API calls 16842->16843 16844 6d36522b 16843->16844 16845 6d36519d __dosmaperr 14 API calls 16844->16845 16846 6d365239 16845->16846 16847 6d36519d __dosmaperr 14 API calls 16846->16847 16848 6d365247 16847->16848 16849 6d36519d __dosmaperr 14 API calls 16848->16849 16850 6d365258 16849->16850 16851 6d36519d __dosmaperr 14 API calls 16850->16851 16852 6d365266 16851->16852 16853 6d36519d __dosmaperr 14 API calls 16852->16853 16854 6d365274 16853->16854 16855 6d360814 ___free_lconv_mon 14 API calls 16854->16855 16856 6d36527f 16855->16856 16857 6d360814 ___free_lconv_mon 14 API calls 16856->16857 16858 6d36528a 16857->16858 16859 6d360814 ___free_lconv_mon 14 API calls 16858->16859 16860 6d365295 16859->16860 16861 6d360814 ___free_lconv_mon 14 API calls 16860->16861 16861->16827 16862->16751 16866 6d360218 GetLastError 16863->16866 16865 6d3607a9 16865->16719 16867 6d36022e 16866->16867 16870 6d360234 16866->16870 16868 6d3620fa __dosmaperr 6 API calls 16867->16868 16868->16870 16869 6d362139 __dosmaperr 6 API calls 16871 6d360250 16869->16871 16870->16869 16886 6d360238 SetLastError 16870->16886 16871->16886 16889 6d3607b7 16871->16889 16875 6d36027e 16878 6d362139 __dosmaperr 6 API calls 16875->16878 16876 6d36026d 16877 6d362139 __dosmaperr 6 API calls 16876->16877 16879 6d36027b 16877->16879 16880 6d36028a 16878->16880 16885 6d360814 ___free_lconv_mon 12 API calls 16879->16885 16881 6d3602a5 16880->16881 16882 6d36028e 16880->16882 16896 6d35fec9 16881->16896 16884 6d362139 __dosmaperr 6 API calls 16882->16884 16884->16879 16885->16886 16886->16865 16888 6d360814 ___free_lconv_mon 12 API calls 16888->16886 16895 6d3607c4 __dosmaperr 16889->16895 16890 6d360804 16892 6d3607a4 __dosmaperr 13 API calls 16890->16892 16891 6d3607ef HeapAlloc 16893 6d360265 16891->16893 16891->16895 16892->16893 16893->16875 16893->16876 16895->16890 16895->16891 16901 6d362553 16895->16901 16910 6d35fd5d 16896->16910 16904 6d36257f 16901->16904 16905 6d36258b ___scrt_is_nonwritable_in_current_image 16904->16905 16906 6d3603f3 __FrameHandler3::FrameUnwindToState EnterCriticalSection 16905->16906 16907 6d362596 __FrameHandler3::FrameUnwindToState 16906->16907 16908 6d3625cd __dosmaperr LeaveCriticalSection 16907->16908 16909 6d36255e 16908->16909 16909->16895 16911 6d35fd69 ___scrt_is_nonwritable_in_current_image 16910->16911 16924 6d3603f3 EnterCriticalSection 16911->16924 16913 6d35fd73 16925 6d35fda3 16913->16925 16916 6d35fe6f 16917 6d35fe7b ___scrt_is_nonwritable_in_current_image 16916->16917 16928 6d3603f3 EnterCriticalSection 16917->16928 16919 6d35fe85 16920 6d360050 __dosmaperr 14 API calls 16919->16920 16921 6d35fe9d 16920->16921 16929 6d35febd 16921->16929 16924->16913 16926 6d36043b __FrameHandler3::FrameUnwindToState LeaveCriticalSection 16925->16926 16927 6d35fd91 16926->16927 16927->16916 16928->16919 16930 6d36043b __FrameHandler3::FrameUnwindToState LeaveCriticalSection 16929->16930 16931 6d35feab 16930->16931 16931->16888 16933 6d35c324 16932->16933 16934 6d35d57d 16932->16934 16933->16481 16940 6d35dc43 16934->16940 16937 6d35dc7e ___vcrt_FlsSetValue 6 API calls 16938 6d35d593 16937->16938 16945 6d35d557 16938->16945 16941 6d35dae2 ___vcrt_InitializeCriticalSectionEx 5 API calls 16940->16941 16942 6d35dc5d 16941->16942 16943 6d35dc75 TlsGetValue 16942->16943 16944 6d35d584 16942->16944 16943->16944 16944->16937 16946 6d35d561 16945->16946 16947 6d35d56e 16945->16947 16946->16947 16949 6d35fa29 16946->16949 16947->16933 16950 6d360814 ___free_lconv_mon 14 API calls 16949->16950 16951 6d35fa41 16950->16951 16951->16947 16958 6d35d5ac 16952->16958 16954 6d35c300 16954->16508 16955 6d35f998 16954->16955 16956 6d360218 __dosmaperr 14 API calls 16955->16956 16957 6d35c30c 16956->16957 16957->16506 16957->16507 16959 6d35d5b5 16958->16959 16960 6d35d5b8 GetLastError 16958->16960 16959->16954 16961 6d35dc43 ___vcrt_FlsGetValue 6 API calls 16960->16961 16962 6d35d5cd 16961->16962 16963 6d35d632 SetLastError 16962->16963 16964 6d35dc7e ___vcrt_FlsSetValue 6 API calls 16962->16964 16971 6d35d5ec 16962->16971 16963->16954 16965 6d35d5e6 __InternalCxxFrameHandler 16964->16965 16966 6d35d60e 16965->16966 16967 6d35dc7e ___vcrt_FlsSetValue 6 API calls 16965->16967 16965->16971 16968 6d35dc7e ___vcrt_FlsSetValue 6 API calls 16966->16968 16969 6d35d622 16966->16969 16967->16966 16968->16969 16970 6d35fa29 ___std_exception_copy 14 API calls 16969->16970 16970->16971 16971->16963 16973 6d35c360 ___scrt_release_startup_lock 16972->16973 16974 6d35c364 16973->16974 16976 6d35c370 __DllMainCRTStartup@12 16973->16976 16997 6d35f802 16974->16997 16978 6d35c37d 16976->16978 17001 6d35efeb 16976->17001 16977 6d35c36e 16977->16516 16978->16516 17070 6d35d19a InterlockedFlushSList 16981->17070 16985 6d35c508 16984->16985 16986 6d35beae 16985->16986 17074 6d35f9ab 16985->17074 16990 6d35beea 16986->16990 16988 6d35c516 16989 6d35d1ef ___scrt_uninitialize_crt 7 API calls 16988->16989 16989->16986 17173 6d35c37e 16990->17173 16994 6d35b72b 16993->16994 16995 6d35bce0 _ValidateLocalCookies 5 API calls 16994->16995 16996 6d35bcaa 16995->16996 16996->16528 16996->16531 16998 6d35f80e __EH_prolog3 16997->16998 17012 6d35f6cd 16998->17012 17000 6d35f835 __DllMainCRTStartup@12 17000->16977 17002 6d35f018 17001->17002 17010 6d35f029 17001->17010 17029 6d35f0b3 GetModuleHandleW 17002->17029 17007 6d35f067 17007->16516 17036 6d35ee9b 17010->17036 17013 6d35f6d9 ___scrt_is_nonwritable_in_current_image 17012->17013 17020 6d3603f3 EnterCriticalSection 17013->17020 17015 6d35f6e7 17021 6d35f728 17015->17021 17020->17015 17022 6d35f747 17021->17022 17023 6d35f6f4 17021->17023 17022->17023 17024 6d360814 ___free_lconv_mon 14 API calls 17022->17024 17025 6d35f71c 17023->17025 17024->17023 17028 6d36043b LeaveCriticalSection 17025->17028 17027 6d35f705 17027->17000 17028->17027 17030 6d35f01d 17029->17030 17030->17010 17031 6d35f10e GetModuleHandleExW 17030->17031 17032 6d35f14d GetProcAddress 17031->17032 17033 6d35f161 17031->17033 17032->17033 17034 6d35f174 FreeLibrary 17033->17034 17035 6d35f17d 17033->17035 17034->17035 17035->17010 17037 6d35eea7 ___scrt_is_nonwritable_in_current_image 17036->17037 17051 6d3603f3 EnterCriticalSection 17037->17051 17039 6d35eeb1 17052 6d35ef03 17039->17052 17041 6d35eebe 17056 6d35eedc 17041->17056 17044 6d35f082 17060 6d35f0f5 17044->17060 17046 6d35f08c 17047 6d35f0a0 17046->17047 17048 6d35f090 GetCurrentProcess TerminateProcess 17046->17048 17049 6d35f10e __FrameHandler3::FrameUnwindToState 3 API calls 17047->17049 17048->17047 17050 6d35f0a8 ExitProcess 17049->17050 17051->17039 17054 6d35ef0f ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 17052->17054 17053 6d35ef73 __FrameHandler3::FrameUnwindToState 17053->17041 17054->17053 17055 6d35f802 __DllMainCRTStartup@12 14 API calls 17054->17055 17055->17053 17059 6d36043b LeaveCriticalSection 17056->17059 17058 6d35eeca 17058->17007 17058->17044 17059->17058 17063 6d360477 17060->17063 17062 6d35f0fa __FrameHandler3::FrameUnwindToState 17062->17046 17064 6d360486 __FrameHandler3::FrameUnwindToState 17063->17064 17065 6d360493 17064->17065 17067 6d36201d 17064->17067 17065->17062 17068 6d361f98 __dosmaperr 5 API calls 17067->17068 17069 6d362039 17068->17069 17069->17065 17071 6d35c221 17070->17071 17072 6d35d1aa 17070->17072 17071->16518 17072->17071 17073 6d35fa29 ___std_exception_copy 14 API calls 17072->17073 17073->17072 17075 6d35f9b6 17074->17075 17076 6d35f9c8 ___scrt_uninitialize_crt 17074->17076 17077 6d35f9c4 17075->17077 17079 6d362be8 17075->17079 17076->16988 17077->16988 17082 6d362a79 17079->17082 17085 6d3629cd 17082->17085 17086 6d3629d9 ___scrt_is_nonwritable_in_current_image 17085->17086 17093 6d3603f3 EnterCriticalSection 17086->17093 17088 6d362a4f 17102 6d362a6d 17088->17102 17090 6d3629e3 ___scrt_uninitialize_crt 17090->17088 17094 6d362941 17090->17094 17093->17090 17095 6d36294d ___scrt_is_nonwritable_in_current_image 17094->17095 17105 6d362d05 EnterCriticalSection 17095->17105 17097 6d362957 ___scrt_uninitialize_crt 17101 6d362990 17097->17101 17106 6d362b83 17097->17106 17117 6d3629c1 17101->17117 17172 6d36043b LeaveCriticalSection 17102->17172 17104 6d362a5b 17104->17077 17105->17097 17107 6d362b98 ___std_exception_copy 17106->17107 17108 6d362b9f 17107->17108 17109 6d362baa 17107->17109 17111 6d362a79 ___scrt_uninitialize_crt 68 API calls 17108->17111 17120 6d362b1a 17109->17120 17114 6d362ba5 ___std_exception_copy 17111->17114 17114->17101 17115 6d362bcb 17133 6d364225 17115->17133 17171 6d362d19 LeaveCriticalSection 17117->17171 17119 6d3629af 17119->17090 17121 6d362b33 17120->17121 17125 6d362b5a 17120->17125 17122 6d362f6a ___scrt_uninitialize_crt 29 API calls 17121->17122 17121->17125 17123 6d362b4f 17122->17123 17144 6d364a44 17123->17144 17125->17114 17126 6d362f6a 17125->17126 17127 6d362f76 17126->17127 17128 6d362f8b 17126->17128 17129 6d3607a4 __dosmaperr 14 API calls 17127->17129 17128->17115 17130 6d362f7b 17129->17130 17155 6d3606c3 17130->17155 17134 6d364236 17133->17134 17135 6d364243 17133->17135 17137 6d3607a4 __dosmaperr 14 API calls 17134->17137 17136 6d36428c 17135->17136 17139 6d36426a 17135->17139 17138 6d3607a4 __dosmaperr 14 API calls 17136->17138 17143 6d36423b 17137->17143 17140 6d364291 17138->17140 17158 6d364183 17139->17158 17142 6d3606c3 ___std_exception_copy 29 API calls 17140->17142 17142->17143 17143->17114 17146 6d364a50 ___scrt_is_nonwritable_in_current_image 17144->17146 17145 6d364a58 17145->17125 17146->17145 17147 6d364a91 17146->17147 17149 6d364ad7 17146->17149 17148 6d360646 ___std_exception_copy 29 API calls 17147->17148 17148->17145 17150 6d364042 ___scrt_uninitialize_crt EnterCriticalSection 17149->17150 17151 6d364add 17150->17151 17152 6d364afb 17151->17152 17153 6d364b55 ___scrt_uninitialize_crt 62 API calls 17151->17153 17154 6d364b4d ___scrt_uninitialize_crt LeaveCriticalSection 17152->17154 17153->17152 17154->17145 17156 6d36060f ___std_exception_copy 29 API calls 17155->17156 17157 6d3606cf 17156->17157 17157->17115 17159 6d36418f ___scrt_is_nonwritable_in_current_image 17158->17159 17160 6d364042 ___scrt_uninitialize_crt EnterCriticalSection 17159->17160 17161 6d36419e 17160->17161 17162 6d364119 ___scrt_uninitialize_crt 29 API calls 17161->17162 17169 6d3641e3 17161->17169 17164 6d3641ca FlushFileBuffers 17162->17164 17163 6d3607a4 __dosmaperr 14 API calls 17165 6d3641ea 17163->17165 17164->17165 17166 6d3641d6 GetLastError 17164->17166 17168 6d364219 ___scrt_uninitialize_crt LeaveCriticalSection 17165->17168 17167 6d360791 __dosmaperr 14 API calls 17166->17167 17167->17169 17170 6d364202 17168->17170 17169->17163 17170->17143 17171->17119 17172->17104 17178 6d35f9db 17173->17178 17176 6d35d671 ___vcrt_uninitialize_ptd 6 API calls 17177 6d35beef 17176->17177 17177->16527 17181 6d360398 17178->17181 17182 6d3603a2 17181->17182 17183 6d35c385 17181->17183 17185 6d3620bb 17182->17185 17183->17176 17186 6d361f98 __dosmaperr 5 API calls 17185->17186 17187 6d3620d7 17186->17187 17188 6d3620f2 TlsFree 17187->17188 17189 6d3620e0 17187->17189 17189->17183 17190 6d35c02e 17191 6d35c037 17190->17191 17192 6d35c03c 17190->17192 17211 6d35c1c0 17191->17211 17196 6d35bef8 17192->17196 17197 6d35bf04 ___scrt_is_nonwritable_in_current_image 17196->17197 17198 6d35bf2d dllmain_raw 17197->17198 17199 6d35bf28 17197->17199 17207 6d35bf13 17197->17207 17200 6d35bf47 dllmain_crt_dispatch 17198->17200 17198->17207 17201 6d35b700 __DllMainCRTStartup@12 5 API calls 17199->17201 17200->17199 17200->17207 17202 6d35bf68 17201->17202 17203 6d35bf99 17202->17203 17206 6d35b700 __DllMainCRTStartup@12 5 API calls 17202->17206 17204 6d35bfa2 dllmain_crt_dispatch 17203->17204 17203->17207 17205 6d35bfb5 dllmain_raw 17204->17205 17204->17207 17205->17207 17208 6d35bf80 17206->17208 17209 6d35be48 __DllMainCRTStartup@12 86 API calls 17208->17209 17210 6d35bf8e dllmain_raw 17209->17210 17210->17203 17212 6d35c1d6 17211->17212 17214 6d35c1df 17212->17214 17215 6d35c173 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 17212->17215 17214->17192 17215->17214
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: Process$Memory$Write$AllocVirtualWindow$Thread$CloseConsoleContextHandleShowWow64$CreateReadResume
                        • String ID: (]x$/C}$/C}$;)vP$;)vP$?}[$@$AOVu$C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe$C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe$D$FPj$MZx$Mw;"$Z[33$kernel32.dll$ntdll.dll$wTyI$@3
                        • API String ID: 2435830915-1568329391
                        • Opcode ID: 9ab098ad8d95c35facbc560893c0967887e4ea600dfe374bbf36e4873b715eee
                        • Instruction ID: 5691df6b5bbb590ad3d0ad5cdef2cc1bfd105765be9fdbc45a45a8014daec088
                        • Opcode Fuzzy Hash: 9ab098ad8d95c35facbc560893c0967887e4ea600dfe374bbf36e4873b715eee
                        • Instruction Fuzzy Hash: 96D34731A54259CFCB19CE2CCAC2BE977F5BB5B310F008289D615AB394C7369E948F61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: CloseHandle$FileModule$Create$InformationMapping$ChangeCurrentFindNameNotificationProcessProtectVirtual
                        • String ID: .text$@$Mw;"$p~1r$p~1r
                        • API String ID: 2714264131-2743371051
                        • Opcode ID: 71f3923d3451390f5dd5ab529eb611f2a9dfbdff328a1712cb8c1691baa1a435
                        • Instruction ID: 5901b2b5bb80fd8c7a9f9fdbc359b0bf90c58781649d8e3328db49952b2aebe9
                        • Opcode Fuzzy Hash: 71f3923d3451390f5dd5ab529eb611f2a9dfbdff328a1712cb8c1691baa1a435
                        • Instruction Fuzzy Hash: 7BE2DE76A143058FCB14CF2CC995BDEBBF5BB4A314F008259D95ADB390C7368989CB52

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1536 6d3530c0-6d3530d5 1537 6d3530dc-6d3530e7 1536->1537 1538 6d3530ed-6d3530fa 1537->1538 1539 6d3532aa-6d3532b7 1537->1539 1542 6d353100-6d35310d 1538->1542 1543 6d3534c2-6d3534cc 1538->1543 1540 6d3534d8 1539->1540 1540->1537 1545 6d353113-6d353120 1542->1545 1546 6d353302-6d353376 1542->1546 1543->1540 1548 6d353126-6d353133 1545->1548 1549 6d353222-6d3532a5 GetProcAddress call 6d35c8e0 NtQueryInformationProcess 1545->1549 1546->1540 1552 6d353399-6d3533a7 1548->1552 1553 6d353139-6d353146 1548->1553 1549->1540 1552->1540 1556 6d35314c-6d353159 1553->1556 1557 6d3534a8-6d3534c1 call 6d35bce0 1553->1557 1560 6d353435-6d3534a3 1556->1560 1561 6d35315f-6d35316c 1556->1561 1560->1540 1564 6d353201-6d35321d GetModuleHandleW 1561->1564 1565 6d353172-6d35317f 1561->1565 1564->1540 1567 6d353185-6d353192 1565->1567 1568 6d3533ac-6d3533b3 1565->1568 1570 6d353198-6d3531a5 1567->1570 1571 6d3533ca-6d353430 1567->1571 1568->1540 1573 6d3532bc-6d3532fd 1570->1573 1574 6d3531ab-6d3531b8 1570->1574 1571->1540 1573->1540 1576 6d3531be-6d3531cb 1574->1576 1577 6d35337b-6d353382 1574->1577 1579 6d3534d1 1576->1579 1580 6d3531d1-6d3531de 1576->1580 1577->1540 1579->1540 1582 6d3531e4-6d3531f1 1580->1582 1583 6d353387-6d353394 1580->1583 1585 6d3531f7-6d3531fc 1582->1585 1586 6d3533b8-6d3533c5 1582->1586 1583->1540 1585->1540 1586->1540
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID: Mw;"$NtQueryInformationProcess$ntdll.dll
                        • API String ID: 4139908857-1162797286
                        • Opcode ID: 848dfa3f7a40b8f5533a8396ab3f1f2087b12d46b4406fdc4aab2977195b61dc
                        • Instruction ID: 34167c6541f2c86fcd7b41efa4d723664667a22d103be7ac9189c49c03ebbeb3
                        • Opcode Fuzzy Hash: 848dfa3f7a40b8f5533a8396ab3f1f2087b12d46b4406fdc4aab2977195b61dc
                        • Instruction Fuzzy Hash: 18A10F71A542099FCF06CFBCC595BEDBBF9BB46310F118529D924EB390C6369A09CB21

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1588 6d35be48-6d35be5b call 6d35c6a0 1591 6d35be61-6d35be83 call 6d35c290 1588->1591 1592 6d35be5d-6d35be5f 1588->1592 1596 6d35be85-6d35bec8 call 6d35c35b call 6d35c217 call 6d35c673 call 6d35bedd call 6d35c4fc call 6d35beea 1591->1596 1597 6d35bef0-6d35bf09 call 6d35c52a call 6d35c6a0 1591->1597 1593 6d35beca-6d35bed9 1592->1593 1596->1593 1609 6d35bf0b-6d35bf11 1597->1609 1610 6d35bf1a-6d35bf21 1597->1610 1609->1610 1614 6d35bf13-6d35bf15 1609->1614 1612 6d35bf23-6d35bf26 1610->1612 1613 6d35bf2d-6d35bf41 dllmain_raw 1610->1613 1612->1613 1617 6d35bf28-6d35bf2b 1612->1617 1618 6d35bf47-6d35bf58 dllmain_crt_dispatch 1613->1618 1619 6d35bfea-6d35bff1 1613->1619 1615 6d35bff3-6d35c002 1614->1615 1621 6d35bf5e-6d35bf70 call 6d35b700 1617->1621 1618->1619 1618->1621 1619->1615 1627 6d35bf72-6d35bf74 1621->1627 1628 6d35bf99-6d35bf9b 1621->1628 1627->1628 1629 6d35bf76-6d35bf94 call 6d35b700 call 6d35be48 dllmain_raw 1627->1629 1630 6d35bfa2-6d35bfb3 dllmain_crt_dispatch 1628->1630 1631 6d35bf9d-6d35bfa0 1628->1631 1629->1628 1630->1619 1632 6d35bfb5-6d35bfe7 dllmain_raw 1630->1632 1631->1619 1631->1630 1632->1619
                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6D35BE8F
                        • ___scrt_uninitialize_crt.LIBCMT ref: 6D35BEA9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: Initialize___scrt_uninitialize_crt
                        • String ID:
                        • API String ID: 2442719207-0
                        • Opcode ID: 414d5d5f5d20ce30bc3fe61c9940afc9aa78c02474d952e414795cb5fdd7cb84
                        • Instruction ID: 44c0ac0ad04692f122b5820fc0f5ae6961eb69ce6b18eaf6698aeb11626f01b7
                        • Opcode Fuzzy Hash: 414d5d5f5d20ce30bc3fe61c9940afc9aa78c02474d952e414795cb5fdd7cb84
                        • Instruction Fuzzy Hash: 9941D172D0821AAFDB218F55CC41FBE7BB8EB817A8F068119EA556F140C7318961CFA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1638 6d35bef8-6d35bf09 call 6d35c6a0 1641 6d35bf0b-6d35bf11 1638->1641 1642 6d35bf1a-6d35bf21 1638->1642 1641->1642 1645 6d35bf13-6d35bf15 1641->1645 1643 6d35bf23-6d35bf26 1642->1643 1644 6d35bf2d-6d35bf41 dllmain_raw 1642->1644 1643->1644 1647 6d35bf28-6d35bf2b 1643->1647 1648 6d35bf47-6d35bf58 dllmain_crt_dispatch 1644->1648 1649 6d35bfea-6d35bff1 1644->1649 1646 6d35bff3-6d35c002 1645->1646 1650 6d35bf5e-6d35bf70 call 6d35b700 1647->1650 1648->1649 1648->1650 1649->1646 1653 6d35bf72-6d35bf74 1650->1653 1654 6d35bf99-6d35bf9b 1650->1654 1653->1654 1655 6d35bf76-6d35bf94 call 6d35b700 call 6d35be48 dllmain_raw 1653->1655 1656 6d35bfa2-6d35bfb3 dllmain_crt_dispatch 1654->1656 1657 6d35bf9d-6d35bfa0 1654->1657 1655->1654 1656->1649 1658 6d35bfb5-6d35bfe7 dllmain_raw 1656->1658 1657->1649 1657->1656 1658->1649
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: dllmain_raw$dllmain_crt_dispatch
                        • String ID:
                        • API String ID: 3136044242-0
                        • Opcode ID: 73c49a63e2d07f40879ecef45001e5e1cdd9b2ff542f3ae1f8caccab6d346b25
                        • Instruction ID: b4c4b6eefdecd5b6c19daa123640231b68896a1b9107b76318192c29dfa3c5f4
                        • Opcode Fuzzy Hash: 73c49a63e2d07f40879ecef45001e5e1cdd9b2ff542f3ae1f8caccab6d346b25
                        • Instruction Fuzzy Hash: 8D216D76D0821AABDB228E15CC41F7F3A79EB81A94F028115F9156F210C7328D618FA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1664 6d35bd41-6d35bd4f call 6d35c6a0 call 6d35c38b 1668 6d35bd54-6d35bd57 1664->1668 1669 6d35bd5d-6d35bd75 call 6d35c290 1668->1669 1670 6d35be2e 1668->1670 1674 6d35be40-6d35be47 call 6d35c52a 1669->1674 1675 6d35bd7b-6d35bd8c call 6d35c2ed 1669->1675 1671 6d35be30-6d35be3f 1670->1671 1680 6d35bd8e-6d35bdb0 call 6d35c647 call 6d35c20b call 6d35c22f call 6d35ed07 1675->1680 1681 6d35bddb-6d35bde9 call 6d35be24 1675->1681 1680->1681 1700 6d35bdb2-6d35bdb9 call 6d35c2c2 1680->1700 1681->1670 1686 6d35bdeb-6d35bdf5 call 6d35c524 1681->1686 1692 6d35bdf7-6d35be00 call 6d35c44b 1686->1692 1693 6d35be16-6d35be1f 1686->1693 1692->1693 1699 6d35be02-6d35be14 1692->1699 1693->1671 1699->1693 1700->1681 1704 6d35bdbb-6d35bdd8 call 6d35ecdc 1700->1704 1704->1681
                        APIs
                        • __RTC_Initialize.LIBCMT ref: 6D35BD8E
                          • Part of subcall function 6D35C20B: InitializeSListHead.KERNEL32(6D3B9220,6D35BD98,6D36D650,00000010,6D35BD29,?,?,?,6D35BF51,?,00000001,?,?,00000001,?,6D36D698), ref: 6D35C210
                        • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 6D35BDF8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
                        • String ID:
                        • API String ID: 3231365870-0
                        • Opcode ID: aa8d48243688c2b5a072bda5d9f98aaf5628d2d01db5326943bcd019455f46ac
                        • Instruction ID: 3a3ccbdd681740dd466b7e5916a9a6fb6c99c1f8b60766eeca1d462d21b389ee
                        • Opcode Fuzzy Hash: aa8d48243688c2b5a072bda5d9f98aaf5628d2d01db5326943bcd019455f46ac
                        • Instruction Fuzzy Hash: E321D23250D246AEDF119FB4A446FBD77A09F1A3ACF1A8419D7C16F2C2CB724170C666

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1707 6d36236f-6d362374 1708 6d362376-6d36238e 1707->1708 1709 6d362390-6d362394 1708->1709 1710 6d36239c-6d3623a5 1708->1710 1709->1710 1711 6d362396-6d36239a 1709->1711 1712 6d3623b7 1710->1712 1713 6d3623a7-6d3623aa 1710->1713 1714 6d362411-6d362415 1711->1714 1717 6d3623b9-6d3623c6 GetStdHandle 1712->1717 1715 6d3623b3-6d3623b5 1713->1715 1716 6d3623ac-6d3623b1 1713->1716 1714->1708 1718 6d36241b-6d36241e 1714->1718 1715->1717 1716->1717 1719 6d3623f3-6d362405 1717->1719 1720 6d3623c8-6d3623ca 1717->1720 1719->1714 1721 6d362407-6d36240a 1719->1721 1720->1719 1722 6d3623cc-6d3623d5 GetFileType 1720->1722 1721->1714 1722->1719 1723 6d3623d7-6d3623e0 1722->1723 1724 6d3623e2-6d3623e6 1723->1724 1725 6d3623e8-6d3623eb 1723->1725 1724->1714 1725->1714 1726 6d3623ed-6d3623f1 1725->1726 1726->1714
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 6D3623BB
                        • GetFileType.KERNELBASE(00000000), ref: 6D3623CD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: FileHandleType
                        • String ID:
                        • API String ID: 3000768030-0
                        • Opcode ID: 5ab87a3397705c84c80e3f4f2b99bdc026f592c0ba4df807f297d6918f1906d8
                        • Instruction ID: a99787df47de07d063d33b90f2e57db622ea6256a2a14b07b718ef46b4bdd7b7
                        • Opcode Fuzzy Hash: 5ab87a3397705c84c80e3f4f2b99bdc026f592c0ba4df807f297d6918f1906d8
                        • Instruction Fuzzy Hash: 1911A239504BD24AD7314E3E8E896327AA8B767630B36072AE5B98A1F5C331D4868671

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1782 6d38c3f0-6d38c5de 1783 6d38c63d-6d38c90f 1782->1783 1784 6d38c5e0-6d38c63b 1782->1784 1785 6d38c98f-6d38cbab 1783->1785 1786 6d38c911 1783->1786 1784->1783 1784->1784 1788 6d38cc2c-6d38ce4a 1785->1788 1789 6d38cbad-6d38cbaf 1785->1789 1787 6d38c920-6d38c98d 1786->1787 1787->1785 1787->1787 1791 6d38ce4c-6d38ce4f 1788->1791 1792 6d38ceaf-6d38d0cf 1788->1792 1790 6d38cbb0-6d38cc2a 1789->1790 1790->1788 1790->1790 1793 6d38ce50-6d38cead 1791->1793 1794 6d38d14b-6d38d1b6 1792->1794 1795 6d38d0d1 1792->1795 1793->1792 1793->1793 1796 6d38d0e0-6d38d149 1795->1796 1796->1794 1796->1796
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: I:K$*])_$*m(o$+U*W$0A6C$<M?O$<u>w$?]._$RG$TU$VY$Y\$ZR$rEpG$xQiS$uw
                        • API String ID: 0-1428941810
                        • Opcode ID: 730a38e5ee4b8d9e82d9c9f81d6edce7ad9572504c3a7a7f1d29d336ddd60cb6
                        • Instruction ID: 9076c503f15235010854fcb7bf580da645d7d01180055881637f60a13973c3aa
                        • Opcode Fuzzy Hash: 730a38e5ee4b8d9e82d9c9f81d6edce7ad9572504c3a7a7f1d29d336ddd60cb6
                        • Instruction Fuzzy Hash: 4252B8B42093858BE3B8CF15D891BDEBBE1FB85344F90892DC5D99B245DB748086CF92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4!$@e$E0$PP/R$UXtu$VT."$azbc$h]mX$jzy{
                        • API String ID: 0-1729160369
                        • Opcode ID: 26ae9fcd58b3f6786542e21ce4fc92687753ff49fa868cc28f206eb9c15718af
                        • Instruction ID: e36d73dba8081826dcc2b0a6f2085298ed049883128e55d2b3aaa57ad8eefed3
                        • Opcode Fuzzy Hash: 26ae9fcd58b3f6786542e21ce4fc92687753ff49fa868cc28f206eb9c15718af
                        • Instruction Fuzzy Hash: F4B176B11087828BD315CF29C49175BFBE0AF96744F28895CE4D58B362C339D94ACB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$LM$crkr$eqXO$sbe`${nvo
                        • API String ID: 0-764911014
                        • Opcode ID: c72436e967dd020598ea26fc11812944d36d4ecbe61a5a04e70b9d7248f53b62
                        • Instruction ID: 25b8aeda954816e7507aa7f437a2a6f6750fedd38a609f83bfa914c83c546b60
                        • Opcode Fuzzy Hash: c72436e967dd020598ea26fc11812944d36d4ecbe61a5a04e70b9d7248f53b62
                        • Instruction Fuzzy Hash: D70243B0618381AFD324CF24C990B6BBBE2FBC5744F54992DE4C98B291D738D805DB56
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 3Q1S$3y$LM$h-O/$w${q
                        • API String ID: 0-882505063
                        • Opcode ID: aba745d65a786982f72d6073588b0bae3dccfde096a9c631333cee765fbf91ad
                        • Instruction ID: d9ba9b82b027493a264afd514c35c0d84726d78ed6b6933ad4aa298ea44b85c3
                        • Opcode Fuzzy Hash: aba745d65a786982f72d6073588b0bae3dccfde096a9c631333cee765fbf91ad
                        • Instruction Fuzzy Hash: 7EC178765083409FC718CF04C8A066FBBE1AFC6358F158D1DE8EA5B342D7359A4ACB86
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6D3605BF
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6D3605C9
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6D3605D6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID: Mw;"
                        • API String ID: 3906539128-4032204789
                        • Opcode ID: cbe067f019af41e99465d3561fa867e26fc01131fe1e5158455496e672ddadfe
                        • Instruction ID: 004f44cddaea8f4b729007e5c7eda90413bb138053dc07914c09229888352899
                        • Opcode Fuzzy Hash: cbe067f019af41e99465d3561fa867e26fc01131fe1e5158455496e672ddadfe
                        • Instruction Fuzzy Hash: 3B31E87490121DABCF21DF24D889B9DBBB8BF08314F5045EAE51CA7250EB309B81CF55
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6D35C536
                        • IsDebuggerPresent.KERNEL32 ref: 6D35C602
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D35C61B
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 6D35C625
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: 248c87fdb417a8b2ab210b11ee62b2cbb2aed7c1e07b5ca4697053863a485d54
                        • Instruction ID: 58b5014ee6226998e8b9a8fcf392b02ebccde360fdc19e6cc0ad9e6b2ea9f76a
                        • Opcode Fuzzy Hash: 248c87fdb417a8b2ab210b11ee62b2cbb2aed7c1e07b5ca4697053863a485d54
                        • Instruction Fuzzy Hash: 1E31FAB5D05219ABDF10DF64C949BCDBBB8AF08704F1045DAE50CA7240EB719B84DF45
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: XHPT$\GAB$^\MR$szuj
                        • API String ID: 0-3987498118
                        • Opcode ID: 2a7779406c5e186560119268a970c5b325f2bb7c2292b06e581ec82687796933
                        • Instruction ID: b99cb8abfaf8bc3e799668ae8912be7263528c6e02d90b56d8865f2fce817b1f
                        • Opcode Fuzzy Hash: 2a7779406c5e186560119268a970c5b325f2bb7c2292b06e581ec82687796933
                        • Instruction Fuzzy Hash: D6B18B7150C3818FD315CF28C49176BBBE2AFD6304F19886DE4DA8B392D7358909CB62
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: " !&$E107$a
                        • API String ID: 0-2520488126
                        • Opcode ID: 6c19a60f49acc049798ee96403bdb3d3dab617d5da4f9548f194deebaadadbe7
                        • Instruction ID: 8ca24bde95223c60d536314edb2aa708caa3406e91191a6ce2b6d623635dfd98
                        • Opcode Fuzzy Hash: 6c19a60f49acc049798ee96403bdb3d3dab617d5da4f9548f194deebaadadbe7
                        • Instruction Fuzzy Hash: 1751BE72A183918FD335CF14D491BABB7E1EBD1310F45892ED5CA8B382DA749845CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: Mw;"
                        • API String ID: 0-4032204789
                        • Opcode ID: 7c14f1569c1dd09152c3730d8ef50a06b1220acecf3a2b5233005870ec3f835b
                        • Instruction ID: 189ab02ea3dac372aa796d2b10076c79c5a105c149df144c246cbc3b951c6568
                        • Opcode Fuzzy Hash: 7c14f1569c1dd09152c3730d8ef50a06b1220acecf3a2b5233005870ec3f835b
                        • Instruction Fuzzy Hash: FD41C875805259AFDB10DF69CC8AAAABBB8EF45304F1442D9E459E3244DB319E448F60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$8
                        • API String ID: 0-46163386
                        • Opcode ID: 7e679853e31e0ed9f8f925e97b75c69aa02d712df44842b7c375ba2c696d3515
                        • Instruction ID: 95fd6da5324808a8a8b9a3d50764e40cd6b48553f8c016ce255e5ae5c4d66fd4
                        • Opcode Fuzzy Hash: 7e679853e31e0ed9f8f925e97b75c69aa02d712df44842b7c375ba2c696d3515
                        • Instruction Fuzzy Hash: 387257716087419FD720CF28C88079BBBE5BF89314F04892DF99887391D779E958CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: $
                        • API String ID: 0-227171996
                        • Opcode ID: 83ec535f82daa42153f40594cf7d22467200b9a012ff2e263a1a4bedd164cc5a
                        • Instruction ID: 3ff5472a3a219610f4737fe7b62d7cad74ee5f02388f965565b4d890d4d55ad1
                        • Opcode Fuzzy Hash: 83ec535f82daa42153f40594cf7d22467200b9a012ff2e263a1a4bedd164cc5a
                        • Instruction Fuzzy Hash: 6DD1CF7662C3429FD335CF24C8957ABB7E5AF86318F15482CD489C7242EB399485CBA3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: )$IEND
                        • API String ID: 0-707183367
                        • Opcode ID: 113c6d710251e0129166b0257d3806dfb65e7c98d83d3a91b967f3bf462c6ffa
                        • Instruction ID: 1664d722095a6140b614647d7b2e5a4fff304e645a8239299317defd3cdf3b9e
                        • Opcode Fuzzy Hash: 113c6d710251e0129166b0257d3806dfb65e7c98d83d3a91b967f3bf462c6ffa
                        • Instruction Fuzzy Hash: 66E1D1B1A087459FD720CF28C84575ABBE4FB85318F04892DF9A49B381D779E908CBD6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: d$eo
                        • API String ID: 0-1875096159
                        • Opcode ID: 7b76c93a4d4b5b00f5af1e604507403927ebf9e5e94173bf7bf8eda637f5305c
                        • Instruction ID: 4e1c7d95eeb8524bde9fc13abcd2b62c44d7b47e826d275ae980877bea77dcd6
                        • Opcode Fuzzy Hash: 7b76c93a4d4b5b00f5af1e604507403927ebf9e5e94173bf7bf8eda637f5305c
                        • Instruction Fuzzy Hash: 385138706293818FD374CF14D8E9B9AB7E1AFD6304F08482DD48D8B252D7399609CB67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 78CN$<_D
                        • API String ID: 0-1360662621
                        • Opcode ID: 35152913102f06681d7e1402df17430e96154fac8ec2ea529fc3a00ed08848fe
                        • Instruction ID: c5e5d2ced1e2aeb1aa76a520650d76eb910e6fe5396e13a4e26caa830bd85259
                        • Opcode Fuzzy Hash: 35152913102f06681d7e1402df17430e96154fac8ec2ea529fc3a00ed08848fe
                        • Instruction Fuzzy Hash: 6E3138B150D3818FD3298F148090B6AFBF1ABD2314F18991DE4D54B252DBB58445CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: "
                        • API String ID: 0-123907689
                        • Opcode ID: 626921dd2c0f6c0a4969d2eec34d73272c2c3a8b58f2a854ba4e6141e8994c6a
                        • Instruction ID: 300c091f48a93e3765a53f2e33553d4b2c7522f9a71f72f4174f374cd408bb74
                        • Opcode Fuzzy Hash: 626921dd2c0f6c0a4969d2eec34d73272c2c3a8b58f2a854ba4e6141e8994c6a
                        • Instruction Fuzzy Hash: A60205B2A0C3069FD711CF28C881B2BBBE5AB85354F45C92DE499CB391E775D809C792
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D367120,?,?,00000008,?,?,6D366D23,00000000), ref: 6D367352
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 8c519803d97a0d13f3bb1d5a459ae59d212ae9efe915c591faf929215af24971
                        • Instruction ID: 7b2f733e78a39a4d523a964562a0b7dbb1d9a3d257331dd7265d6f2c4e03ea7d
                        • Opcode Fuzzy Hash: 8c519803d97a0d13f3bb1d5a459ae59d212ae9efe915c591faf929215af24971
                        • Instruction Fuzzy Hash: FAB1BFB1A20649CFD705CF28C486B647BE0FF05364F65C658E9A9CF2A5C336E981CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: Mw;"
                        • API String ID: 0-4032204789
                        • Opcode ID: b886813e5e6f1ff497bb17216db1cab5ad6d772044da3f4508db51e3122e836d
                        • Instruction ID: 9b22423c40e9dc58408c4b6cb45ab3f3e6b90680f651766dd9bf1da2b2673d80
                        • Opcode Fuzzy Hash: b886813e5e6f1ff497bb17216db1cab5ad6d772044da3f4508db51e3122e836d
                        • Instruction Fuzzy Hash: 7AE13435E5424A9FCF05CEACC4D2BDDBBF9BB56360F10911AD511EF340CA2A8855CB68
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D35C6FE
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: b6c5340c54d90e863a63f191093aa51a7aafc339d8222e20d654efef6dd98ec8
                        • Instruction ID: 31d1a6632de2c0a94c5276b42c601abea8f12fa1612bd6f66c4fd18adc2ef5b5
                        • Opcode Fuzzy Hash: b6c5340c54d90e863a63f191093aa51a7aafc339d8222e20d654efef6dd98ec8
                        • Instruction Fuzzy Hash: A1518BB1E0520ADFEB05CF55C882BAABBF8FB59318F10856AD414EB780D376D910CB60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: lx
                        • API String ID: 0-3595554650
                        • Opcode ID: 22096bee09bd5474671cc10237d88cb1bbeca8dde8ec04b88883d36a90faa0e3
                        • Instruction ID: 26e7cc31e30343a26b678bc8b15c90bd2f10d1e20d24fc73af24b4fc9401c530
                        • Opcode Fuzzy Hash: 22096bee09bd5474671cc10237d88cb1bbeca8dde8ec04b88883d36a90faa0e3
                        • Instruction Fuzzy Hash: F6D189716283818BD330CF14C8A5BABB7E1FFC6304F14492DE88997291D739A905CBA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: Mw;"
                        • API String ID: 0-4032204789
                        • Opcode ID: d5e95cc44e7440229b213593357f143881293775e2af8256b00e135e95f54b16
                        • Instruction ID: fddd142667e4d43248b0f4359eb4dfeefceee229c06c33f02677e64c64a32780
                        • Opcode Fuzzy Hash: d5e95cc44e7440229b213593357f143881293775e2af8256b00e135e95f54b16
                        • Instruction Fuzzy Hash: EAA1F276A146468FDF05CE7CC891ADDBBF6BB8B350F148215C521E7794C33A8A15CB24
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,
                        • API String ID: 0-3772416878
                        • Opcode ID: ce2f23334433c1b265e94497140114d90fa40d41d861fd11c8bd7d63b5a8541f
                        • Instruction ID: e11bb781f8a0cb1f388dad7c7958e3f56c0f887087ec8227819e9d52cc0980e4
                        • Opcode Fuzzy Hash: ce2f23334433c1b265e94497140114d90fa40d41d861fd11c8bd7d63b5a8541f
                        • Instruction Fuzzy Hash: EBB14B7160D782AFD314CF68C48475ABBE1AFA9304F444A2DF59897382C375DA18CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: Q!
                        • API String ID: 0-2920312500
                        • Opcode ID: c8d3103640d1503b68c596d189348e52c32c3a1cf51a2c74f5910b92c3fe87f3
                        • Instruction ID: b6cc56d1ac2c4d24c333551f525e1f52974b9331b951586853c4072a55c259b8
                        • Opcode Fuzzy Hash: c8d3103640d1503b68c596d189348e52c32c3a1cf51a2c74f5910b92c3fe87f3
                        • Instruction Fuzzy Hash: 5481CD71A187429FC375CF24C895BABB7E5AFC6314F05482CE489D7291DB38A844CB97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: @
                        • API String ID: 0-2766056989
                        • Opcode ID: a566c2f49bd684a27f020c0bf0dca1028fd8aff47bfd4390e860214e9233121c
                        • Instruction ID: 047b23f9c28c27dcebc6740e8227163dff85d507e72cdb60258112d37ab304e8
                        • Opcode Fuzzy Hash: a566c2f49bd684a27f020c0bf0dca1028fd8aff47bfd4390e860214e9233121c
                        • Instruction Fuzzy Hash: 4631BCB5A083419FC300CF18D890B6ABBF5FF99328F544A2CE99497391D375D914CBA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: j
                        • API String ID: 0-2137352139
                        • Opcode ID: 1d85f2d669f0b3eda5f0bb70503ea9f10462db25ebbb502b9270cdc91c2cb998
                        • Instruction ID: f706a050747226b759e01dff71b8f366a0f79231265ee7818e0804b091ceb8a6
                        • Opcode Fuzzy Hash: 1d85f2d669f0b3eda5f0bb70503ea9f10462db25ebbb502b9270cdc91c2cb998
                        • Instruction Fuzzy Hash: 6D1148316093808BD3B4CF54C895BDBB7E1AF8A304F18882ED58DE7261DB399949CB16
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 0a287d874a9a0fe4f6b37f65952405a528d89717c83ee2f47ddabeeb9f2615e8
                        • Instruction ID: 97609ca4e67c80b829cfeb945ec767237d893b6dd009be9804515946ba112f3f
                        • Opcode Fuzzy Hash: 0a287d874a9a0fe4f6b37f65952405a528d89717c83ee2f47ddabeeb9f2615e8
                        • Instruction Fuzzy Hash: 51A001B0605241AF9FA08F3A860A3197ABEAA6BAA57058169A449C5190FB2885509F22
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5e859499323dc793a010e8c4e18aebef601dded927e1cecc6bcb6df4cb37b734
                        • Instruction ID: 68a35fccb0cbdd1a9c4682ae28f8d9f86a216bdde928e1e6d934fe46d695c6dd
                        • Opcode Fuzzy Hash: 5e859499323dc793a010e8c4e18aebef601dded927e1cecc6bcb6df4cb37b734
                        • Instruction Fuzzy Hash: 7E521471A18B128BC325DF2CD89027AB3E1FFC4314F158A2DD9D597385D33AA852CB96
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 858b074062d683fb360340624bd448f0f2526b20d9610d692b6d5cea907d077a
                        • Instruction ID: 4b5592d3421400c09d88598a7ad94f7d7800e5ce94b6dd67ac706eb5e88ffa58
                        • Opcode Fuzzy Hash: 858b074062d683fb360340624bd448f0f2526b20d9610d692b6d5cea907d077a
                        • Instruction Fuzzy Hash: 20520435A087468FC725CF28C1806EABBF2FF88314F19866DE89997341D739E945CB85
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8a27ac46132f9f7214f72008100ead2eb696e6f7df39f82f949ceb4260d2b4ea
                        • Instruction ID: cb200d3cf05033e56d6695474c636ecddb604fbaf70d5ee9637210b3123d1b77
                        • Opcode Fuzzy Hash: 8a27ac46132f9f7214f72008100ead2eb696e6f7df39f82f949ceb4260d2b4ea
                        • Instruction Fuzzy Hash: 6912F771604B828BD328CF3980A1776FBE2BF96214F28865DC4EB4F796E735A406C751
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f019f17129a98b818176a5a84f1fe233b0516cb4321256fbba8f03a0d787d95f
                        • Instruction ID: e869143724f0bc79fa23882002e5b9a692b84241f59562dc743d3149723e24ed
                        • Opcode Fuzzy Hash: f019f17129a98b818176a5a84f1fe233b0516cb4321256fbba8f03a0d787d95f
                        • Instruction Fuzzy Hash: 97425775628B11CFC379CF28C59066AB7F1FF46310B504A2DD6A28BB90D73AB845CB15
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 108bbd1e599b9389372dce2cc33016840f825636963ed1ab46d2d2faf28fbb74
                        • Instruction ID: 312d20f926e10d05db4654d8333c64b9ec7b5cf556287e6c21341bb68de682ef
                        • Opcode Fuzzy Hash: 108bbd1e599b9389372dce2cc33016840f825636963ed1ab46d2d2faf28fbb74
                        • Instruction Fuzzy Hash: 86229F756083429FD301CF58D891B2AFBE1FB9A314F188A2DE5D88B391D775E805CB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a478a0e87b8d108edcb9952827156c71d7d0da314f6d7dded5c5df5d21a8f976
                        • Instruction ID: f396cc21c56555f8614228065fda7ee58524db47ea7192a56384e5776a92d287
                        • Opcode Fuzzy Hash: a478a0e87b8d108edcb9952827156c71d7d0da314f6d7dded5c5df5d21a8f976
                        • Instruction Fuzzy Hash: C902C4366087418FD7188F19C88176EBBE6EFC9304F08886DE9898B351DB79D845CB96
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f1f46b38b26c9e30fbc758fae783679e356d7dd78385b8e3d632d36f350dc129
                        • Instruction ID: b5c13c4719bb4c48a8c60a0d0784de0964c22d4023ac4cac02cf49d16b8ada22
                        • Opcode Fuzzy Hash: f1f46b38b26c9e30fbc758fae783679e356d7dd78385b8e3d632d36f350dc129
                        • Instruction Fuzzy Hash: C9C1E2B1A083128FD301CF18C88176AB7E1EB96314F19892CE9D5D7352E336D905CB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6f0fc086294a717233062b437dbfa8d97f227ca05e523306115987bd2ece2ffc
                        • Instruction ID: e21474ba9d89eccd7b4987c62d6771a81e3a7cdf44a2fc2312419f96e7807777
                        • Opcode Fuzzy Hash: 6f0fc086294a717233062b437dbfa8d97f227ca05e523306115987bd2ece2ffc
                        • Instruction Fuzzy Hash: 7691AD757043428BD714CF28C891A6BB7F2FF89714F198A2CE9958B261EB31DC45CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 24e0bc3228148164063c6a236d32576edd3f9fcda2d74cedd3d32c1e21387ec6
                        • Instruction ID: 8d3c79f50c35aacc1b4e10659ce69cbdc365ee6b5224d2afbb36fabfa67e622d
                        • Opcode Fuzzy Hash: 24e0bc3228148164063c6a236d32576edd3f9fcda2d74cedd3d32c1e21387ec6
                        • Instruction Fuzzy Hash: 1BA1DE71B093528BC705CF18C890A6AB7E2FF88714F198A2CE9959B351D731EC51CBD2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c8556a9c0019ce565130813cbef378288a96f2d8c8da7175dbd80ec4c8cd97c8
                        • Instruction ID: af8b6c7f8f72d27eff79814c7ed82f97abe6fd810edd99728a2da60245e8e35c
                        • Opcode Fuzzy Hash: c8556a9c0019ce565130813cbef378288a96f2d8c8da7175dbd80ec4c8cd97c8
                        • Instruction Fuzzy Hash: EA7189B55083418BD324CF19C4A13ABB7F2EFC2354F449A0DE4DA5B390E7B99845DB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 04c2a5755f4e779c87a76ef71a7f2bd907c0d3a1874d791f76277252a6f3eeca
                        • Instruction ID: 4374f6524ccdd19510e349573af328634450f4d4d330a1f668abe09fd4119a0c
                        • Opcode Fuzzy Hash: 04c2a5755f4e779c87a76ef71a7f2bd907c0d3a1874d791f76277252a6f3eeca
                        • Instruction Fuzzy Hash: 6D51C1B291C6098FC7109F68CC857BAB7E8EF41318F09952DD899C7392EB7AD508C752
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 24b0d547c6e3a072c427fc829247125a687f6550e9636ebf77a0772a13ee0f44
                        • Instruction ID: fb86a29b19315acc13c11a4f2a25510982457e018bc9a306fc0ce4c8fa959fab
                        • Opcode Fuzzy Hash: 24b0d547c6e3a072c427fc829247125a687f6550e9636ebf77a0772a13ee0f44
                        • Instruction Fuzzy Hash: 5451D370A187428BC718CF29C85063AB7E2FFC9314F55862DE89ADB395E734E805CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3932704aba590deb4197d4f9b0bd82922d1829fad40bb00a3466589b1c290a5e
                        • Instruction ID: 8b2d8108db9dcd398b7e0b4a8e468411af0d75df000485b5611b9d9f46ba26ad
                        • Opcode Fuzzy Hash: 3932704aba590deb4197d4f9b0bd82922d1829fad40bb00a3466589b1c290a5e
                        • Instruction Fuzzy Hash: A751E3B290C7818FD324CF28C45176AFBEAABD5304F184A2EE5E5DB351E735D8018B52
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 74022e7ae721ee69f18bfa09368950f01d84790728a14b16530fc05442a3cdf7
                        • Instruction ID: d787476fc887fa5f22697997975eaad6358618b0f5fa972410786c6667fcac93
                        • Opcode Fuzzy Hash: 74022e7ae721ee69f18bfa09368950f01d84790728a14b16530fc05442a3cdf7
                        • Instruction Fuzzy Hash: 66419EB5A147018FD725CF24C842B63B3F2FF96314B29896CD496CB361EB36A805C751
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 80a2afaae6a145b7be37437a6f13e47f845563423de772e9d09ddbec4ddba44e
                        • Instruction ID: c5f554ee5ce06ea77e94d8518dee3125cea6c3c05f63900a168d33fe231725dd
                        • Opcode Fuzzy Hash: 80a2afaae6a145b7be37437a6f13e47f845563423de772e9d09ddbec4ddba44e
                        • Instruction Fuzzy Hash: 67518A75708342AFD304CF18DC91B6AB7E2EF86704F58891CE9D897291D772E855CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db60bd24c2146d975c662c1e149db04852fdfdbe49bbf08859b53d6ececbdc1c
                        • Instruction ID: 341143cc82ae4ad253a19db310d775795404037cfdb258c2b6c047227aff653d
                        • Opcode Fuzzy Hash: db60bd24c2146d975c662c1e149db04852fdfdbe49bbf08859b53d6ececbdc1c
                        • Instruction Fuzzy Hash: E541BD745183228BD724CF14C5617ABB3F2BFD2348F549A2CE9DA1B390E7769905C782
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 86000208116ac31e54408dcf2ca3aa2e2ece0f27dfc5eef3e1ea1949e576d8c9
                        • Instruction ID: 8d570e969cc1181c90642a0201ae13ab6f81ba55bb06db54f0ae484ae9022d30
                        • Opcode Fuzzy Hash: 86000208116ac31e54408dcf2ca3aa2e2ece0f27dfc5eef3e1ea1949e576d8c9
                        • Instruction Fuzzy Hash: A5519C74B08741AFD300CF18D881B7BBBE2EB86744F58891CE5D897291C731E815CB86
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9df4ba3dfa97cb9bd421905eb9aa0cb1b08e65d390135804af301f05fa8495f4
                        • Instruction ID: d82bdf56a752722271dcc6b8c2471f42d44dd9f9f32df6d10800661ca4171b17
                        • Opcode Fuzzy Hash: 9df4ba3dfa97cb9bd421905eb9aa0cb1b08e65d390135804af301f05fa8495f4
                        • Instruction Fuzzy Hash: AC41BE74608202ABE718CF04D9A173FB3E6EFCA744F55991CE98A6B651D7329C01CB86
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 890152fa040b52a1864c198c6ea4ee8598826ae1b8b63511e366e5c183ef2a1e
                        • Instruction ID: c9aa98bcd5c925af5ca16a48eaecdd4fd10a76e27182fd6c92859d897c0e8648
                        • Opcode Fuzzy Hash: 890152fa040b52a1864c198c6ea4ee8598826ae1b8b63511e366e5c183ef2a1e
                        • Instruction Fuzzy Hash: 2241117261C7614FE3188A2AC89136ABBD2EBC5324F05C62EF0E9873D1DA7C8845DB55
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4a22e9ce17e5654dc8aafb10b0a0f521ddbb7140dae8aab8544715bcc0235857
                        • Instruction ID: db6171ca2e7f8ed26b6e5814309ae27152b4ba167a9978a0948f080038125d1f
                        • Opcode Fuzzy Hash: 4a22e9ce17e5654dc8aafb10b0a0f521ddbb7140dae8aab8544715bcc0235857
                        • Instruction Fuzzy Hash: 7A4169746083028BD324CF18C991BABB3F1FF86794F44891CE9858B3A1E779D945CB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 47141302373a02fc3b5c3eb17f5cab3f8244cbde14f9214461374234849d7c12
                        • Instruction ID: 77c143e8e2f381b258b2aa2ddf178a0b5f402da8649408f4ccb06a5ba6c9eed5
                        • Opcode Fuzzy Hash: 47141302373a02fc3b5c3eb17f5cab3f8244cbde14f9214461374234849d7c12
                        • Instruction Fuzzy Hash: 8A4156316183408FD364DF54D8A1BABB7F5EBC5300F05882EE889DB392DB349945CBA2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ab0f22a33d82c0495e4f4b706f02b4a01d0be671b0bae918405fad0265cfe011
                        • Instruction ID: fb012d589bdac7234ece00eb2ca8cb266104062fd841ffd01660a50e3df7c885
                        • Opcode Fuzzy Hash: ab0f22a33d82c0495e4f4b706f02b4a01d0be671b0bae918405fad0265cfe011
                        • Instruction Fuzzy Hash: 1F317A71A083019FD300DF98C981B5BFBE8EB86318F158A1CE5D4AB251C336D9098B92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9ae8af78a39ff9c7f65d1e1dd8f773f741c63194613eb10fd5ba5aa23dba1df1
                        • Instruction ID: 98c239decc162c327f5e674991aad7e6065524eda89d8f9fc4c73d4f70ea0452
                        • Opcode Fuzzy Hash: 9ae8af78a39ff9c7f65d1e1dd8f773f741c63194613eb10fd5ba5aa23dba1df1
                        • Instruction Fuzzy Hash: C531D832618A019BD7208F58C891A37B7F5EF84354F14992CE899CF341D33AD952CB8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9891a6c1987d0aa3c9cb0ad1570315737e08ab9298547f88c377c1e70bd2d0d3
                        • Instruction ID: 18be2dadd16bec37f59779bd69d436428ae6e4b83ffcfef37d0a80eb193c76bd
                        • Opcode Fuzzy Hash: 9891a6c1987d0aa3c9cb0ad1570315737e08ab9298547f88c377c1e70bd2d0d3
                        • Instruction Fuzzy Hash: 4621B431A092D04FD3124A3E8491669BBA2AF97728F698389E4F45B2E2D72689468711
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce1ab8fb32b2f6f1587f7aceb91b0d89a497f6a4fd57d686a3219d92405b274c
                        • Instruction ID: 6e7c54f6075080db5d894c4b400d7c651d0f30fba1041df32dc9c92943190c76
                        • Opcode Fuzzy Hash: ce1ab8fb32b2f6f1587f7aceb91b0d89a497f6a4fd57d686a3219d92405b274c
                        • Instruction Fuzzy Hash: 0D218974509341CFD300CF28D092A6ABBF1BFD2744F84885EE0C68B262EB3AD945CB12
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 993b181b9993475e50f2dfd66faf5a1f2cd4df07a488de521816ae3ea7985e0a
                        • Instruction ID: 32e2f364a6586f765c5d5fd15fe428497b32e5a3dc13c2654aa44be47ed566c6
                        • Opcode Fuzzy Hash: 993b181b9993475e50f2dfd66faf5a1f2cd4df07a488de521816ae3ea7985e0a
                        • Instruction Fuzzy Hash: 8D0192FAB06F0267E7308E5499C1737B2A89F81608F45403CD9954B201EF66E80582D9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 76b0bca7c116f93985a271265a358f72dc5d1cf5272eb152c4af80edc4583c8e
                        • Instruction ID: d0ce14d30123de465dd38d56a6316b86c9d055702d5f7b24758832534102901a
                        • Opcode Fuzzy Hash: 76b0bca7c116f93985a271265a358f72dc5d1cf5272eb152c4af80edc4583c8e
                        • Instruction Fuzzy Hash: A01136706283818BD3348F14D8E9BDBBBE2BBC6348F18482DE489C7650C73D8505CB1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1c4ced82fa882be5d3fb3aa3a70294947a44b5b32bbe39863efe3361c506be32
                        • Instruction ID: d7b5e3ff57173c1791aedac58bf796c04d77d65719e0659ed4baebf685d7fa1b
                        • Opcode Fuzzy Hash: 1c4ced82fa882be5d3fb3aa3a70294947a44b5b32bbe39863efe3361c506be32
                        • Instruction Fuzzy Hash: 74111776A00B018FD3158F29C891A22B7F2FF8A300708889CE596CB725E736E811DB10
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d93804f1d151500488af0f13b91251e364b9ff3065500049fc604f6ade05c5e5
                        • Instruction ID: 0c653c3d46fbd3b8ac82c9858887d09f13e8c5be32f1245862a302ba7f1dcc69
                        • Opcode Fuzzy Hash: d93804f1d151500488af0f13b91251e364b9ff3065500049fc604f6ade05c5e5
                        • Instruction Fuzzy Hash: 2AE0397050C7869AD705CF258450576BBE2AF97248F04A99CE0CA97252E329D50ADB2A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8bbfbb957a3ae57afc28f8099b96706c4d3dbf6ad204d7dff2ba39dcb9a2976c
                        • Instruction ID: 2d0759f53daaf3970f81f66aaaae44048838d9267dea7838ff7576b6e6d60a7c
                        • Opcode Fuzzy Hash: 8bbfbb957a3ae57afc28f8099b96706c4d3dbf6ad204d7dff2ba39dcb9a2976c
                        • Instruction Fuzzy Hash: E1D05B79B4864047C615DB20D85047EB6239BC721CF066438C986F3760DF39F817978E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6904151471783ee92b37b90a27787cfe41d9f1ff1ddf5471b246a78c0aaa47c3
                        • Instruction ID: cf672916d1ba1711a8cc7591f96502e8e5938afae57771aad2d3236203eab3d9
                        • Opcode Fuzzy Hash: 6904151471783ee92b37b90a27787cfe41d9f1ff1ddf5471b246a78c0aaa47c3
                        • Instruction Fuzzy Hash: 12D0127DF99440878619DB20AC5187EB52A9BCB20CB06B439CE46F3751DF2DF913464E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                        • Instruction ID: 6b326a8bc68b90595820205db441b706d3f6ab7167b3379c1e22bd229dd73f77
                        • Opcode Fuzzy Hash: ae9cf52e3d41c581a170ec7cf48180e445a84ed293e19ee7d78fcac670432e06
                        • Instruction Fuzzy Hash: 99D0A771548BE60ED758CD3848A1477FBF8ED87552F24149EE4E5E7005D226D80146AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 281d501df5ab605dda48040b67f3124cdbb628a08512351359de7ea75e30b089
                        • Instruction ID: ae953a7b5711aa6b6eedb6f03d813ede60559223702f920f0cb3a8e3b3d117be
                        • Opcode Fuzzy Hash: 281d501df5ab605dda48040b67f3124cdbb628a08512351359de7ea75e30b089
                        • Instruction Fuzzy Hash: B2C09BF9D947499BD604DF30AC90426B3F677572CCF007824D24773111E615D508C76D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ca5c82f5cfdf5c19e2029f0254dcaa59cd91808b7987feac67f87929da164e5
                        • Instruction ID: 9c04d22507b68845b9312bcc500683f88995c98e6bf082e8c006725fadbd385d
                        • Opcode Fuzzy Hash: 2ca5c82f5cfdf5c19e2029f0254dcaa59cd91808b7987feac67f87929da164e5
                        • Instruction Fuzzy Hash: 85B092EAE1BC10A690211B103C054FAB4248A2300CF05A034CA8A22221A72AD22A40DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a3e71159761ad4b9b8b4c84e39d893cfd1619adf15d4be419ae6f0e90362b56
                        • Instruction ID: d47939b1a2312f8293674d1f4c7053e1a37ebba8effcc54a93adb66211245b86
                        • Opcode Fuzzy Hash: 2a3e71159761ad4b9b8b4c84e39d893cfd1619adf15d4be419ae6f0e90362b56
                        • Instruction Fuzzy Hash: 5DB012D4D090004291118F006C40475A1788307008F003034D14CA3111D304D004815E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70e5539b6335c758ae2c1c8b5029fd19d554631d407aace07678134a7ba410ce
                        • Instruction ID: 7099edd316ed23f7c9f3b14f7ddd2fae19bbf83e05bee7712811a53b68f8b192
                        • Opcode Fuzzy Hash: 70e5539b6335c758ae2c1c8b5029fd19d554631d407aace07678134a7ba410ce
                        • Instruction Fuzzy Hash: 3D900224D485058781108F049540471E2B8930B151F503410A10CF3011C250D444850C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1774 6d39a320-6d39a9e5 call 6d37e5c0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 4D$$5D$$7D$(6D$,4D$05D$46D$84D$D4D$D5D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P4D$P5D$P6D$\4D$\6D$d5D$h4D$t4D$x6D$3D$4D$5D$5D
                        • API String ID: 0-34486471
                        • Opcode ID: 402a9dc6d004261520f27fe8ac35e3028a1f1a7d2b3b50819d9a4a2bbf86ac99
                        • Instruction ID: b3678de1baa4ffc2a840c5e79e659744310c171b9698d62928e9ff8226ce629b
                        • Opcode Fuzzy Hash: 402a9dc6d004261520f27fe8ac35e3028a1f1a7d2b3b50819d9a4a2bbf86ac99
                        • Instruction Fuzzy Hash: C8F192B8505B019BE325CF24D5986C3BBE0FB49B09F50992ED5EE47314C7B42689CF88

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1777 6d3974e0-6d397b39
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 3D$$2D$,3D$40D$81D$82D$@0D$D1D$L2D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P1D$\1D$`2D$h1D$l0D$t1D$t2D$x0D$1D$1D
                        • API String ID: 0-2979357682
                        • Opcode ID: 5749c2f9bb58ac51c36bb06a52e3bf3b96f24110a469891523e8413d53274165
                        • Instruction ID: 8d8b7f3f934ca192b41b7035fa40b3f2e751c30adf96636312c6e4e8db6f158f
                        • Opcode Fuzzy Hash: 5749c2f9bb58ac51c36bb06a52e3bf3b96f24110a469891523e8413d53274165
                        • Instruction Fuzzy Hash: 69E165B8501B418BE324CF25D588683BBE4FB49B09F50DA1ED5BE47318D7B46649CF88

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1778 6d39f5b0-6d39fb5d call 6d37e5c0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: ?D$ @D$,@D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$0;D$4?D$<>D$@?D$@@D$H>D$L?D$L@D$T>D$X?D$d?D$p@D$x>D$|@D$=D$>D$?D$?D
                        • API String ID: 0-2349161180
                        • Opcode ID: e1e054a34b5c2dd1b0d087a9bc06cbc8bdcc1fb95b5ea3f5958a91adf7871b9b
                        • Instruction ID: 218ff49cdfee946439f3d26d9a133e0e52340f30887c170fb4624de840b326fc
                        • Opcode Fuzzy Hash: e1e054a34b5c2dd1b0d087a9bc06cbc8bdcc1fb95b5ea3f5958a91adf7871b9b
                        • Instruction Fuzzy Hash: 51D150B4515B908BE328CF24E458792BBE1FB49B0AF508A1ED5AF47351CBB43649CF48

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1781 6d39ca70-6d39ccf4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8D$(8D$08D$88D$@8D$H8D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P$D$P8D$X8D$`8D$h8D$p8D$x8D$7D$7D
                        • API String ID: 0-3864607224
                        • Opcode ID: eb333e4e345c3a047f4c747ee0c0788a8ec836b63cca9b481376d77f548856a2
                        • Instruction ID: ffacbf0024967ff62fa152ee1adcbc978d561d6dd6edc4f1aba495d1c58547f4
                        • Opcode Fuzzy Hash: eb333e4e345c3a047f4c747ee0c0788a8ec836b63cca9b481376d77f548856a2
                        • Instruction Fuzzy Hash: C6511DF4501B459BE3209F21CA497C7BAE2EB4570AF40D91E91FE1A345C7F8224A8F98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1797 6d387e70-6d387eec 1798 6d387eee-6d387eef 1797->1798 1799 6d387f31-6d387f5b 1797->1799 1800 6d387ef0-6d387f2f 1798->1800 1801 6d387f60-6d387f69 1799->1801 1800->1799 1800->1800 1801->1801 1802 6d387f6b-6d387f70 1801->1802 1803 6d387f79 1802->1803 1804 6d387f72-6d387f77 1802->1804 1805 6d387f7c-6d387f8d call 6d377460 1803->1805 1804->1805 1808 6d387f8f-6d387f94 1805->1808 1809 6d387fb1-6d387fbe 1805->1809 1810 6d387fa0-6d387faf 1808->1810 1811 6d387fc0-6d387fc4 1809->1811 1812 6d387fe1-6d3880a0 1809->1812 1810->1809 1810->1810 1813 6d387fd0-6d387fdf 1811->1813 1814 6d3880a2 1812->1814 1815 6d3880e6-6d388112 call 6d388b00 1812->1815 1813->1812 1813->1813 1816 6d3880b0-6d3880e4 1814->1816 1816->1815 1816->1816
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: $U [$%M:S$1I=O$1Y _$D5A;$E-T3$F1[7$Hedk$U%U+$U9I?$hE&K$oAmG
                        • API String ID: 0-3536370757
                        • Opcode ID: 395ac9e3943335021887cf8de60dabccc6121b08b7588c4bcff2f378c30eeb28
                        • Instruction ID: 740a9e6967f923408d9fca3ec6edcc0c5aae7a6a253a9e1e48aef01525f419e8
                        • Opcode Fuzzy Hash: 395ac9e3943335021887cf8de60dabccc6121b08b7588c4bcff2f378c30eeb28
                        • Instruction Fuzzy Hash: C36152B16083419BC704CF19C491A6ABBF1FF8A798F108A1CF8E49B352E334D945CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: !$P$V$W$[$a$b$c$c$l$n
                        • API String ID: 0-442629251
                        • Opcode ID: 71070ffd06b732138d49f0bfb978ec2a2a037be5baa70a4e0dd4dd3b1d402b82
                        • Instruction ID: 549fba79cf48a7c2420c66cd9817f8ab084fe828fa6d6f36169a9c0568673bb9
                        • Opcode Fuzzy Hash: 71070ffd06b732138d49f0bfb978ec2a2a037be5baa70a4e0dd4dd3b1d402b82
                        • Instruction Fuzzy Hash: DF6169B4508B41CFC721DF38D485606BBE1AF1A314F14896CD8DA8F396E735A815CBA2
                        APIs
                        • type_info::operator==.LIBVCRUNTIME ref: 6D35E079
                        • ___TypeMatch.LIBVCRUNTIME ref: 6D35E187
                        • _UnwindNestedFrames.LIBCMT ref: 6D35E2D9
                        • CallUnexpected.LIBVCRUNTIME ref: 6D35E2F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 2751267872-393685449
                        • Opcode ID: caaeb15d7573fe8fd24a5ea150ced2a934ce0a1acc23e734623fefb8d26442c1
                        • Instruction ID: 0ce587999713daba591840e15a4d96de698e1a00c2f6ae21ad25e3e7fe9d9f79
                        • Opcode Fuzzy Hash: caaeb15d7573fe8fd24a5ea150ced2a934ce0a1acc23e734623fefb8d26442c1
                        • Instruction Fuzzy Hash: EFB1987180430AEFCF15DFA0D881DAEBBB5BF48314B11866AE951BB205D732DA61CF91
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 6D35D037
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 6D35D03F
                        • _ValidateLocalCookies.LIBCMT ref: 6D35D0C8
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 6D35D0F3
                        • _ValidateLocalCookies.LIBCMT ref: 6D35D148
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: Mw;"$csm
                        • API String ID: 1170836740-3278274464
                        • Opcode ID: 57f476c70b9c97fad7731f2ac8aa0085d9d076de36593ee48c1b87b41b5abde2
                        • Instruction ID: a874d0af5db8eac5320579418f8c5f042a1eec5788416222307fe68b6be48c18
                        • Opcode Fuzzy Hash: 57f476c70b9c97fad7731f2ac8aa0085d9d076de36593ee48c1b87b41b5abde2
                        • Instruction Fuzzy Hash: 4441C234A04259ABCF00DF68D880EAEBBB4BF85318F11C155E9149B395D732EA66CB91
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 6D363C1A
                        • __alloca_probe_16.LIBCMT ref: 6D363CE3
                        • __freea.LIBCMT ref: 6D363D4A
                          • Part of subcall function 6D362D2D: HeapAlloc.KERNEL32(00000000,6D361677,6D362A47,?,6D361677,00000220,?,?,6D362A47), ref: 6D362D5F
                        • __freea.LIBCMT ref: 6D363D5D
                        • __freea.LIBCMT ref: 6D363D6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: __freea$__alloca_probe_16$AllocHeap
                        • String ID: Mw;"
                        • API String ID: 1096550386-4032204789
                        • Opcode ID: f1a4e129d2b8e4db18a6f23d3999ab98e13896394d7b6821f2eca5169b99e6c3
                        • Instruction ID: a54275f66c7ee2e4b8a264ae2d7f04fbd9166f5d4b2372fe4b7b1ad15718d7e8
                        • Opcode Fuzzy Hash: f1a4e129d2b8e4db18a6f23d3999ab98e13896394d7b6821f2eca5169b99e6c3
                        • Instruction Fuzzy Hash: 5351C27260528BBFEB215F648C82EBB36A9EF45714F1A4129FE24D7118E772CC108670
                        APIs
                        • FreeLibrary.KERNEL32(00000000,?,6D361FDC,00000000,6D35F7E0,00000000,00000000,00000001,?,6D362155,00000022,FlsSetValue,6D369898,6D3698A0,00000000), ref: 6D361F8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: api-ms-$ext-ms-
                        • API String ID: 3664257935-537541572
                        • Opcode ID: d188b5ad51b1cf6d8a041c4962e61e51a7ba8d19fccfa6596e023e303526cb1b
                        • Instruction ID: 96ee246036dd93cf01daf5d1c88e3b8cfe4d756f0487a33eafdfc19f70b37a58
                        • Opcode Fuzzy Hash: d188b5ad51b1cf6d8a041c4962e61e51a7ba8d19fccfa6596e023e303526cb1b
                        • Instruction Fuzzy Hash: B721C633945192BBCB129F389C45AAA377C9F437A4B110615FA15AB2C8DB31E900C6F0
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,223B774D,00000000,?,00000000,6D367A22,000000FF,?,6D35F0A8,?,?,6D35F07C,?), ref: 6D35F143
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D35F155
                        • FreeLibrary.KERNEL32(00000000,?,00000000,6D367A22,000000FF,?,6D35F0A8,?,?,6D35F07C,?), ref: 6D35F177
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$Mw;"$mscoree.dll
                        • API String ID: 4061214504-1097367861
                        • Opcode ID: e7c3dcad29350bb2b7c983f18f13be55af6d888a1fd46c48309b0c82d539566e
                        • Instruction ID: 3093fa6f0206e26a6f31916b85e1a006ca7df2dced4b41cbcff033be147bc9db
                        • Opcode Fuzzy Hash: e7c3dcad29350bb2b7c983f18f13be55af6d888a1fd46c48309b0c82d539566e
                        • Instruction Fuzzy Hash: D7018F3191056ABFDF118F90CC05FBE7BB8FB09754F000625E821A2680DB759900CAA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: B$F$P$R$X$X$X$Z
                        • API String ID: 0-3412365628
                        • Opcode ID: 578134f4451ad78a3f9a9181d8e874eb2f163d4625e1681ae8047a6aa5fc69ca
                        • Instruction ID: f37ad93932c3c2dd9bb10e41e6d31412a8b16ec32d1168aa0af39287029d943d
                        • Opcode Fuzzy Hash: 578134f4451ad78a3f9a9181d8e874eb2f163d4625e1681ae8047a6aa5fc69ca
                        • Instruction Fuzzy Hash: 24C1497450CB85CFC311DF28D48460ABBE4BB9A328F058A2DF5E497392D3799844CB6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,E-G$J9t;$JM$M-B/$]!L#$]!L#$vY-[
                        • API String ID: 0-3492093773
                        • Opcode ID: 4718b2ed445e4492efedbda24ea641f3b2d4ad46e253a618cba03d175d6cb8f9
                        • Instruction ID: d8a12c76956d199ef1c7f8e117a79e1280a53afd8fd6768adf85b26e811b765e
                        • Opcode Fuzzy Hash: 4718b2ed445e4492efedbda24ea641f3b2d4ad46e253a618cba03d175d6cb8f9
                        • Instruction Fuzzy Hash: 69C199B15183118BC314CF18C8A266BB7F1FF86764F058A1CE8E64B392E3B59905CB92
                        APIs
                        • GetConsoleOutputCP.KERNEL32(223B774D,00000000,00000000,?), ref: 6D364305
                          • Part of subcall function 6D361CCC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D363D40,?,00000000,-00000008), ref: 6D361D2D
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6D364557
                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D36459D
                        • GetLastError.KERNEL32 ref: 6D364640
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                        • String ID: Mw;"
                        • API String ID: 2112829910-4032204789
                        • Opcode ID: d8bbd92d1a826b734f85cb856ec942377bf29714166a4568f11bbdc03f0c4b1f
                        • Instruction ID: cc3ed2f4b7889a76b5469fb2fe23afa10271d3b71720533ca314cf1e2f14853f
                        • Opcode Fuzzy Hash: d8bbd92d1a826b734f85cb856ec942377bf29714166a4568f11bbdc03f0c4b1f
                        • Instruction Fuzzy Hash: 12D18C75D08289AFCF01CFA8D890AADBBB9FF09314F14812AE655EB355D730A941CB60
                        APIs
                        • GetLastError.KERNEL32(00000001,?,6D35D1E1,6D35C300,6D35BD19,?,6D35BF51,?,00000001,?,?,00000001,?,6D36D698,0000000C,6D35C04A), ref: 6D35D5BA
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D35D5C8
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D35D5E1
                        • SetLastError.KERNEL32(00000000,6D35BF51,?,00000001,?,?,00000001,?,6D36D698,0000000C,6D35C04A,?,00000001,?), ref: 6D35D633
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 52630c9171c5ed01e6b86ed86ebbd89c2c7ef4b597de40afdccf84ba0365ff55
                        • Instruction ID: 3e158f98ebfb6ac99a6b2f5e3d44a7248ceef6e6646e5d0c2ca886456c141296
                        • Opcode Fuzzy Hash: 52630c9171c5ed01e6b86ed86ebbd89c2c7ef4b597de40afdccf84ba0365ff55
                        • Instruction Fuzzy Hash: 2A01F77260D7137EEB051EB47C85F662B6CEB977787A0423DE314560D0EF9248325351
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: (D$4D$@D$LD$XD$dD$xD
                        • API String ID: 0-1939173174
                        • Opcode ID: 2961d8d3b4598d5670d62b1fe0894391877362b13ceaba05eddaf8f029c046f6
                        • Instruction ID: fdfc5d98b0d55c655ac255f83d83ec3e819c2fe7fca408d11d8098c088c08e4f
                        • Opcode Fuzzy Hash: 2961d8d3b4598d5670d62b1fe0894391877362b13ceaba05eddaf8f029c046f6
                        • Instruction Fuzzy Hash: C0B18FB9411B408FE360CF6595482C2FBE5FB95318F258D1ECAAA1B321C7B47429CF88
                        Strings
                        • C:\Users\user\Desktop\tGm4SuP0sz.exe, xrefs: 6D36111A
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: C:\Users\user\Desktop\tGm4SuP0sz.exe
                        • API String ID: 0-440438403
                        • Opcode ID: 36cb0e296e87d2ecbe873792ec70f6021b559d9311f6337ed323c7159f86f702
                        • Instruction ID: 849ac374fbafe57af926d2b07d89ad5b1ba77a3be76e71d81c01193366e2a9dc
                        • Opcode Fuzzy Hash: 36cb0e296e87d2ecbe873792ec70f6021b559d9311f6337ed323c7159f86f702
                        • Instruction Fuzzy Hash: 98218175208286BF9B119F75CC9196BB7BDBF46368701C619EA58D7148EB32EC10CBB0
                        APIs
                        • __alloca_probe_16.LIBCMT ref: 6D363AE6
                        • GetStringTypeW.KERNEL32(?,-00000008,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,FFFFF9B5), ref: 6D363B3E
                        • __freea.LIBCMT ref: 6D363B4B
                          • Part of subcall function 6D362D2D: HeapAlloc.KERNEL32(00000000,6D361677,6D362A47,?,6D361677,00000220,?,?,6D362A47), ref: 6D362D5F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: AllocHeapStringType__alloca_probe_16__freea
                        • String ID: Mw;"
                        • API String ID: 324646697-4032204789
                        • Opcode ID: 1f3401780dac102793a6166c24dc5b0cf715be4c8c8e79880840e578cf991e5f
                        • Instruction ID: 99cf0f3cbb4bae128b15171f1f902a3091e929f3db4832a19ed3fcc769f1449c
                        • Opcode Fuzzy Hash: 1f3401780dac102793a6166c24dc5b0cf715be4c8c8e79880840e578cf991e5f
                        • Instruction Fuzzy Hash: A831E272D0028AABDF118F64CC42EEF7BB9EF44714F0A8128E914A7259E775C850CBB4
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000105), ref: 6D361220
                        • GetLastError.KERNEL32 ref: 6D36122A
                        • __dosmaperr.LIBCMT ref: 6D361231
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ErrorFileLastModuleName__dosmaperr
                        • String ID: Mw;"
                        • API String ID: 4076908705-4032204789
                        • Opcode ID: 83689fe9a2e96195fc70b7184a1c5ae1bac6206e0492b240ae9f7ffe220b4e68
                        • Instruction ID: 2cb6f0a7aea0ef561279e4f03f93ac8706707dde9c2490422c02e463a7c73535
                        • Opcode Fuzzy Hash: 83689fe9a2e96195fc70b7184a1c5ae1bac6206e0492b240ae9f7ffe220b4e68
                        • Instruction Fuzzy Hash: BA11097194825DABCF10DFA9D889BDA77B8BB18304F118499E509E7240DB709A848FA4
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6D35DB33,00000000,?,00000001,?,?,?,6D35DC22,00000001,FlsFree,6D368F70,FlsFree), ref: 6D35DB8F
                        • GetLastError.KERNEL32(?,6D35DB33,00000000,?,00000001,?,?,?,6D35DC22,00000001,FlsFree,6D368F70,FlsFree,00000000,?,6D35D681), ref: 6D35DB99
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6D35DBC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: 6c44fed44beec3e966adca1066471a3126afd16b37ac9d1b59dbd2d4fc5efcfe
                        • Instruction ID: 09161e132495a4667f503313b6e0ea35dbdbce23c4c5fca4ffb555176dd73cc6
                        • Opcode Fuzzy Hash: 6c44fed44beec3e966adca1066471a3126afd16b37ac9d1b59dbd2d4fc5efcfe
                        • Instruction Fuzzy Hash: 0EE01A3028824AF7EF101B61EC06F293B7AAF46B55F104421FA0CA80E5D7A294208595
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: LM$crkr$eqXO$sbe`${nvo
                        • API String ID: 0-2776353322
                        • Opcode ID: d0875e816820c4f4258ac7d89009c43ce509b35b380204f6ff998d640ffbb1ac
                        • Instruction ID: 27dd1bd5e6ef1020418085d1235b5f0df75b273d68cab422f8e05d2c586650d8
                        • Opcode Fuzzy Hash: d0875e816820c4f4258ac7d89009c43ce509b35b380204f6ff998d640ffbb1ac
                        • Instruction Fuzzy Hash: 9DD121B0218381ABD328CF14D9A1B6FBBE2FBC1744F54992CE4D98B251D738D805DB96
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: AdjustPointer
                        • String ID:
                        • API String ID: 1740715915-0
                        • Opcode ID: 2049c0f8258caf82960a7b34d77b984c4a579101f004a98278015e206987f818
                        • Instruction ID: 83395180a41f1c50e127379ac5e1e3fe764197e3834a842b6e328d1ca5c4f7ee
                        • Opcode Fuzzy Hash: 2049c0f8258caf82960a7b34d77b984c4a579101f004a98278015e206987f818
                        • Instruction Fuzzy Hash: 42510172605602EFEB258F50E841FBAB3B4FF95304F14812DDA5547690E736E870CB90
                        APIs
                          • Part of subcall function 6D361CCC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D363D40,?,00000000,-00000008), ref: 6D361D2D
                        • GetLastError.KERNEL32 ref: 6D36097C
                        • __dosmaperr.LIBCMT ref: 6D360983
                        • GetLastError.KERNEL32(?,?,?,?), ref: 6D3609BD
                        • __dosmaperr.LIBCMT ref: 6D3609C4
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                        • String ID:
                        • API String ID: 1913693674-0
                        • Opcode ID: 04c162b335a8f1ec2acdde95ce9316c3761c7406894ece6ab4aa7259b6436432
                        • Instruction ID: 4fd1da9ed92acc011bac5c1b33f09db89337ba31df2fe633f1c01a134cd95f2b
                        • Opcode Fuzzy Hash: 04c162b335a8f1ec2acdde95ce9316c3761c7406894ece6ab4aa7259b6436432
                        • Instruction Fuzzy Hash: 7221B831208686BFAB119F778C4292AB7EEFF45364701C419EA99A7158D732EC108BB0
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 6D361D77
                          • Part of subcall function 6D361CCC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D363D40,?,00000000,-00000008), ref: 6D361D2D
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D361DAF
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D361DCF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                        • String ID:
                        • API String ID: 158306478-0
                        • Opcode ID: 7cbfdb982357297c8f1efbbc9bdaae4d7fdc1b8b5f35cc6559544802f55abb71
                        • Instruction ID: 31d5b9c857413d8a34992eae8c1584377e380fe0d4bfc4c2cea734ddfb369857
                        • Opcode Fuzzy Hash: 7cbfdb982357297c8f1efbbc9bdaae4d7fdc1b8b5f35cc6559544802f55abb71
                        • Instruction Fuzzy Hash: 0511D6F590A5DA7FA71217778C89C7F6E7CDE8B2993158424FA41D2104EF31CE0085B1
                        APIs
                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6D3653D6,00000000,00000001,00000000,?,?,6D364694,?,00000000,00000000), ref: 6D365C2D
                        • GetLastError.KERNEL32(?,6D3653D6,00000000,00000001,00000000,?,?,6D364694,?,00000000,00000000,?,?,?,6D364C37,00000000), ref: 6D365C39
                          • Part of subcall function 6D365BFF: CloseHandle.KERNEL32(FFFFFFFE,6D365C49,?,6D3653D6,00000000,00000001,00000000,?,?,6D364694,?,00000000,00000000,?,?), ref: 6D365C0F
                        • ___initconout.LIBCMT ref: 6D365C49
                          • Part of subcall function 6D365BC1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D365BF0,6D3653C3,?,?,6D364694,?,00000000,00000000,?), ref: 6D365BD4
                        • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6D3653D6,00000000,00000001,00000000,?,?,6D364694,?,00000000,00000000,?), ref: 6D365C5E
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                        • String ID:
                        • API String ID: 2744216297-0
                        • Opcode ID: e244774214a243caa92f0e6163edde08f5c241f2ccf8b1d253fd569fa6f98741
                        • Instruction ID: 8c411272bdf36af4465696b939d5235373726e2f0a7f8ecd5545d40eae60c62d
                        • Opcode Fuzzy Hash: e244774214a243caa92f0e6163edde08f5c241f2ccf8b1d253fd569fa6f98741
                        • Instruction Fuzzy Hash: 52F03936404599BBCF621FD1CC08AAA3F7BFF0A3A0B094420FB1996160C7729960DBA0
                        APIs
                          • Part of subcall function 6D3613AA: GetOEMCP.KERNEL32(00000000,?,?,?,6D362A47), ref: 6D3613D5
                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,6D3616BA,?,00000000,?,?,6D362A47), ref: 6D3618D4
                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,6D3616BA,?,00000000,?,?,6D362A47), ref: 6D361910
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: CodeInfoPageValid
                        • String ID: Mw;"
                        • API String ID: 546120528-4032204789
                        • Opcode ID: 9015c1c5b5ff34126c77918f346f3a728c0ad205d12e4090e87a6f1f0335c35a
                        • Instruction ID: 2929904f6132e359dd0b48ed84e93b7c7d99044301d88acc9a4e5dd04a3bc7c2
                        • Opcode Fuzzy Hash: 9015c1c5b5ff34126c77918f346f3a728c0ad205d12e4090e87a6f1f0335c35a
                        • Instruction Fuzzy Hash: 8B510471A042C69FDB21CF75C8816BABBF8EF41304F14846ED192C7259D7759146CBB0
                        APIs
                        • EncodePointer.KERNEL32(00000000,?), ref: 6D35E324
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: EncodePointer
                        • String ID: MOC$RCC
                        • API String ID: 2118026453-2084237596
                        • Opcode ID: ffdc5455e81bfecb9b0bb15a40f2cb390ffe4efa40295608db89611d0ea6839b
                        • Instruction ID: 1602886fc27304f30c41f418c62bd4d8b3974cc2b72d090282e92fce991b4942
                        • Opcode Fuzzy Hash: ffdc5455e81bfecb9b0bb15a40f2cb390ffe4efa40295608db89611d0ea6839b
                        • Instruction Fuzzy Hash: 6541367190024AAFCF05CF94C881EEE7BB5FF48304F1581A9EA15BA250D336A961DB91
                        APIs
                        • WriteFile.KERNEL32(?,?,00000000,?,00000000,6D364CAC,00000000,?,?,00000000,?,00000000,00000000,00000000,?,?), ref: 6D3649FB
                        • GetLastError.KERNEL32(6D364CAC,00000000,?,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,6D362BB4,?), ref: 6D364A2B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: Mw;"
                        • API String ID: 442123175-4032204789
                        • Opcode ID: dbb797200b712fb580f73c77dbcf93f63bfe6a50d0e78d472b949d713c45ca48
                        • Instruction ID: e914167da909d9f7e95fa048205d13a7ae4cc1a759c10451fdac0af5269c961c
                        • Opcode Fuzzy Hash: dbb797200b712fb580f73c77dbcf93f63bfe6a50d0e78d472b949d713c45ca48
                        • Instruction Fuzzy Hash: 04318171A1425AAFDB14CF68CC91BEA77B9EB48304F0440A9E505D7294DB70ED81CB75
                        APIs
                        • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,6D364C95,00000000,?,?,00000000,?,00000000), ref: 6D3648D3
                        • GetLastError.KERNEL32(?,6D364C95,00000000,?,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,6D362BB4), ref: 6D3648F9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: Mw;"
                        • API String ID: 442123175-4032204789
                        • Opcode ID: 04d0721bc6f1e0dc036a5142acc467ce72e2c1da1fca83eef188a19d42b84e9f
                        • Instruction ID: e46bf87cabde149dd976165245a242880e02bbd6f94d8a4078120f187e56e98d
                        • Opcode Fuzzy Hash: 04d0721bc6f1e0dc036a5142acc467ce72e2c1da1fca83eef188a19d42b84e9f
                        • Instruction Fuzzy Hash: 92219E31E14259AFCB24CF19C891AA9B3F9FF4D314B1440AAEA09D7254D731DD81CBA1
                        APIs
                        • WriteFile.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,6D364CC0,00000000,?,?,00000000,?,00000000), ref: 6D3647EA
                        • GetLastError.KERNEL32(?,6D364CC0,00000000,?,?,00000000,?,00000000,00000000,00000000,?,?,00000000,?,?,6D362BB4), ref: 6D364810
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: ErrorFileLastWrite
                        • String ID: Mw;"
                        • API String ID: 442123175-4032204789
                        • Opcode ID: dc81236e853e717bd1011ca95c7fb883939b1b879c97000ec50dc1b8aa17eb8c
                        • Instruction ID: 0b23c2f1a9b00b4e7cf99f42ab3f3bd21b7243b63847e8b2267bb843bbd44d8c
                        • Opcode Fuzzy Hash: dc81236e853e717bd1011ca95c7fb883939b1b879c97000ec50dc1b8aa17eb8c
                        • Instruction Fuzzy Hash: CB218030E142599FCB15CF29CC90AE9B7B9EB4E305F1080AAEA45D7215D730DE42CB61
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 6D35C084
                        • ___raise_securityfailure.LIBCMT ref: 6D35C16C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390424556.000000006D351000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D350000, based on PE: true
                        • Associated: 00000000.00000002.1390404985.000000006D350000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390458301.000000006D368000.00000002.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmpDownload File
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID: FeaturePresentProcessor___raise_securityfailure
                        • String ID: Mw;"
                        • API String ID: 3761405300-4032204789
                        • Opcode ID: 5bb455302e742b93486a2d25589268aa5cea24e019e7c79ce0b3d7aa102a2bc2
                        • Instruction ID: edffd50c33947f00528a0b3605132e3fea6623193cb3fc24a9a996708e82c248
                        • Opcode Fuzzy Hash: 5bb455302e742b93486a2d25589268aa5cea24e019e7c79ce0b3d7aa102a2bc2
                        • Instruction Fuzzy Hash: 7F21D3BAA15206FEDB14CF15E155B543BBDFB7A304F10802AE6488B390E3B09980CF59
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,${$}$}
                        • API String ID: 0-728446245
                        • Opcode ID: 1555f709d15c13ee7f9aff05ddb25673eecd1206d31ab747ecaa1b682b14ee06
                        • Instruction ID: bc35480aa2430c08b5650358770aeea535b0a01f7dd9b97ae4b7ddc060e07767
                        • Opcode Fuzzy Hash: 1555f709d15c13ee7f9aff05ddb25673eecd1206d31ab747ecaa1b682b14ee06
                        • Instruction Fuzzy Hash: 995105B0908B068BE3305F2BD85532B7AF8BF81348F049578E6C986252E73FD104CB5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: $\oD$\oD$\oD
                        • API String ID: 0-1655774928
                        • Opcode ID: 42f3ca387ceb9feb97c9513d9686420401f676b13b602f98abdd7e4f3b5ca5c5
                        • Instruction ID: d2ed03ee67c17c970169af290318bd04f2ee247d834d91da05a691fad818200b
                        • Opcode Fuzzy Hash: 42f3ca387ceb9feb97c9513d9686420401f676b13b602f98abdd7e4f3b5ca5c5
                        • Instruction Fuzzy Hash: C151606D94EED38DE3324E399151375BBE16B43304FA9C1A9C4D84F292F2674887CB52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1390484831.000000006D36F000.00000004.00000001.01000000.00000006.sdmp, Offset: 6D36F000, based on PE: true
                        • Associated: 00000000.00000002.1390544618.000000006D3BA000.00000002.00000001.01000000.00000006.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d350000_tGm4SuP0sz.jbxd
                        Similarity
                        • API ID:
                        • String ID: Ekaj$Ihd_$LXEx$^E`v
                        • API String ID: 0-1331426215
                        • Opcode ID: e560be299b33481c0a99402b7e2626b2fe5922fdf1f0922f3832b13516bfd5fc
                        • Instruction ID: e4f319153cd257f8f517e0d65524d9424897e69fdffefb366a8dddde422ebf54
                        • Opcode Fuzzy Hash: e560be299b33481c0a99402b7e2626b2fe5922fdf1f0922f3832b13516bfd5fc
                        • Instruction Fuzzy Hash: 60210EB12083868FD324CF29C8A1B5EBBE2BB84704F204C1DF1A5CB290DB75D809CB56

                        Execution Graph

                        Execution Coverage:2.4%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:14.3%
                        Total number of Nodes:28
                        Total number of Limit Nodes:3
                        execution_graph 11033 4096e0 11035 4096eb 11033->11035 11034 409730 ExitProcess 11037 4096ef 11035->11037 11038 40aa80 11035->11038 11037->11034 11039 40ab81 LoadLibraryExW 11038->11039 11040 40ab35 11038->11040 11041 40aba9 11039->11041 11040->11039 11041->11037 11042 4366c0 GetLogicalDrives 11043 4366cb 11042->11043 11044 432284 11047 4396e0 11044->11047 11046 4322b0 11048 439700 11047->11048 11049 43985e 11048->11049 11051 436a70 LdrInitializeThunk 11048->11051 11049->11046 11051->11049 11052 437994 11054 4374f0 11052->11054 11053 437a16 11054->11053 11056 436a70 LdrInitializeThunk 11054->11056 11056->11054 11057 4378ca 11058 437803 11057->11058 11058->11057 11059 437944 11058->11059 11061 436a70 LdrInitializeThunk 11058->11061 11061->11058 11062 4370ba 11063 4370fe 11062->11063 11065 43715e 11063->11065 11066 436a70 LdrInitializeThunk 11063->11066 11066->11065

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 132 436a70-436a98 LdrInitializeThunk
                        APIs
                        • LdrInitializeThunk.NTDLL(0043988C,005C003F,00000006,?,?,00000018,BCBDBEBF,?,*QA), ref: 00436A96
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: InitializeThunk
                        • String ID:
                        • API String ID: 2994545307-0
                        • Opcode ID: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                        • Instruction ID: 9a2a3e30e6272c7ba4599b7d5b49d8b1df743313db24dc7d28a19b0c9381744b
                        • Opcode Fuzzy Hash: 3af67e3b8a4cf002b2d8122619789f5e408d063de0ae60c6913db66b84c766ee
                        • Instruction Fuzzy Hash: 82D04875908216AB9A09CF44C54040EFBE6BFC4714F228C8EA88873214C3B0BD46EB82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 40aa80-40ab33 1 40ab81-40abbe LoadLibraryExW call 4363c0 0->1 2 40ab35 0->2 9 40abc0-40abd1 1->9 10 40abd6-40ad2b call 438bd0 * 12 1->10 3 40ab37-40ab7d 2->3 3->3 5 40ab7f 3->5 5->1 15 40ae9b-40aead 9->15 39 40ad2f-40ad42 10->39 42 40ad53-40ad8f call 40a7b0 39->42 43 40ad44-40ad4e 39->43 54 40ad91-40ad9b 42->54 46 40ae7f-40ae86 43->46 46->15 48 40ae88-40ae99 46->48 48->15 54->54 55 40ad9d-40adb0 54->55 56 40adb2-40adb6 55->56 57 40adb8 55->57 58 40ae05-40ae13 call 40aeb0 56->58 59 40adba-40adbd 57->59 66 40ae18-40ae1c 58->66 60 40adc5-40ae03 call 410010 59->60 61 40adbf-40adc3 59->61 60->58 60->59 61->58 68 40ae20-40ae45 call 40b880 66->68 69 40ae1e-40ae4f 66->69 72 40ae51-40ae58 68->72 69->72 75 40ae62-40ae69 72->75 76 40ae5a 72->76 77 40ae6b-40ae78 75->77 78 40ae7d 75->78 76->75 77->39 78->46
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: B$F$P$R$X$X$X$Z
                        • API String ID: 1029625771-3412365628
                        • Opcode ID: 578134f4451ad78a3f9a9181d8e874eb2f163d4625e1681ae8047a6aa5fc69ca
                        • Instruction ID: dd598e264a0560bb66d2d30c86609d32f0111e72a788003366678ec101191ef6
                        • Opcode Fuzzy Hash: 578134f4451ad78a3f9a9181d8e874eb2f163d4625e1681ae8047a6aa5fc69ca
                        • Instruction Fuzzy Hash: 8DC146B450C781CFC700DF28D48461ABBE1AB9A314F004A2EF4D5A7392D778A859DB9B

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 80 4096e0-4096ed call 436400 83 4096f1-4096f8 call 4311b0 80->83 84 4096ef 80->84 88 4096fa 83->88 89 4096fc call 40aa80 83->89 85 409730-409739 ExitProcess 84->85 90 40972b call 436940 88->90 93 409701-409703 89->93 90->85 94 409705 93->94 95 409707-409727 call 409740 call 4101d0 call 40b8c0 93->95 96 409729 94->96 95->96 96->90
                        APIs
                        Strings
                        • system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways, xrefs: 0040970B
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: ExitProcess
                        • String ID: system or character via spellings glyphs a is uses that in their modified other on often reflection or resemblance on it leetspeak, used similarity internet. play eleet the of the replacements of primarily ways
                        • API String ID: 621844428-780655312
                        • Opcode ID: d6af8634371be7f9adbf63aa00ffc6355c7aaf593b22ced7c1feefe86d78ca9a
                        • Instruction ID: 82811eb763b08e2a216a0f4860bd117365c47e1aad2dadacaf3c94007ff21ae5
                        • Opcode Fuzzy Hash: d6af8634371be7f9adbf63aa00ffc6355c7aaf593b22ced7c1feefe86d78ca9a
                        • Instruction Fuzzy Hash: 02E03972828200DACB14BF6182426A967906F15388F12883FE981722D3DB3D8846961F

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 103 436940-436951 call 4384e0
                        APIs
                        • FreeLibrary.KERNELBASE(00409730), ref: 0043694B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: Wu
                        • API String ID: 3664257935-4083010176
                        • Opcode ID: 4cf7ab7b2ef8b130e9d78c47066a4e4481d5f4e93a47a61b34368f773019281b
                        • Instruction ID: 46e739cb66371f13af9979e29a2f2e1c28cce9907cd0cf73c677e2316a022541
                        • Opcode Fuzzy Hash: 4cf7ab7b2ef8b130e9d78c47066a4e4481d5f4e93a47a61b34368f773019281b
                        • Instruction Fuzzy Hash: 60A00278820501DBCE116F21FE0E50C7B22BB573497519479B45551437DE292814DA0D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 133 4366c0-4366c6 GetLogicalDrives call 436aa0 135 4366cb-4366e5 133->135
                        APIs
                        • GetLogicalDrives.KERNELBASE ref: 004366C0
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: DrivesLogical
                        • String ID:
                        • API String ID: 999431828-0
                        • Opcode ID: a832ce11f9b2b78d34e8998ed54d26d62c5cb69f7e3283dac8b6702f1d3ec4ab
                        • Instruction ID: 4a123ee13ff89c346c1803f0528f4480e21fe37d950f4e2e47ed48238b6c9086
                        • Opcode Fuzzy Hash: a832ce11f9b2b78d34e8998ed54d26d62c5cb69f7e3283dac8b6702f1d3ec4ab
                        • Instruction Fuzzy Hash: 5FD012396201409FC74CFF28FC51A6633E0A746229315803DE047C2252CA24EA01861C

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 250 42e490-42e4eb call 4101c0 OpenClipboard 254 42e4f2-42e52d GetWindowLongW GetClipboardData 250->254 255 42e4ed 250->255 259 42e534-42e564 GlobalLock call 409190 254->259 260 42e52f 254->260 256 42e654-42e667 255->256 264 42e566 259->264 265 42e56b-42e5d1 call 4101c0 259->265 261 42e64e CloseClipboard 260->261 261->256 266 42e640-42e648 GlobalUnlock 264->266 269 42e5d3-42e5d9 265->269 270 42e621-42e63e call 409960 265->270 266->261 271 42e5db-42e614 269->271 270->266 271->271 273 42e616-42e61f 271->273 273->270
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: Clipboard$CloseDataLongOpenWindow
                        • String ID: !$P$V$W$[$a$b$c$c$l$n
                        • API String ID: 1647500905-442629251
                        • Opcode ID: bcb9f924028dbcac92138826d65abaefba1f26c1b197660e7bbe70eb77523828
                        • Instruction ID: 74bdfcd54e904dab4c0bab061b67e559f6e16a6dafb19be60afdfbb9da9170a1
                        • Opcode Fuzzy Hash: bcb9f924028dbcac92138826d65abaefba1f26c1b197660e7bbe70eb77523828
                        • Instruction Fuzzy Hash: 22619CB0608740CFD720DF39D485716BBE1AF1A314F548A6DD8DA8B342D739E846CB66
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: Object$DeleteMetricsSelectSystem
                        • String ID:
                        • API String ID: 3911056724-3916222277
                        • Opcode ID: e9351c781cdd7423028b1a0e61d38f8ddc8ad16ad0321eea0371dd4229369d22
                        • Instruction ID: 7fb678e4427e2b284e0934f582c74d2bd3a248179ef726b0385307aaafabcb86
                        • Opcode Fuzzy Hash: e9351c781cdd7423028b1a0e61d38f8ddc8ad16ad0321eea0371dd4229369d22
                        • Instruction Fuzzy Hash: E9914AB4605B009FC364EF2CD985A16BBF1FB89704B108A6DE89AC7760D731B844CF96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,00000000,?), ref: 00412012
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,?,?), ref: 0041204C
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: lx
                        • API String ID: 237503144-3595554650
                        • Opcode ID: 22096bee09bd5474671cc10237d88cb1bbeca8dde8ec04b88883d36a90faa0e3
                        • Instruction ID: 5d3a69eff4a95c2ebedf6f94874777b5e3e680966239c333cf380e08d75b26c3
                        • Opcode Fuzzy Hash: 22096bee09bd5474671cc10237d88cb1bbeca8dde8ec04b88883d36a90faa0e3
                        • Instruction Fuzzy Hash: 2AD199716183818BD334CF14C8A9B9BB7E1BFC6304F04492EE88997391D7799945CBAB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3c26af72d09c6abfc4cad20da26e359f66d4419e8eda47ac32b04b71f1fee6bf
                        • Instruction ID: 93225cc52fafecf4d9b6477fd787fd4f6ff2f4f80a3bcdb9d327d7294cb36dd5
                        • Opcode Fuzzy Hash: 3c26af72d09c6abfc4cad20da26e359f66d4419e8eda47ac32b04b71f1fee6bf
                        • Instruction Fuzzy Hash: B3F0A5B45047019FC314DF28E49575ABBE0BB48304F51892DD5D68B751CB74AA48CF42
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: Object$DeleteMetricsSelectSystem
                        • String ID:
                        • API String ID: 3911056724-3916222277
                        • Opcode ID: 695b99ea780bb438686103979d889aa75e431560cf685628114eb782f7ae57fb
                        • Instruction ID: a2cb511f5f853d3e17429a697c2af7f20af71dca4cc77ea970b535d0df9a53ed
                        • Opcode Fuzzy Hash: 695b99ea780bb438686103979d889aa75e431560cf685628114eb782f7ae57fb
                        • Instruction Fuzzy Hash: 23815CB4A04B00DFC354EF29D585A1ABBF0FF49314F10896DE99ACB764D731A858CB92
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 00422FBE
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 00422FEE
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: F$_M$_Z
                        • API String ID: 237503144-862553977
                        • Opcode ID: dcfbdc026cab142696baebdc6674392b94d8334a2ad9550ac871aba0f0847eac
                        • Instruction ID: d93be78fb57612f20b71aa7f19a5cf60f95524bd14bdaba22b8eaab2f151a033
                        • Opcode Fuzzy Hash: dcfbdc026cab142696baebdc6674392b94d8334a2ad9550ac871aba0f0847eac
                        • Instruction Fuzzy Hash: F4A179715183918BE328CF14D450B9FBBE2FFC5308F518A2DE8996B382D7749949CB92
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 00422178
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 004221AD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: %P$IP$[M
                        • API String ID: 237503144-1856547701
                        • Opcode ID: 524c961932da136e3b86b03aba6b960e577ca4b776c6eded0946cf294691a716
                        • Instruction ID: 066c9d0b2f9531f209e750b705a7b72c8120525504c8ad43776b860a3ab93f18
                        • Opcode Fuzzy Hash: 524c961932da136e3b86b03aba6b960e577ca4b776c6eded0946cf294691a716
                        • Instruction Fuzzy Hash: 06417BB5608350AFD324CF25D940A5FBBE5EBC4710F508A2EF9A99B390C7B4D801CB86
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,00000000,?), ref: 0041DCD8
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,0000001E,00000000,?,?), ref: 0041DD09
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: ix$qe
                        • API String ID: 237503144-631226833
                        • Opcode ID: f970166ea82cc25616ac551c8eec6b0277b860be94b747de544db501f4c54533
                        • Instruction ID: 8dccc910e16ad3b3dcb77308158c2f119e12f607070f466f75316741d0052ec4
                        • Opcode Fuzzy Hash: f970166ea82cc25616ac551c8eec6b0277b860be94b747de544db501f4c54533
                        • Instruction Fuzzy Hash: 9181CAB56007009FE724CF29D881B56BBF1FB89304F104A2DE9968B781E775E845CB95
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1403068197.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_aspnet_regiis.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID: <VXw$Wu
                        • API String ID: 3664257935-3952055155
                        • Opcode ID: 32e326bd8da9bf92774132f0953f650f31decba6ef5bebfc91850a85a7836583
                        • Instruction ID: 8c38ddb1536dba232c8e264fcf94d573aa701b108dcbd730389a6b7c662de2d3
                        • Opcode Fuzzy Hash: 32e326bd8da9bf92774132f0953f650f31decba6ef5bebfc91850a85a7836583
                        • Instruction Fuzzy Hash: 34F15B70100B928ED725CF39D860BE7BBE1AF52309F45486DD4EB8B282DB397549CB54