Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_445.exe

Overview

General Information

Sample name:LisectAVT_2403002B_445.exe
Analysis ID:1481648
MD5:101e706c8b509af541e6dca6b289f309
SHA1:0335f29d8d5d39f4a40c2c38c48fda355f73b3a7
SHA256:8137af71185f4017345064b8e12f0595af2622eed918fe6281a8e59ca5497f42
Tags:exe
Infos:

Detection

LummaC
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Sample execution stops while process was sleeping (likely an evasion)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LisectAVT_2403002B_445.exe (PID: 6636 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_445.exe" MD5: 101E706C8B509AF541E6DCA6B289F309)
    • conhost.exe (PID: 6652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "relevantvoicelesskw.shop", "colorfulequalugliess.shop", "wisemassiveharmonious.shop", "sideindexfollowragelrew.pw"], "Build id": "LPnhqo--@asasdasqr"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-25T12:18:15.394752+0200
    SID:2050952
    Source Port:62388
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.271368+0200
    SID:2049958
    Source Port:65106
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.382314+0200
    SID:2050956
    Source Port:57736
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.343058+0200
    SID:2050996
    Source Port:54507
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.328952+0200
    SID:2051584
    Source Port:64965
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.371429+0200
    SID:2050953
    Source Port:58030
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.358660+0200
    SID:2051473
    Source Port:63354
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.316713+0200
    SID:2051587
    Source Port:54768
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T12:18:15.302690+0200
    SID:2051586
    Source Port:60825
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: LisectAVT_2403002B_445.exeAvira: detected
    Source: https://associationokeo.shop/apiAvira URL Cloud: Label: malware
    Source: https://turkeyunlikelyofw.shop/pAvira URL Cloud: Label: malware
    Source: https://associationokeo.shop/apiMAvira URL Cloud: Label: malware
    Source: colorfulequalugliess.shopAvira URL Cloud: Label: phishing
    Source: https://turkeyunlikelyofw.shop/apiAvira URL Cloud: Label: malware
    Source: https://turkeyunlikelyofw.shop/Avira URL Cloud: Label: malware
    Source: https://associationokeo.shop/_Avira URL Cloud: Label: malware
    Source: associationokeo.shopAvira URL Cloud: Label: malware
    Source: turkeyunlikelyofw.shopAvira URL Cloud: Label: malware
    Source: detectordiscusser.shopAvira URL Cloud: Label: malware
    Source: https://detectordiscusser.shop/apiAvira URL Cloud: Label: malware
    Source: https://colorfulequalugliess.shop/KAvira URL Cloud: Label: phishing
    Source: https://detectordiscusser.shop/apieAvira URL Cloud: Label: malware
    Source: https://associationokeo.shop//Avira URL Cloud: Label: malware
    Source: https://detectordiscusser.shop/Avira URL Cloud: Label: malware
    Source: sideindexfollowragelrew.pwAvira URL Cloud: Label: malware
    Source: https://relevantvoicelesskw.shop//Avira URL Cloud: Label: phishing
    Source: relevantvoicelesskw.shopAvira URL Cloud: Label: phishing
    Source: https://associationokeo.shop/iAvira URL Cloud: Label: malware
    Source: 0.2.LisectAVT_2403002B_445.exe.5a0000.1.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "relevantvoicelesskw.shop", "colorfulequalugliess.shop", "wisemassiveharmonious.shop", "sideindexfollowragelrew.pw"], "Build id": "LPnhqo--@asasdasqr"}
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: LisectAVT_2403002B_445.exeJoe Sandbox ML: detected
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: associationokeo.shop
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: turkeyunlikelyofw.shop
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: pooreveningfuseor.pw
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: edurestunningcrackyow.fun
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: detectordiscusser.shop
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: relevantvoicelesskw.shop
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: colorfulequalugliess.shop
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: wisemassiveharmonious.shop
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: sideindexfollowragelrew.pw
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Screen Resoluton:
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: Workgroup: -
    Source: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpString decryptor: LPnhqo--@asasdasqr
    Source: LisectAVT_2403002B_445.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: LisectAVT_2403002B_445.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00590F8A FindFirstFileExW,0_2_00590F8A
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ebx, eax0_2_005A2060
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edi], dl0_2_005C2000
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edi], dl0_2_005C2000
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edi], dl0_2_005C1F63
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then add ebx, edi0_2_005D308A
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp byte ptr [edi], 00000000h0_2_005B10B9
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edi], 0000002Bh0_2_005C1168
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ecx, dword ptr [esp+08h]0_2_005B4160
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ebx, eax0_2_005A2220
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp dword ptr [eax-08h], 18DC7455h0_2_005D02D0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_005C02E6
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp word ptr [ecx+eax+02h], 0000h0_2_005BF31D
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov edx, dword ptr [esp+0Ch]0_2_005B638C
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_005D2482
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp word ptr [edx+eax], 0000h0_2_005D2482
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then jmp esi0_2_005CE61E
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then jmp ecx0_2_005BC60E
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then jmp esi0_2_005D37BA
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edx], al0_2_005C2863
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_005A8800
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edx], cl0_2_005A8800
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then movzx ebx, byte ptr [edx]0_2_005CC880
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp dword ptr [eax-08h], 5C3924FCh0_2_005BC9B0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then jmp eax0_2_005BD9B6
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov eax, dword ptr [edi+0Ch]0_2_005A19A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov edi, dword ptr [esi+0Ch]0_2_005D1A5F
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ecx, dword ptr [esi+00000080h]0_2_005C0A88
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov byte ptr [edi], al0_2_005C0A88
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then jmp eax0_2_005D2B30
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp dword ptr [eax-08h], 5C3924FCh0_2_005BFBAB
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp byte ptr [ecx], dl0_2_005A7CF0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]0_2_005A8C90
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then lea esi, dword ptr [edx+ecx]0_2_005BDC90
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ecx, dword ptr [esp+0Ch]0_2_005B6DDA
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then movzx eax, byte ptr [esi+ecx]0_2_005ACDB0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then jmp edx0_2_005D3DB3
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]0_2_005A8DA0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov edi, dword ptr [esi+0Ch]0_2_0070265F
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp byte ptr [ecx], dl0_2_006D88F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov word ptr [ecx], dx0_2_00703082
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then cmp word ptr [edx+eax], 0000h0_2_00703082
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov edx, dword ptr [esp+08h]0_2_006D9890
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then lea esi, dword ptr [edx+ecx]0_2_006EE890
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 4x nop then mov ecx, edi0_2_005A5D70

    Networking

    barindex
    Source: Malware configuration extractorURLs: associationokeo.shop
    Source: Malware configuration extractorURLs: turkeyunlikelyofw.shop
    Source: Malware configuration extractorURLs: pooreveningfuseor.pw
    Source: Malware configuration extractorURLs: edurestunningcrackyow.fun
    Source: Malware configuration extractorURLs: detectordiscusser.shop
    Source: Malware configuration extractorURLs: relevantvoicelesskw.shop
    Source: Malware configuration extractorURLs: colorfulequalugliess.shop
    Source: Malware configuration extractorURLs: wisemassiveharmonious.shop
    Source: Malware configuration extractorURLs: sideindexfollowragelrew.pw
    Source: unknownDNS traffic detected: query: wisemassiveharmonious.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: turkeyunlikelyofw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: associationokeo.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: relevantvoicelesskw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: detectordiscusser.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: colorfulequalugliess.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: edurestunningcrackyow.fun replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: sideindexfollowragelrew.pw
    Source: global trafficDNS traffic detected: DNS query: wisemassiveharmonious.shop
    Source: global trafficDNS traffic detected: DNS query: colorfulequalugliess.shop
    Source: global trafficDNS traffic detected: DNS query: relevantvoicelesskw.shop
    Source: global trafficDNS traffic detected: DNS query: detectordiscusser.shop
    Source: global trafficDNS traffic detected: DNS query: edurestunningcrackyow.fun
    Source: global trafficDNS traffic detected: DNS query: pooreveningfuseor.pw
    Source: global trafficDNS traffic detected: DNS query: turkeyunlikelyofw.shop
    Source: global trafficDNS traffic detected: DNS query: associationokeo.shop
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop//
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/_
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671254395.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/api
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671254395.00000000008BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/apiM
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/i
    Source: LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://colorfulequalugliess.shop/K
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/
    Source: LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/api
    Source: LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/apie
    Source: LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://edurestunningcrackyow.fun/
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/t
    Source: LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://relevantvoicelesskw.shop//
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/
    Source: LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/api
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/p
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_006FA0A0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_006FA0A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_006FA0A0 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_006FA0A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00703127 NtClose,0_2_00703127
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_007052B0 NtAllocateVirtualMemory,NtFreeVirtualMemory,0_2_007052B0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00702AB2 NtOpenSection,0_2_00702AB2
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00702C33 NtMapViewOfSection,0_2_00702C33
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00702E7A NtAllocateVirtualMemory,NtFreeVirtualMemory,0_2_00702E7A
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_007057A0 NtAllocateVirtualMemory,NtFreeVirtualMemory,0_2_007057A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_004400600_2_00440060
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_004410E00_2_004410E0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005120600_2_00512060
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005234600_2_00523460
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0053FC100_2_0053FC10
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00579C100_2_00579C10
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005784000_2_00578400
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0056A8F00_2_0056A8F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0051BCE00_2_0051BCE0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0056C4800_2_0056C480
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005060B00_2_005060B0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005808B00_2_005808B0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005074A00_2_005074A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0055AD500_2_0055AD50
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005145400_2_00514540
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00547D100_2_00547D10
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0050FD000_2_0050FD00
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005495C00_2_005495C0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005981F10_2_005981F1
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_004FFA400_2_004FFA40
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005036400_2_00503640
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0053D2600_2_0053D260
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0054EA100_2_0054EA10
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0054F6D00_2_0054F6D0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00531EC00_2_00531EC0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005612C00_2_005612C0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005332F00_2_005332F0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00502E800_2_00502E80
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0052DF500_2_0052DF50
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005E93710_2_005E9371
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005463600_2_00546360
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005137100_2_00513710
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0056EF100_2_0056EF10
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00568B000_2_00568B00
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0052C7300_2_0052C730
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005E93E30_2_005E93E3
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00517B900_2_00517B90
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0052FBA00_2_0052FBA0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A30500_2_005A3050
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005C60800_2_005C6080
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A70A00_2_005A70A0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005B51700_2_005B5170
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A22200_2_005A2220
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005D52900_2_005D5290
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A53D00_2_005A53D0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A26300_2_005A2630
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005D56300_2_005D5630
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A46800_2_005A4680
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005C28630_2_005C2863
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A3A100_2_005A3A10
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005AFAB00_2_005AFAB0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005BDC900_2_005BDC90
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_006EE8900_2_006EE890
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005CE7500_2_005CE750
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005A5D700_2_005A5D70
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: String function: 0058AF80 appears 33 times
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: String function: 005A8250 appears 145 times
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: String function: 005A7B10 appears 43 times
    Source: LisectAVT_2403002B_445.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal92.troj.evad.winEXE@2/0@9/0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6652:120:WilError_03
    Source: LisectAVT_2403002B_445.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeFile read: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002B_445.exe "C:\Users\user\Desktop\LisectAVT_2403002B_445.exe"
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: webio.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeSection loaded: msasn1.dllJump to behavior
    Source: LisectAVT_2403002B_445.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: LisectAVT_2403002B_445.exeStatic file information: File size 2012017 > 1048576
    Source: LisectAVT_2403002B_445.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x197e00
    Source: LisectAVT_2403002B_445.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Source: LisectAVT_2403002B_445.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00598901 push ecx; ret 0_2_00598914
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005D7C47 push ecx; ret 0_2_005D7C48
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exe TID: 984Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exe TID: 984Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_00590F8A FindFirstFileExW,0_2_00590F8A
    Source: LisectAVT_2403002B_445.exe, 00000000.00000002.1671254395.00000000008BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058ECA0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0058ECA0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_005936A3 GetProcessHeap,0_2_005936A3
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058A882 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0058A882
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058ECA0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0058ECA0
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058AD60 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0058AD60
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058AEBC SetUnhandledExceptionFilter,0_2_0058AEBC

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: sideindexfollowragelrew.pw
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: associationokeo.shop
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: turkeyunlikelyofw.shop
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: pooreveningfuseor.pw
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: edurestunningcrackyow.fun
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: detectordiscusser.shop
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: relevantvoicelesskw.shop
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: colorfulequalugliess.shop
    Source: LisectAVT_2403002B_445.exeString found in binary or memory: wisemassiveharmonious.shop
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058AFC5 cpuid 0_2_0058AFC5
    Source: C:\Users\user\Desktop\LisectAVT_2403002B_445.exeCode function: 0_2_0058AC47 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0058AC47

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping1
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory21
    Security Software Discovery
    Remote Desktop Protocol2
    Clipboard Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared Drive11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
    Obfuscated Files or Information
    NTDS1
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    DLL Side-Loading
    LSA Secrets12
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    LisectAVT_2403002B_445.exe100%AviraTR/Crypt.Agent.iobkp
    LisectAVT_2403002B_445.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://associationokeo.shop/api100%Avira URL Cloudmalware
    https://turkeyunlikelyofw.shop/p100%Avira URL Cloudmalware
    https://associationokeo.shop/apiM100%Avira URL Cloudmalware
    colorfulequalugliess.shop100%Avira URL Cloudphishing
    https://turkeyunlikelyofw.shop/api100%Avira URL Cloudmalware
    pooreveningfuseor.pw0%Avira URL Cloudsafe
    edurestunningcrackyow.fun0%Avira URL Cloudsafe
    https://turkeyunlikelyofw.shop/100%Avira URL Cloudmalware
    https://associationokeo.shop/_100%Avira URL Cloudmalware
    associationokeo.shop100%Avira URL Cloudmalware
    https://edurestunningcrackyow.fun/0%Avira URL Cloudsafe
    turkeyunlikelyofw.shop100%Avira URL Cloudmalware
    detectordiscusser.shop100%Avira URL Cloudmalware
    https://pooreveningfuseor.pw/t0%Avira URL Cloudsafe
    https://detectordiscusser.shop/api100%Avira URL Cloudmalware
    https://colorfulequalugliess.shop/K100%Avira URL Cloudphishing
    https://detectordiscusser.shop/apie100%Avira URL Cloudmalware
    https://associationokeo.shop//100%Avira URL Cloudmalware
    wisemassiveharmonious.shop0%Avira URL Cloudsafe
    https://detectordiscusser.shop/100%Avira URL Cloudmalware
    sideindexfollowragelrew.pw100%Avira URL Cloudmalware
    https://relevantvoicelesskw.shop//100%Avira URL Cloudphishing
    https://pooreveningfuseor.pw/0%Avira URL Cloudsafe
    relevantvoicelesskw.shop100%Avira URL Cloudphishing
    https://associationokeo.shop/i100%Avira URL Cloudmalware
    NameIPActiveMaliciousAntivirus DetectionReputation
    edurestunningcrackyow.fun
    unknown
    unknowntrue
      unknown
      turkeyunlikelyofw.shop
      unknown
      unknowntrue
        unknown
        sideindexfollowragelrew.pw
        unknown
        unknowntrue
          unknown
          detectordiscusser.shop
          unknown
          unknowntrue
            unknown
            relevantvoicelesskw.shop
            unknown
            unknowntrue
              unknown
              pooreveningfuseor.pw
              unknown
              unknowntrue
                unknown
                wisemassiveharmonious.shop
                unknown
                unknowntrue
                  unknown
                  associationokeo.shop
                  unknown
                  unknowntrue
                    unknown
                    colorfulequalugliess.shop
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      edurestunningcrackyow.funtrue
                      • Avira URL Cloud: safe
                      unknown
                      pooreveningfuseor.pwtrue
                      • Avira URL Cloud: safe
                      unknown
                      associationokeo.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      colorfulequalugliess.shoptrue
                      • Avira URL Cloud: phishing
                      unknown
                      turkeyunlikelyofw.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      detectordiscusser.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      wisemassiveharmonious.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      sideindexfollowragelrew.pwtrue
                      • Avira URL Cloud: malware
                      unknown
                      relevantvoicelesskw.shoptrue
                      • Avira URL Cloud: phishing
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://associationokeo.shop/apiLisectAVT_2403002B_445.exe, 00000000.00000002.1671254395.00000000008BE000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://turkeyunlikelyofw.shop/pLisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://associationokeo.shop/_LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://turkeyunlikelyofw.shop/apiLisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://turkeyunlikelyofw.shop/LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://associationokeo.shop/apiMLisectAVT_2403002B_445.exe, 00000000.00000002.1671254395.00000000008BE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://edurestunningcrackyow.fun/LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://colorfulequalugliess.shop/KLisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: phishing
                      unknown
                      https://pooreveningfuseor.pw/tLisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://detectordiscusser.shop/apieLisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://detectordiscusser.shop/LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://detectordiscusser.shop/apiLisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://associationokeo.shop//LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://relevantvoicelesskw.shop//LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008EC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008EC000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: phishing
                      unknown
                      https://pooreveningfuseor.pw/LisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://associationokeo.shop/iLisectAVT_2403002B_445.exe, 00000000.00000002.1671318253.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_445.exe, 00000000.00000003.1669580341.00000000008D6000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1481648
                      Start date and time:2024-07-25 12:17:24 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 3m 13s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:2
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:LisectAVT_2403002B_445.exe
                      Detection:MAL
                      Classification:mal92.troj.evad.winEXE@2/0@9/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 93%
                      • Number of executed functions: 22
                      • Number of non-executed functions: 83
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • VT rate limit hit for: LisectAVT_2403002B_445.exe
                      TimeTypeDescription
                      06:18:13API Interceptor2x Sleep call for process: LisectAVT_2403002B_445.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      No created / dropped files found
                      File type:PE32 executable (console) Intel 80386, for MS Windows
                      Entropy (8bit):6.450959928713771
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:LisectAVT_2403002B_445.exe
                      File size:2'012'017 bytes
                      MD5:101e706c8b509af541e6dca6b289f309
                      SHA1:0335f29d8d5d39f4a40c2c38c48fda355f73b3a7
                      SHA256:8137af71185f4017345064b8e12f0595af2622eed918fe6281a8e59ca5497f42
                      SHA512:38c0b3561b53f8cedb9ba2c12547e5170187bb444bd43f5276794da107e890573dc0adbac451465d607a9144943f19e661d0663e11b717ef17b378af25ecadba
                      SSDEEP:24576:yjZgd+tJIg6hd/pBiNf+HPcd76abHtmTolRdcYg:yjmGIg6hd/PiNf+A6abHtsydcz
                      TLSH:D9951985B5E2A6C3E6A6DE302701BA91BA431DF70F26F5F6873394402AF71254C67387
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........$PRG..hsY.X..GyL.Z..C-...Q..uz....k?.?..N..2@.`...}s.....h...}>..V..D\.#....l.....m]............2..WJW.................PE..L..
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x58a878
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x65FFEB67 [Sun Mar 24 08:59:19 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:51db1582194f01c23bbc2a9ca35a507e
                      Instruction
                      call 00007F874116F3DCh
                      jmp 00007F874116EE39h
                      push ebp
                      mov ebp, esp
                      push 00000000h
                      call dword ptr [00599030h]
                      push dword ptr [ebp+08h]
                      call dword ptr [0059902Ch]
                      push C0000409h
                      call dword ptr [00599034h]
                      push eax
                      call dword ptr [00599038h]
                      pop ebp
                      ret
                      push ebp
                      mov ebp, esp
                      sub esp, 00000324h
                      push 00000017h
                      call dword ptr [0059903Ch]
                      test eax, eax
                      je 00007F874116EFC7h
                      push 00000002h
                      pop ecx
                      int 29h
                      mov dword ptr [005E68B8h], eax
                      mov dword ptr [005E68B4h], ecx
                      mov dword ptr [005E68B0h], edx
                      mov dword ptr [005E68ACh], ebx
                      mov dword ptr [005E68A8h], esi
                      mov dword ptr [005E68A4h], edi
                      mov word ptr [005E68D0h], ss
                      mov word ptr [005E68C4h], cs
                      mov word ptr [005E68A0h], ds
                      mov word ptr [005E689Ch], es
                      mov word ptr [005E6898h], fs
                      mov word ptr [005E6894h], gs
                      pushfd
                      pop dword ptr [005E68C8h]
                      mov eax, dword ptr [ebp+00h]
                      mov dword ptr [005E68BCh], eax
                      mov eax, dword ptr [ebp+04h]
                      mov dword ptr [005E68C0h], eax
                      lea eax, dword ptr [ebp+08h]
                      mov dword ptr [005E68CCh], eax
                      mov eax, dword ptr [ebp-00000324h]
                      mov dword ptr [005E6808h], 00010001h
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x19f5d40x28.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1eb0000x2d68.tls
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x19e9700x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x19e8b00x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x1990000x134.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x197c230x197e0045d2fe3c53e81b0a60797d94ed096d99False0.41138331290223723data6.0176219726821785IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x1990000x6ca40x6e001bf91c02bf33b0362dc7365b7b37f6f4False0.46072443181818185data5.091756129159089IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x1a00000x474440x46800cab59c15f922e5fda66ce57f3a9d2d5aFalse0.540278008643617data6.797833242993344IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .reloc0x1e80000x2d5c0x2e006fd29d58eb735fb160810af845c3f2bcFalse0.7130604619565217data6.115895082015251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      .tls0x1eb0000x2e000x2d68b764320f17ca6c504cb6d641b4dc7989False0.7225567790777702data6.168829025198588IMAGE_SCN_MEM_READ
                      DLLImport
                      KERNEL32.dllVirtualProtect, VirtualAlloc, VirtualAllocEx, LoadLibraryA, GetProcAddress, lstrlenW, CreateThread, Sleep, WaitForSingleObject, FreeConsole, SetEndOfFile, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, WriteConsoleW, RaiseException, RtlUnwind, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, EncodePointer, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetFileType, GetStringTypeW, CompareStringW, LCMapStringW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, SetFilePointerEx, CreateFileW, CloseHandle, DecodePointer
                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                      2024-07-25T12:18:15.394752+0200UDP2050952ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (associationokeo .shop)6238853192.168.2.41.1.1.1
                      2024-07-25T12:18:15.271368+0200UDP2049958ET MALWARE Lumma Stealer Related Domain in DNS Lookup (sideindexfollowragelrew .pw)6510653192.168.2.41.1.1.1
                      2024-07-25T12:18:15.382314+0200UDP2050956ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (turkeyunlikelyofw .shop)5773653192.168.2.41.1.1.1
                      2024-07-25T12:18:15.343058+0200UDP2050996ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (detectordiscusser .shop)5450753192.168.2.41.1.1.1
                      2024-07-25T12:18:15.328952+0200UDP2051584ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (relevantvoicelesskw .shop)6496553192.168.2.41.1.1.1
                      2024-07-25T12:18:15.371429+0200UDP2050953ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (pooreveningfuseor .pw)5803053192.168.2.41.1.1.1
                      2024-07-25T12:18:15.358660+0200UDP2051473ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (edurestunningcrackyow .fun)6335453192.168.2.41.1.1.1
                      2024-07-25T12:18:15.316713+0200UDP2051587ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (colorfulequalugliess .shop)5476853192.168.2.41.1.1.1
                      2024-07-25T12:18:15.302690+0200UDP2051586ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (wisemassiveharmonious .shop)6082553192.168.2.41.1.1.1
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 25, 2024 12:18:15.271368027 CEST6510653192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.299001932 CEST53651061.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.302690029 CEST6082553192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.312860966 CEST53608251.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.316713095 CEST5476853192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.326158047 CEST53547681.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.328952074 CEST6496553192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.338994026 CEST53649651.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.343058109 CEST5450753192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.351046085 CEST53545071.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.358659983 CEST6335453192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.367553949 CEST53633541.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.371428967 CEST5803053192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.378226995 CEST53580301.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.382313967 CEST5773653192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.390511990 CEST53577361.1.1.1192.168.2.4
                      Jul 25, 2024 12:18:15.394752026 CEST6238853192.168.2.41.1.1.1
                      Jul 25, 2024 12:18:15.402287006 CEST53623881.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 25, 2024 12:18:15.271368027 CEST192.168.2.41.1.1.10xffa8Standard query (0)sideindexfollowragelrew.pwA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.302690029 CEST192.168.2.41.1.1.10x8550Standard query (0)wisemassiveharmonious.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.316713095 CEST192.168.2.41.1.1.10x955Standard query (0)colorfulequalugliess.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.328952074 CEST192.168.2.41.1.1.10xbc20Standard query (0)relevantvoicelesskw.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.343058109 CEST192.168.2.41.1.1.10x34eeStandard query (0)detectordiscusser.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.358659983 CEST192.168.2.41.1.1.10x6448Standard query (0)edurestunningcrackyow.funA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.371428967 CEST192.168.2.41.1.1.10xdbd3Standard query (0)pooreveningfuseor.pwA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.382313967 CEST192.168.2.41.1.1.10xf97eStandard query (0)turkeyunlikelyofw.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.394752026 CEST192.168.2.41.1.1.10x446Standard query (0)associationokeo.shopA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 25, 2024 12:18:15.312860966 CEST1.1.1.1192.168.2.40x8550Name error (3)wisemassiveharmonious.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.326158047 CEST1.1.1.1192.168.2.40x955Name error (3)colorfulequalugliess.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.338994026 CEST1.1.1.1192.168.2.40xbc20Name error (3)relevantvoicelesskw.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.351046085 CEST1.1.1.1192.168.2.40x34eeName error (3)detectordiscusser.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.367553949 CEST1.1.1.1192.168.2.40x6448Name error (3)edurestunningcrackyow.funnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.390511990 CEST1.1.1.1192.168.2.40xf97eName error (3)turkeyunlikelyofw.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 12:18:15.402287006 CEST1.1.1.1192.168.2.40x446Name error (3)associationokeo.shopnonenoneA (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to jump to process

                      Target ID:0
                      Start time:06:18:13
                      Start date:25/07/2024
                      Path:C:\Users\user\Desktop\LisectAVT_2403002B_445.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_445.exe"
                      Imagebase:0x400000
                      File size:2'012'017 bytes
                      MD5 hash:101E706C8B509AF541E6DCA6B289F309
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:06:18:13
                      Start date:25/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:1%
                        Dynamic/Decrypted Code Coverage:18.4%
                        Signature Coverage:10.9%
                        Total number of Nodes:293
                        Total number of Limit Nodes:6
                        execution_graph 20972 7052b0 20973 7052c0 20972->20973 20979 700a20 20973->20979 20975 7052f5 20976 7053af 20975->20976 20977 7053b4 NtAllocateVirtualMemory 20975->20977 20978 705470 NtFreeVirtualMemory 20977->20978 20978->20976 20980 700a65 20979->20980 20981 700a97 RtlAllocateHeap 20979->20981 20980->20981 20981->20975 20982 702ab2 20983 704a70 20982->20983 20984 702ac2 NtOpenSection 20983->20984 20985 7023f3 20986 7023fe 20985->20986 20987 7024dc LoadLibraryW 20986->20987 20988 7024e3 20987->20988 20989 702c33 20990 702c4e 20989->20990 20991 702c84 NtMapViewOfSection 20990->20991 20992 440060 20993 440092 VirtualProtect 20992->20993 20997 58a590 20993->20997 20996 440f0b 20998 58a598 20997->20998 20999 58a599 IsProcessorFeaturePresent 20997->20999 20998->20996 21001 58a8bf 20999->21001 21004 58a882 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 21001->21004 21003 58a9a2 21003->20996 21004->21003 21005 703636 21006 70364e RtlAllocateHeap 21005->21006 21008 702e7a 21010 702e9f NtAllocateVirtualMemory 21008->21010 21011 703051 NtFreeVirtualMemory 21010->21011 21012 6fdcc3 21013 700a20 RtlAllocateHeap 21012->21013 21014 6fdcd1 21013->21014 21017 7057a0 21014->21017 21018 7057b9 21017->21018 21019 6fdcfb 21017->21019 21018->21019 21020 7057f3 NtAllocateVirtualMemory 21018->21020 21021 705898 NtFreeVirtualMemory 21020->21021 21021->21019 21022 700adc 21023 700b79 RtlFreeHeap 21022->21023 21024 700b2d 21022->21024 21024->21023 21025 6d8da0 21026 6d8daa 21025->21026 21028 6d8dcd GetStdHandle 21026->21028 21030 6d8dc0 ExitProcess 21026->21030 21031 6d8dcb 21026->21031 21028->21031 21032 703fb0 21031->21032 21033 703fc2 FreeLibrary 21032->21033 21034 703fb9 21032->21034 21035 703fda 21033->21035 21034->21033 21035->21030 21036 58a6f6 21037 58a702 ___scrt_is_nonwritable_in_current_image 21036->21037 21061 58aa6c 21037->21061 21039 58a709 21040 58a862 21039->21040 21049 58a733 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 21039->21049 21080 58ad60 4 API calls 2 library calls 21040->21080 21042 58a869 21081 58fb74 21 API calls CallUnexpected 21042->21081 21044 58a86f 21082 58fb38 21 API calls CallUnexpected 21044->21082 21046 58a877 21047 58a752 21048 58a7d3 21072 58f801 21048->21072 21049->21047 21049->21048 21076 58fb4e 39 API calls 4 library calls 21049->21076 21052 58a7d9 21053 58a7f0 21052->21053 21077 58ae7a GetModuleHandleW 21053->21077 21055 58a7fa 21055->21042 21056 58a7fe 21055->21056 21057 58a807 21056->21057 21078 58fb29 21 API calls CallUnexpected 21056->21078 21079 58abdd 75 API calls ___scrt_uninitialize_crt 21057->21079 21060 58a810 21060->21047 21062 58aa75 21061->21062 21083 58afc5 IsProcessorFeaturePresent 21062->21083 21064 58aa81 21084 58d26e 10 API calls 2 library calls 21064->21084 21066 58aa86 21071 58aa8a 21066->21071 21085 590167 21066->21085 21069 58aaa1 21069->21039 21071->21039 21073 58f80a 21072->21073 21074 58f80f 21072->21074 21098 58f55b 21073->21098 21074->21052 21076->21048 21077->21055 21078->21057 21079->21060 21080->21042 21081->21044 21082->21046 21083->21064 21084->21066 21089 5936be 21085->21089 21088 58d28d 7 API calls 2 library calls 21088->21071 21090 58aa93 21089->21090 21091 5936ce 21089->21091 21090->21069 21090->21088 21091->21090 21093 592939 21091->21093 21094 592940 21093->21094 21095 592983 GetStdHandle 21094->21095 21096 5929e5 21094->21096 21097 592996 GetFileType 21094->21097 21095->21094 21096->21091 21097->21094 21099 58f564 21098->21099 21102 58f57a 21098->21102 21099->21102 21104 58f587 21099->21104 21101 58f571 21101->21102 21121 58f6f2 15 API calls 3 library calls 21101->21121 21102->21074 21105 58f590 21104->21105 21106 58f593 21104->21106 21105->21101 21122 591c2a 21106->21122 21111 58f5b0 21150 58f5e1 39 API calls 4 library calls 21111->21150 21112 58f5a4 21149 590b19 14 API calls __dosmaperr 21112->21149 21115 58f5aa 21115->21101 21116 58f5b7 21151 590b19 14 API calls __dosmaperr 21116->21151 21118 58f5d4 21152 590b19 14 API calls __dosmaperr 21118->21152 21120 58f5da 21120->21101 21121->21102 21123 591c33 21122->21123 21127 58f599 21122->21127 21153 5907fb 21123->21153 21128 592168 GetEnvironmentStringsW 21127->21128 21129 592180 21128->21129 21134 58f59e 21128->21134 21353 5920c5 WideCharToMultiByte ___scrt_uninitialize_crt 21129->21353 21131 59219d 21132 5921b2 21131->21132 21133 5921a7 FreeEnvironmentStringsW 21131->21133 21135 590acb __strnicoll 15 API calls 21132->21135 21133->21134 21134->21111 21134->21112 21136 5921b9 21135->21136 21137 5921c1 21136->21137 21138 5921d2 21136->21138 21354 590b19 14 API calls __dosmaperr 21137->21354 21355 5920c5 WideCharToMultiByte ___scrt_uninitialize_crt 21138->21355 21141 5921e2 21143 5921e9 21141->21143 21144 5921f1 21141->21144 21142 5921c6 FreeEnvironmentStringsW 21142->21134 21356 590b19 14 API calls __dosmaperr 21143->21356 21357 590b19 14 API calls __dosmaperr 21144->21357 21147 5921ef FreeEnvironmentStringsW 21147->21134 21149->21115 21150->21116 21151->21118 21152->21120 21154 59080c 21153->21154 21155 590806 21153->21155 21159 590812 21154->21159 21205 5934d1 6 API calls __dosmaperr 21154->21205 21204 593492 6 API calls __dosmaperr 21155->21204 21158 590826 21158->21159 21160 59082a 21158->21160 21161 590817 21159->21161 21213 59029e 39 API calls CallUnexpected 21159->21213 21206 590c03 14 API calls __dosmaperr 21160->21206 21181 591a35 21161->21181 21164 590836 21166 59083e 21164->21166 21167 590853 21164->21167 21207 5934d1 6 API calls __dosmaperr 21166->21207 21209 5934d1 6 API calls __dosmaperr 21167->21209 21170 59085f 21172 590863 21170->21172 21173 590872 21170->21173 21171 59084a 21208 590b19 14 API calls __dosmaperr 21171->21208 21210 5934d1 6 API calls __dosmaperr 21172->21210 21211 59056e 14 API calls __dosmaperr 21173->21211 21177 59087d 21212 590b19 14 API calls __dosmaperr 21177->21212 21178 590850 21178->21159 21180 590884 21180->21161 21214 591b8a 21181->21214 21186 591a78 21186->21127 21189 591a9f 21241 591c85 21189->21241 21190 591a91 21252 590b19 14 API calls __dosmaperr 21190->21252 21194 591ad7 21253 590bf0 14 API calls __dosmaperr 21194->21253 21196 591b1e 21199 591b67 21196->21199 21256 5916ae 39 API calls 2 library calls 21196->21256 21197 591adc 21254 590b19 14 API calls __dosmaperr 21197->21254 21198 591af2 21198->21196 21255 590b19 14 API calls __dosmaperr 21198->21255 21257 590b19 14 API calls __dosmaperr 21199->21257 21204->21154 21205->21158 21206->21164 21207->21171 21208->21178 21209->21170 21210->21171 21211->21177 21212->21180 21215 591b96 ___scrt_is_nonwritable_in_current_image 21214->21215 21216 591bb0 21215->21216 21258 590a6c EnterCriticalSection 21215->21258 21218 591a5f 21216->21218 21261 59029e 39 API calls CallUnexpected 21216->21261 21225 5917bc 21218->21225 21219 591bec 21260 591c09 LeaveCriticalSection CallUnexpected 21219->21260 21223 591bc0 21223->21219 21259 590b19 14 API calls __dosmaperr 21223->21259 21262 5912c0 21225->21262 21228 5917dd GetOEMCP 21230 591806 21228->21230 21229 5917ef 21229->21230 21231 5917f4 GetACP 21229->21231 21230->21186 21232 590acb 21230->21232 21231->21230 21233 590b09 21232->21233 21234 590ad9 21232->21234 21274 590bf0 14 API calls __dosmaperr 21233->21274 21236 590af4 HeapAlloc 21234->21236 21239 590add __dosmaperr 21234->21239 21237 590b07 21236->21237 21236->21239 21238 590b0e 21237->21238 21238->21189 21238->21190 21239->21233 21239->21236 21273 58efb5 EnterCriticalSection LeaveCriticalSection __dosmaperr 21239->21273 21242 5917bc 41 API calls 21241->21242 21244 591ca5 21242->21244 21243 591daa 21246 58a590 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21243->21246 21244->21243 21245 591ce2 IsValidCodePage 21244->21245 21250 591cfd std::bad_exception::bad_exception 21244->21250 21245->21243 21248 591cf4 21245->21248 21247 591acc 21246->21247 21247->21194 21247->21198 21249 591d1d GetCPInfo 21248->21249 21248->21250 21249->21243 21249->21250 21275 591890 21250->21275 21252->21186 21253->21197 21254->21186 21255->21196 21256->21199 21257->21186 21258->21223 21259->21219 21260->21216 21263 5912de 21262->21263 21269 5912d7 21262->21269 21263->21269 21270 590740 39 API calls 3 library calls 21263->21270 21265 5912ff 21271 594292 39 API calls __strnicoll 21265->21271 21267 591315 21272 5942f0 39 API calls __strnicoll 21267->21272 21269->21228 21269->21229 21270->21265 21271->21267 21272->21269 21273->21239 21274->21238 21276 5918b8 GetCPInfo 21275->21276 21277 591981 21275->21277 21276->21277 21282 5918d0 21276->21282 21278 58a590 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21277->21278 21280 591a33 21278->21280 21280->21243 21286 592ce5 21282->21286 21285 594d33 44 API calls 21285->21277 21287 5912c0 __strnicoll 39 API calls 21286->21287 21288 592d05 21287->21288 21306 59200b 21288->21306 21290 592dc1 21293 58a590 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21290->21293 21291 592db9 21309 592de6 14 API calls __freea 21291->21309 21292 592d32 21292->21290 21292->21291 21295 590acb __strnicoll 15 API calls 21292->21295 21297 592d57 __strnicoll std::bad_exception::bad_exception 21292->21297 21296 591938 21293->21296 21295->21297 21301 594d33 21296->21301 21297->21291 21298 59200b __strnicoll MultiByteToWideChar 21297->21298 21299 592da0 21298->21299 21299->21291 21300 592da7 GetStringTypeW 21299->21300 21300->21291 21302 5912c0 __strnicoll 39 API calls 21301->21302 21303 594d46 21302->21303 21312 594b44 21303->21312 21310 591f73 21306->21310 21309->21290 21311 591f84 MultiByteToWideChar 21310->21311 21311->21292 21313 594b5f __strnicoll 21312->21313 21314 59200b __strnicoll MultiByteToWideChar 21313->21314 21318 594ba3 21314->21318 21315 594d1e 21316 58a590 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 21315->21316 21317 591959 21316->21317 21317->21285 21318->21315 21319 590acb __strnicoll 15 API calls 21318->21319 21321 594bc9 __strnicoll 21318->21321 21332 594c71 21318->21332 21319->21321 21322 59200b __strnicoll MultiByteToWideChar 21321->21322 21321->21332 21323 594c12 21322->21323 21323->21332 21340 59355e 21323->21340 21326 594c48 21329 59355e 7 API calls 21326->21329 21326->21332 21327 594c80 21328 594d09 21327->21328 21330 590acb __strnicoll 15 API calls 21327->21330 21333 594c92 __strnicoll 21327->21333 21351 592de6 14 API calls __freea 21328->21351 21329->21332 21330->21333 21352 592de6 14 API calls __freea 21332->21352 21333->21328 21334 59355e 7 API calls 21333->21334 21335 594cd5 21334->21335 21335->21328 21349 5920c5 WideCharToMultiByte ___scrt_uninitialize_crt 21335->21349 21337 594cef 21337->21328 21338 594cf8 21337->21338 21350 592de6 14 API calls __freea 21338->21350 21341 5931d4 LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 21340->21341 21342 593569 21341->21342 21343 59356f LCMapStringEx 21342->21343 21344 593596 21342->21344 21348 5935b6 21343->21348 21345 5935bb __strnicoll 5 API calls 21344->21345 21347 5935af LCMapStringW 21345->21347 21347->21348 21348->21326 21348->21327 21348->21332 21349->21337 21350->21332 21351->21332 21352->21315 21353->21131 21354->21142 21355->21141 21356->21147 21357->21147 21358 70265f 21360 7026b0 21358->21360 21359 702710 LoadLibraryW 21359->21360 21360->21359 21360->21360 21364 703127 21365 703137 21364->21365 21366 703150 NtClose 21365->21366 21367 702587 21368 702600 LoadLibraryW 21367->21368 21369 7025d8 21367->21369 21370 702607 21368->21370 21369->21368 21369->21369

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 75 4410e0-4410ff 76 441109-44111a 75->76 77 4627d4-462ad3 76->77 78 441120-441130 76->78 79 472ad7 77->79 81 472427-472431 78->81 82 441136-441146 78->82 79->76 81->79 84 44114c-44115c 82->84 85 448588-4485b2 82->85 87 441162-441172 84->87 88 470d1d-470d27 84->88 85->79 90 45d682-45e61a 87->90 91 441178-441188 87->91 88->79 90->79 93 44118e-44119e 91->93 94 46973b-469b0b 91->94 96 4411a4-4411b4 93->96 97 445800-4466db 93->97 94->79 99 46bbbb-46bc71 96->99 100 4411ba-4411ca 96->100 97->79 99->79 102 4411d0-4411e0 100->102 103 44d92d-44d937 100->103 105 4411e6-4411f6 102->105 106 44c1d0-44c387 102->106 103->79 108 4411fc-44120c 105->108 109 457929-4586e1 105->109 106->79 111 441212-441222 108->111 112 4457df-4457fb 108->112 109->79 114 44872f-4489e6 111->114 115 441228-441238 111->115 112->79 114->79 117 44d93c-44d95d 115->117 118 44123e-44124e 115->118 117->79 120 441254-441264 118->120 121 45b1ee-45b1f8 118->121 123 46e3ab-46f286 120->123 124 44126a-44127a 120->124 121->79 123->79 126 447a15-447d74 124->126 127 441280-441290 124->127 126->79 129 441296-4412a6 127->129 130 46491a-464936 127->130 132 4412ac-4412bc 129->132 133 4707eb-470aff 129->133 130->79 135 4412c2-4412d2 132->135 136 44479d-4457cb call 43ebe0 132->136 133->79 139 462d7d-462d93 135->139 140 4412d8-4412e8 135->140 136->79 139->79 143 4586e6-458702 140->143 144 4412ee-4412fe 140->144 143->79 146 441304-441314 144->146 147 471fd6-472023 144->147 149 455de4-455ff8 146->149 150 44131a-44132a 146->150 147->79 149->79 152 441330-441340 150->152 153 446952-44695c 150->153 155 441346-441356 152->155 156 446943-44694d 152->156 153->79 158 44135c-44136c 155->158 159 45ee29-45f16d 155->159 156->79 161 448d82-448fd5 VirtualAllocEx 158->161 162 441372-441382 158->162 159->79 161->79 164 46b767-46bad1 162->164 165 441388-441398 162->165 164->79 167 44139e-4413ae 165->167 168 44c39b-44c3bf 165->168 170 4413b4-4413c4 167->170 171 45b24a-45b265 167->171 168->79 173 471a9f-471aa9 170->173 174 4413ca-4413da 170->174 171->79 173->79 176 4724c3-4724f1 174->176 177 4413e0-4413f0 174->177 176->79 179 4413f6-441406 177->179 180 452893-453370 177->180 182 46c1f5-46ccb6 179->182 183 44140c-44141c 179->183 180->79 182->79 185 454ce6-455aa8 183->185 186 441422-441432 183->186 185->79 188 446961-4469cd call 58b290 * 2 186->188 189 441438-441448 186->189 188->79 193 46805e-468fd0 189->193 194 44144e-44145e 189->194 193->79 198 441464-441474 194->198 199 452884-45288e 194->199 201 44ea35-44ea4d 198->201 202 44147a-44148a 198->202 199->79 201->79 204 441490-4414a0 202->204 205 46ccbb-46d22d call 58b3f0 202->205 209 4414a6-4414b6 204->209 210 460752-460ae6 204->210 205->79 212 4414bc-4414cc 209->212 213 462d5c-462d78 209->213 210->79 215 4414d2-4414e2 212->215 216 47246f-472485 212->216 213->79 218 4414e8-4414f8 215->218 219 463bfb-463e29 215->219 216->79 221 4414fe-44150e 218->221 222 45a339-45a343 218->222 219->79 224 441514-441524 221->224 225 4432a7-443c5d 221->225 222->79 227 472043-47204d 224->227 228 44152a-44153a 224->228 225->79 227->79 230 441540-441550 228->230 231 44ddf3-44e9dc 228->231 233 4477b5-447a10 230->233 234 441556-441566 230->234 231->79 233->79 236 45a365-45a38a 234->236 237 44156c-44157c 234->237 236->79 239 441582-441592 237->239 240 461a7c-4627c0 237->240 242 459339-459343 239->242 243 441598-4415a8 239->243 240->79 242->79 245 4415ae-4415be 243->245 246 45a348-45a360 243->246 248 4415c4-4415d4 245->248 249 4667b1-4667cd 245->249 246->79 251 45e61f-45ebf4 248->251 252 4415da-44261d 248->252 249->79 251->159 252->79
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: AllocVirtual$AddressCreateLibraryLoadObjectProcSingleThreadWait$Sleeplstrlen
                        • String ID: &iug$&iug$:6SY$:6SY$@$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe$D$Dp[f$MZx$R)|$\~#$kr9@$lJx$x$!uq$AV{
                        • API String ID: 1351281969-1804762653
                        • Opcode ID: e7c30ccb64e4230fd7d1abe2324c637316919f11062961b8e77a19a4f028276c
                        • Instruction ID: 6e13b27e6b28ca3936986e15ddb83133aed75227716d45a29e0065069844fc92
                        • Opcode Fuzzy Hash: e7c30ccb64e4230fd7d1abe2324c637316919f11062961b8e77a19a4f028276c
                        • Instruction Fuzzy Hash: 8454F377A50AA04FFB50983CC8B93D71BE24773331F29679186B84B2E3C55B164AAF50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 632 7052b0-7052bb 633 7052c0-7052c9 632->633 633->633 634 7052cb-7052dd 633->634 635 7052e6-7052ed 634->635 636 7052df-7052e4 634->636 637 7052ef-705316 call 700a20 635->637 636->637 640 705331-705389 637->640 641 705318-70531b 637->641 643 70548d-70549f call 6d8710 640->643 644 70538f-705397 640->644 642 705320-70532f 641->642 642->640 642->642 646 7053a0-7053a7 644->646 648 7053b4-705487 NtAllocateVirtualMemory NtFreeVirtualMemory 646->648 649 7053a9-7053ad 646->649 648->643 649->646 650 7053af 649->650 650->643
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00705415
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000,?,00000000,00000010,00003000,00000040), ref: 00705487
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: ,$@
                        • API String ID: 292159236-1227015840
                        • Opcode ID: 5653969c889f688eb66e75d5390de366ec261b403b083986cf63775a58025652
                        • Instruction ID: ded5703f86ba095343c043fe299d492f42898b2c2519bf1b46f568d7da93e9e3
                        • Opcode Fuzzy Hash: 5653969c889f688eb66e75d5390de366ec261b403b083986cf63775a58025652
                        • Instruction Fuzzy Hash: 71517EB11043049FE711CF18C845B6BBBE4EF84358F54861DF9A99B2E0E779D908CB96

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 664 7057a0-7057b7 665 7057b9-7057c6 664->665 666 7057df-7057e1 664->666 667 7057d0-7057d7 665->667 668 7057e3-7057e7 666->668 669 7057e9-7057f2 666->669 670 7057f3-7058bb NtAllocateVirtualMemory NtFreeVirtualMemory 667->670 671 7057d9-7057dd 667->671 668->669 670->668 673 7058c1 670->673 671->666 671->667 673->669
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00705854
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000,?,00000000,00000010,00003000,00000040), ref: 007058B3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: $
                        • API String ID: 292159236-3993045852
                        • Opcode ID: e45d237de3acbb0b76dff56c08294f3564aeeb5b3f0f19a26298c09544129150
                        • Instruction ID: 571ea171b62d5d02fbdbda33eb6d208fffd56853e7362904566732413fc597da
                        • Opcode Fuzzy Hash: e45d237de3acbb0b76dff56c08294f3564aeeb5b3f0f19a26298c09544129150
                        • Instruction Fuzzy Hash: 32315E71208314AFE710CF18DC44B5BBBE8EB89718F108A1CFAA9972D0D775D9088B96

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 770 70265f-7026ae 771 7026b0-7026f9 770->771 772 7026fb-702700 770->772 771->771 771->772 774 70272b-70277a 772->774 775 702710-702728 LoadLibraryW 774->775 776 70277c-70277f 774->776 775->774 777 702780-7027c9 776->777 777->777 778 7027cb 777->778 778->775
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: uvw
                        • API String ID: 1029625771-3462500642
                        • Opcode ID: 22f0dfb1a0db74a3f1f1901504651e8157ffab53d8e41bdda7f8712b5a3cb4e8
                        • Instruction ID: 435feb663da5d0519b9207f21e32ff2202ab98fd32316d95b5f324f2c430c822
                        • Opcode Fuzzy Hash: 22f0dfb1a0db74a3f1f1901504651e8157ffab53d8e41bdda7f8712b5a3cb4e8
                        • Instruction Fuzzy Hash: 4B417C76250A429FC718CF15C4A0A66F7A2FF89324B68DA1DC4A647B85C738F466CF84

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 848 702e7a-702e99 849 702f6d-702f8c 848->849 850 702e9f-702ea7 848->850 852 702f8e-702f96 849->852 853 702faf-702fc1 849->853 851 702eb0-702eb7 850->851 854 702ec4-702f65 851->854 855 702eb9-702ebd 851->855 856 702fa0-702fa7 852->856 858 702fc4-70307f NtAllocateVirtualMemory NtFreeVirtualMemory 853->858 854->849 855->851 857 702ebf 855->857 856->858 859 702fa9-702fad 856->859 857->849 859->853 859->856
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 0070301B
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00703067
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 1011852050ce5695c6b7d7d7af59469dbc6a89cec480087caaa8c789bd6ce845
                        • Instruction ID: 56f983fb2f657037516d296a0ff7e422512cbcb49941c3f6f0ac9bbe3c883ad6
                        • Opcode Fuzzy Hash: 1011852050ce5695c6b7d7d7af59469dbc6a89cec480087caaa8c789bd6ce845
                        • Instruction Fuzzy Hash: DF510771110B409FE725CF18C858B66B7F4FB08314F148B1CE5AA9BAE1D7B8E949CB94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 863 440060-44008b 864 440092-44009d 863->864 865 4400a3-4400b0 864->865 866 440ecf-440ed6 864->866 869 4400b6-4400c3 865->869 870 44011e-4403c5 865->870 867 4410d5 866->867 867->864 872 44010c-440119 869->872 873 4400c9-4400d6 869->873 870->867 872->867 875 4400dc-4400e9 873->875 876 4403ca-440eca 873->876 878 440f13-4410ce 875->878 879 4400ef-4400fc 875->879 876->867 878->867 881 440102-440107 879->881 882 440edb-440f06 VirtualProtect call 58a590 879->882 881->867 885 440f0b-440f12 882->885
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0b411c4b0dc64c476b7552fd120cd8051a95b9fffaa20fb531c3e262c8c02ff9
                        • Instruction ID: f4867835bce4b223895882ec1a78cefec2126b80fe52bc5b1f6e813c06ace2ba
                        • Opcode Fuzzy Hash: 0b411c4b0dc64c476b7552fd120cd8051a95b9fffaa20fb531c3e262c8c02ff9
                        • Instruction Fuzzy Hash: 5AA2CE77A51A500FFB40987CC8AD3DB1BD687B7732F2A6715CAB44B6E2C55B000BAB50
                        APIs
                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000002,00000000,00000002,00000000,00000002), ref: 00702C9C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: SectionView
                        • String ID:
                        • API String ID: 1323581903-0
                        • Opcode ID: ce3d8a2c6c462a305ce16a63b998f529b15615d39912ff56c30009be18aeab9f
                        • Instruction ID: 720e0ae01844a137da99cbbe369415312941b9fc163c4d5223fcccedfa28859c
                        • Opcode Fuzzy Hash: ce3d8a2c6c462a305ce16a63b998f529b15615d39912ff56c30009be18aeab9f
                        • Instruction Fuzzy Hash: 0F013C70384350BFE7319B14DC47F153ABAAB42B14F20C244F6216E1E2C7B62910CB59
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: Close
                        • String ID:
                        • API String ID: 3535843008-0
                        • Opcode ID: bf9df8704aa08e56faebdb5def92edfa28b0c457df742ca02759a5cb4cfe5d80
                        • Instruction ID: 06e549725d5a3e89f2311a9b6bb113d3f341cffba8b8704e04c83643410fc796
                        • Opcode Fuzzy Hash: bf9df8704aa08e56faebdb5def92edfa28b0c457df742ca02759a5cb4cfe5d80
                        • Instruction Fuzzy Hash: 56E012B4A94111FFCB15EF5CFC429A43AA1EB66205700D020F916D52B2DA2A16A5DE19
                        APIs
                        • NtOpenSection.NTDLL(?,00000004), ref: 00702ACC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: OpenSection
                        • String ID:
                        • API String ID: 1950954290-0
                        • Opcode ID: 583c3596ad9d27c31748657e9897cd0a3e4d67e78b3f8bec76bbaf7dfe454474
                        • Instruction ID: 43b7d058ebc87d9f6c51ffda3d30ce40a4a2d1ea271d57aa44166768501a2f73
                        • Opcode Fuzzy Hash: 583c3596ad9d27c31748657e9897cd0a3e4d67e78b3f8bec76bbaf7dfe454474
                        • Instruction Fuzzy Hash: 1FD05BB5150150D7C725D778EC43D263369A785301710D014F362C71D2D976A552CA58

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 652 7023f3-70248f call 704a70 * 3 659 702491 652->659 660 7024dc-7024e1 LoadLibraryW 652->660 661 7024a0-7024da 659->661 662 7024e3 660->662 663 7024e8-702504 660->663 661->660 661->661 662->663
                        APIs
                        • LoadLibraryW.KERNELBASE(?), ref: 007024DD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: B)D+$F-,/$p%'
                        • API String ID: 1029625771-2598909315
                        • Opcode ID: af7c57e71d87b7a26f70fc0ac83cc2a010d95630e60d5a212eafc530e6f30bca
                        • Instruction ID: 928c50b899920e9c428049b4e2a1074e0246fcbcaeabff74d5e67f789a4db729
                        • Opcode Fuzzy Hash: af7c57e71d87b7a26f70fc0ac83cc2a010d95630e60d5a212eafc530e6f30bca
                        • Instruction Fuzzy Hash: 40218DB1501702DFD718CF14E8A0A26BBF2FB45310B54C66CD8469BBA2D739E981CF84

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 674 6d8da0-6d8dbe call 6d8e50 call 701f20 680 6d8dc0 674->680 681 6d8dc2-6d8dc9 call 6fd510 674->681 682 6d8e16-6d8e22 ExitProcess 680->682 685 6d8dcd-6d8df7 GetStdHandle call 6d8e30 call 6da230 681->685 686 6d8dcb 681->686 693 6d8dfc-6d8dfe 685->693 687 6d8e0f call 703fb0 686->687 691 6d8e14 687->691 691->682 694 6d8e00 693->694 695 6d8e02-6d8e07 call 6e0860 693->695 696 6d8e09-6d8e0d 694->696 695->696 696->687
                        APIs
                        Strings
                        • eleet or leetspeak, is a system of modified spellings used primarily on the internet. it often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance, xrefs: 006D8DDF
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: ExitProcess
                        • String ID: eleet or leetspeak, is a system of modified spellings used primarily on the internet. it often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance
                        • API String ID: 621844428-3721107060
                        • Opcode ID: f0036bde0d7349993efde5ed7e925012f8ec033bfd46b4b73384404e193069cb
                        • Instruction ID: f034a30cba7395a809c88dab305593f53e1d5b1afd4b7b5b832355eeb8e5e7e8
                        • Opcode Fuzzy Hash: f0036bde0d7349993efde5ed7e925012f8ec033bfd46b4b73384404e193069cb
                        • Instruction Fuzzy Hash: 5FF0A471C18200CEC6503F76990E67BBBAB9F11320F100A1BE992533D2EF3454569ED7

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 701 594b44-594b5d 702 594b5f-594b6f call 59604f 701->702 703 594b73-594b78 701->703 702->703 709 594b71 702->709 705 594b7a-594b82 703->705 706 594b85-594bab call 59200b 703->706 705->706 711 594d21-594d32 call 58a590 706->711 712 594bb1-594bbc 706->712 709->703 714 594bc2-594bc7 712->714 715 594d14 712->715 718 594bc9-594bd2 call 598990 714->718 719 594be0-594beb call 590acb 714->719 716 594d16 715->716 720 594d18-594d1f call 592de6 716->720 718->716 726 594bd8-594bde 718->726 719->716 728 594bf1 719->728 720->711 729 594bf7-594bfc 726->729 728->729 729->716 730 594c02-594c17 call 59200b 729->730 730->716 733 594c1d-594c2f call 59355e 730->733 735 594c34-594c38 733->735 735->716 736 594c3e-594c46 735->736 737 594c48-594c4d 736->737 738 594c80-594c8c 736->738 737->720 741 594c53-594c55 737->741 739 594d09 738->739 740 594c8e-594c90 738->740 745 594d0b-594d12 call 592de6 739->745 743 594c92-594c9b call 598990 740->743 744 594ca5-594cb0 call 590acb 740->744 741->716 742 594c5b-594c75 call 59355e 741->742 742->720 754 594c7b 742->754 743->745 755 594c9d-594ca3 743->755 744->745 756 594cb2 744->756 745->716 754->716 757 594cb8-594cbd 755->757 756->757 757->745 758 594cbf-594cd7 call 59355e 757->758 758->745 761 594cd9-594ce0 758->761 762 594d01-594d07 761->762 763 594ce2-594ce3 761->763 764 594ce4-594cf6 call 5920c5 762->764 763->764 764->745 767 594cf8-594cff call 592de6 764->767 767->720
                        APIs
                        • __freea.LIBCMT ref: 00594CF9
                          • Part of subcall function 00590ACB: HeapAlloc.KERNEL32(00000000,0058B27E,?,?,0058B9FA,?,?,-00000002603B985F,-4081992C,?,0058B1D1,0058B27E,?,?,?,?), ref: 00590AFD
                        • __freea.LIBCMT ref: 00594D0C
                        • __freea.LIBCMT ref: 00594D19
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: __freea$AllocHeap
                        • String ID:
                        • API String ID: 85559729-0
                        • Opcode ID: cd5ed6f8b347867009333f28de9852a6695fd0b7825ee8c3117320ca3f444642
                        • Instruction ID: fd0cc46645060483b29cea0208f88dff7e5b7888c99466e64340abfc42bc1883
                        • Opcode Fuzzy Hash: cd5ed6f8b347867009333f28de9852a6695fd0b7825ee8c3117320ca3f444642
                        • Instruction Fuzzy Hash: 6951AE76600206AFEF259E608C85EBB3FA9FF89710F294529FD04D7140EB31DD128AA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 779 703636-70364c 780 703650-703687 779->780 781 70364e 779->781 782 7036b5-70372d RtlAllocateHeap 780->782 783 703689 780->783 781->780 784 703690-7036b3 783->784 784->782 784->784
                        APIs
                        • RtlAllocateHeap.NTDLL(?,00000000,FFFFFFFF), ref: 007036C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID: `123
                        • API String ID: 1279760036-1835766495
                        • Opcode ID: b4c50003b81cd770b7fd67e4cd8fe7a091216e636decdd6803b3ce07473780ab
                        • Instruction ID: 1f967c446330be38d7832a59fe2180778b0a289985c2ab0c27c2818e0e074d21
                        • Opcode Fuzzy Hash: b4c50003b81cd770b7fd67e4cd8fe7a091216e636decdd6803b3ce07473780ab
                        • Instruction Fuzzy Hash: 0E2169312083408BD719CF2CC8A075BBBE6EBC6258F54862CE9528B3E1C779E941CB85

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 785 7037bf-7037cd 786 7037d1-703808 785->786 787 7037cf 785->787 788 703835-70387d RtlAllocateHeap 786->788 789 70380a 786->789 787->786 790 703810-703833 789->790 790->788 790->790
                        APIs
                        • RtlAllocateHeap.NTDLL(?,00000000,FFFFFFFF), ref: 00703842
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID: `123
                        • API String ID: 1279760036-1835766495
                        • Opcode ID: 0d54c8ba7db5517b214b748ffc412e3a4981ff8432f6d93ce3d0b4622e0ee18e
                        • Instruction ID: 8c5bbbe9868cd22302c9d98166c542f5886f2fac2818f5c35c66207a863f1148
                        • Opcode Fuzzy Hash: 0d54c8ba7db5517b214b748ffc412e3a4981ff8432f6d93ce3d0b4622e0ee18e
                        • Instruction Fuzzy Hash: 791128B42483408FD718CF18C894B5BBFF1EB86344F50891CE581877A1D779D955CB86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 791 700a20-700a63 792 700a65 791->792 793 700a97-700aad RtlAllocateHeap 791->793 794 700a70-700a95 792->794 794->793 794->794
                        APIs
                        • RtlAllocateHeap.NTDLL(?,00000000,?), ref: 00700AA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID: `123
                        • API String ID: 1279760036-1835766495
                        • Opcode ID: 0ab4ed51ff615ce31fe1d70177ceb575c73ad5b9886e70a4c1a1b933e2006e81
                        • Instruction ID: 6e30d27271176db9583e25bbbed9e837e1820156e2707c12b07015fc9c5b1ef8
                        • Opcode Fuzzy Hash: 0ab4ed51ff615ce31fe1d70177ceb575c73ad5b9886e70a4c1a1b933e2006e81
                        • Instruction Fuzzy Hash: FB01E5B02083419FE314CF14C865B2BBBE1EB81324F208A4CE8A507691C7759919CBC6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 795 591c85-591cad call 5917bc 798 591cb3-591cb9 795->798 799 591e72-591e73 call 59182d 795->799 800 591cbc-591cc2 798->800 804 591e78-591e7a 799->804 802 591cc8-591cd4 800->802 803 591dbe-591ddd call 58b290 800->803 802->800 805 591cd6-591cdc 802->805 814 591de0-591de5 803->814 807 591e7b-591e89 call 58a590 804->807 808 591ce2-591cee IsValidCodePage 805->808 809 591db6-591db9 805->809 808->809 813 591cf4-591cfb 808->813 809->807 815 591d1d-591d2a GetCPInfo 813->815 816 591cfd-591d09 813->816 817 591e22-591e2c 814->817 818 591de7-591dec 814->818 821 591daa-591db0 815->821 822 591d2c-591d4b call 58b290 815->822 820 591d0d-591d18 816->820 817->814 819 591e2e-591e58 call 59177e 817->819 823 591e1f 818->823 824 591dee-591df6 818->824 835 591e59-591e68 819->835 826 591e6a-591e6b call 591890 820->826 821->799 821->809 822->820 837 591d4d-591d54 822->837 823->817 828 591df8-591dfb 824->828 829 591e17-591e1d 824->829 836 591e70 826->836 833 591dfd-591e03 828->833 829->818 829->823 833->829 834 591e05-591e15 833->834 834->829 834->833 835->826 835->835 836->804 838 591d80-591d83 837->838 839 591d56-591d5b 837->839 840 591d88-591d8f 838->840 839->838 841 591d5d-591d65 839->841 840->840 842 591d91-591da5 call 59177e 840->842 843 591d78-591d7e 841->843 844 591d67-591d6e 841->844 842->820 843->838 843->839 846 591d6f-591d76 844->846 846->843 846->846
                        APIs
                          • Part of subcall function 005917BC: GetOEMCP.KERNEL32(00000000,?,?,00000000,?), ref: 005917E7
                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,?,?,?,?,00591ACC,?,00000000,?,00000000,?), ref: 00591CE6
                        • GetCPInfo.KERNEL32(00000000,?,?,?,?,?,?,?,?,00591ACC,?,00000000,?,00000000,?), ref: 00591D22
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: CodeInfoPageValid
                        • String ID:
                        • API String ID: 546120528-0
                        • Opcode ID: 838e1c91fd076db693493694bdb80d6709ba79588aeef765457cf5e06c7e0f5e
                        • Instruction ID: 1b6eba25015c24d4f9c27465c878cc6cf479732c1f65f62725463201551c9ed2
                        • Opcode Fuzzy Hash: 838e1c91fd076db693493694bdb80d6709ba79588aeef765457cf5e06c7e0f5e
                        • Instruction Fuzzy Hash: 77510170A00B678EDF21CF75C8846AABFE9FF91300F18456ED0968B252E7749945CB98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 886 592939-59293e 887 592940-592958 886->887 888 59295a-59295e 887->888 889 592966-59296f 887->889 888->889 890 592960-592964 888->890 891 592981 889->891 892 592971-592974 889->892 896 5929db-5929df 890->896 895 592983-592990 GetStdHandle 891->895 893 59297d-59297f 892->893 894 592976-59297b 892->894 893->895 894->895 897 5929bd-5929cf 895->897 898 592992-592994 895->898 896->887 899 5929e5-5929e8 896->899 897->896 901 5929d1-5929d4 897->901 898->897 900 592996-59299f GetFileType 898->900 900->897 902 5929a1-5929aa 900->902 901->896 903 5929ac-5929b0 902->903 904 5929b2-5929b5 902->904 903->896 904->896 905 5929b7-5929bb 904->905 905->896
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00592985
                        • GetFileType.KERNELBASE(00000000), ref: 00592997
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: FileHandleType
                        • String ID:
                        • API String ID: 3000768030-0
                        • Opcode ID: da12cc7b01ffe31367065bf076cb3bcbfb7b37ce21aeecff4f82f4cda2e1a531
                        • Instruction ID: 3284696963506dececb250cf49439be412aef3c80be2b014486b33fcecd0c478
                        • Opcode Fuzzy Hash: da12cc7b01ffe31367065bf076cb3bcbfb7b37ce21aeecff4f82f4cda2e1a531
                        • Instruction Fuzzy Hash: CB118E316047516ADF344E3E8C98622BE99BB66370F380B1AE4B7DA5F1C334D9C6E251
                        APIs
                        • LCMapStringEx.KERNELBASE(?,00594C34,?,?,-00000008,?,00000000,00000000,00000000,00000000,00000000), ref: 00593592
                        • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,-00000008,-00000008,?,00594C34,?,?,-00000008,?,00000000), ref: 005935B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: String
                        • String ID:
                        • API String ID: 2568140703-0
                        • Opcode ID: 57bfe0299506080901b7fc6b57b2ca1553b5da8bdad923bc59453652bf6209b4
                        • Instruction ID: 73160930e086c53671cee915d8defe9472c0ac1da3fca6ef06d4fdb549ba0180
                        • Opcode Fuzzy Hash: 57bfe0299506080901b7fc6b57b2ca1553b5da8bdad923bc59453652bf6209b4
                        • Instruction Fuzzy Hash: 60F0523240021ABBCF126F909C099DE3F6ABB5D3A0F068015BA1825020CB32CA31EB94
                        APIs
                        • GetCPInfo.KERNEL32(FFFFF9B5,?,00000005,00591ACC,?), ref: 005918C2
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: Info
                        • String ID:
                        • API String ID: 1807457897-0
                        • Opcode ID: 29302f2054fd7fdd45e96ff1440d279d42459dbfec16609b96b06dda992c69ee
                        • Instruction ID: b60882e231b3a8cf7605f990809bd682ad8247995a72f62dc9dffea4c92bc337
                        • Opcode Fuzzy Hash: 29302f2054fd7fdd45e96ff1440d279d42459dbfec16609b96b06dda992c69ee
                        • Instruction Fuzzy Hash: 70515AB190816AAEDF118E28CD84BE9BFADFF15304F1405E9E499C7182D3359E85DFA0
                        APIs
                        • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00700B86
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: FreeHeap
                        • String ID:
                        • API String ID: 3298025750-0
                        • Opcode ID: 81a7aa42915e030f43248b6267ec065fd9fb2908553cbe0cd5a68e5380a59af4
                        • Instruction ID: eebe54f45aace2572e9e1a7a2beb6ccf1bab6f11b83f8d618ec17f9f2e395262
                        • Opcode Fuzzy Hash: 81a7aa42915e030f43248b6267ec065fd9fb2908553cbe0cd5a68e5380a59af4
                        • Instruction Fuzzy Hash: 231119756083009FDB08CF01D86476FFBE2EBC4729F148A1DE89A57691C7799906CB86
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: f4dca88a714c8923d6f05ccb84d1c34531c4863cf5dea0f9bb45c0596061239a
                        • Instruction ID: a2fd1416e78854275d12596bcad0314c66666de5de5fdcd0a7f36a9cc956550c
                        • Opcode Fuzzy Hash: f4dca88a714c8923d6f05ccb84d1c34531c4863cf5dea0f9bb45c0596061239a
                        • Instruction Fuzzy Hash: 23113575200A02AFE314CF19C8A0A27BBB1FF46364B50CB1DC56687B90C734E961CF84
                        APIs
                        • FreeLibrary.KERNELBASE(006D8E14), ref: 00703FC8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670967330.00000000006D1000.00000020.00001000.00020000.00000000.sdmp, Offset: 006D0000, based on PE: true
                        • Associated: 00000000.00000002.1670947362.00000000006D0000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1670997509.0000000000707000.00000002.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671016289.000000000070A000.00000004.00001000.00020000.00000000.sdmpDownload File
                        • Associated: 00000000.00000002.1671037134.0000000000714000.00000002.00001000.00020000.00000000.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_6d0000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: aacfe52b235272ced3ed8240ae0319d5892c9dcf2520e6eaf0342645f8272954
                        • Instruction ID: af3d9787d27aae96cfac8743f93df41cbb9f8d170a1a27f3f299380601357383
                        • Opcode Fuzzy Hash: aacfe52b235272ced3ed8240ae0319d5892c9dcf2520e6eaf0342645f8272954
                        • Instruction Fuzzy Hash: E8D09E71710105EBCF015F69FD08D957AB5B704301700C520F94AA01F1DA2EDB15DB5C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: h,jn$h,jn$x;L@
                        • API String ID: 0-221569872
                        • Opcode ID: 1b3d99efa6db336748ddfb965f404fd9411318ad5a570319433afb37be29009b
                        • Instruction ID: 9e55a19846826d939e74a22506219bc3975f1cfbb0ccd2a3dfb81aad6b61084b
                        • Opcode Fuzzy Hash: 1b3d99efa6db336748ddfb965f404fd9411318ad5a570319433afb37be29009b
                        • Instruction Fuzzy Hash: 29F3AC76A91AA04FEB51983888B93D71FE24773331F2A379586F40B2E3C557124EAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: B'Sh$v$v
                        • API String ID: 0-3196793827
                        • Opcode ID: e8d4d3c02173a4ccb656ea78af5ff7d1d33a05a1e2b7e502485f5a9aa1682a21
                        • Instruction ID: ab76d39111afa0b01b7469c30e38b4ca0316ed8ab2bb148e2a4207bb186e8ee6
                        • Opcode Fuzzy Hash: e8d4d3c02173a4ccb656ea78af5ff7d1d33a05a1e2b7e502485f5a9aa1682a21
                        • Instruction Fuzzy Hash: B473AB76A50AA04FEB519938C8B93DB1FE24773731F2A6795C6B40B2E3C517024EAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: B#tw$B#tw
                        • API String ID: 0-3589352061
                        • Opcode ID: 43ee2de5ed536a9b5ac88803b8ac2e7bf44110a1cbe235bb1aa333f04e1d0267
                        • Instruction ID: 05cfa2dbb592a5b1f7370e0b1e62b674b3a6eb6e29571b86853456ba3fd0e477
                        • Opcode Fuzzy Hash: 43ee2de5ed536a9b5ac88803b8ac2e7bf44110a1cbe235bb1aa333f04e1d0267
                        • Instruction Fuzzy Hash: 09738B76A91A904FEB519838C8BA3C71FE24773731E2A779586F40B2E3C547124EAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: =$>I$JiUj$ML$bX\K$mnRQ
                        • API String ID: 0-2844760306
                        • Opcode ID: ab737fd0466a319242f6193b8354029b6968a1c39ede0b1e0bd6cfc7fc98cd0e
                        • Instruction ID: 8adf928b00c484a9f3ac8cde95666d1ef447f701e94c9419add7495b0ea8b302
                        • Opcode Fuzzy Hash: ab737fd0466a319242f6193b8354029b6968a1c39ede0b1e0bd6cfc7fc98cd0e
                        • Instruction Fuzzy Hash: 3DC147B05093818FD725CF15C4A07AFBBE0BF86314F14495DE4E59B382CB79990ACB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: nYTu$nYTu$?X5$?X5
                        • API String ID: 0-3608183084
                        • Opcode ID: bb15641b529f2a5ad569b97bdf471cd17ec3a873a751a03600cacaecbd6a3696
                        • Instruction ID: a68dfb8f40e62e5ff89786949bb56dbd9dc15e67124aa535eef0a8902586153f
                        • Opcode Fuzzy Hash: bb15641b529f2a5ad569b97bdf471cd17ec3a873a751a03600cacaecbd6a3696
                        • Instruction Fuzzy Hash: AAC29B76A51A904FEB419878C4BA3DB1FE68773731F2A6719C6B44B2E3C50B110EAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: )$IDAT$IEND$IHDR
                        • API String ID: 0-3181356877
                        • Opcode ID: 685adf631ad49081b612d4db49c852dbd3f75fe7e12c3b15bc015a7654051b96
                        • Instruction ID: 2acc6f75ab995a217c0fe93b0690dc4629ec0969486f68d212f07f8e3c2e4636
                        • Opcode Fuzzy Hash: 685adf631ad49081b612d4db49c852dbd3f75fe7e12c3b15bc015a7654051b96
                        • Instruction Fuzzy Hash: 7D12BCB16083548FD714CF28C854B5EBBE1BF86304F058A6DFA858B392D379DA09CB91
                        APIs
                        • ___std_exception_destroy.LIBVCRUNTIME ref: 00581CA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: ___std_exception_destroy
                        • String ID:
                        • API String ID: 4194217158-0
                        • Opcode ID: 86d7a762d75b8b425101793ed1bcf7e90aad2b659cf412b5f240ce85741f9aa3
                        • Instruction ID: 6e6f1fa0747b16f19508906676a19c95d4fb3263eb6c08f772f49d986fd27f37
                        • Opcode Fuzzy Hash: 86d7a762d75b8b425101793ed1bcf7e90aad2b659cf412b5f240ce85741f9aa3
                        • Instruction Fuzzy Hash: EB338876AA1A904FFB41987888B93DB1BE24773731E2A7745C6F40B2E3C547114BAF60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: Qx$S]Q
                        • API String ID: 0-1210399317
                        • Opcode ID: f750716fb4a6f2265c4f554347139b9ec8c127b1a443262ec058a29af1358c90
                        • Instruction ID: 6091bc49892b3671833026e5620f21b80c79eab7136e3b08d02aa7bcf58eb0dd
                        • Opcode Fuzzy Hash: f750716fb4a6f2265c4f554347139b9ec8c127b1a443262ec058a29af1358c90
                        • Instruction Fuzzy Hash: 86D2597AA61A901FFB419878C4B93CB1BE28773735F2A7715C6B44B6E2C50B110FAB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: r+:
                        • API String ID: 0-2520838776
                        • Opcode ID: d779d7d78752c70ce0817c7248701e119736885904e306b3de71c8bddb30968a
                        • Instruction ID: 292670cd6de2b43e78fe1b9acf8e1ab2bacf64c058999203a2e64ac2a943a8ba
                        • Opcode Fuzzy Hash: d779d7d78752c70ce0817c7248701e119736885904e306b3de71c8bddb30968a
                        • Instruction Fuzzy Hash: 31237A76AA1A904FFF419878C4BA3DB1BE64773331E2A771586B40B6E3C54B110EAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$z$
                        • API String ID: 0-2628445692
                        • Opcode ID: 4d1fc1deff65e21b88e93d539f373cae71cd381a489b90953f3e4e8b663927dd
                        • Instruction ID: 2e7947ada7d64ca698e749390cf64b4545f9b620a12de86425ba1af8d2281243
                        • Opcode Fuzzy Hash: 4d1fc1deff65e21b88e93d539f373cae71cd381a489b90953f3e4e8b663927dd
                        • Instruction Fuzzy Hash: F60214B01083828BE724CF14C4A4B6FBBE6BBC6348F144D1CE5D58B292D779D949CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 2$8$;
                        • API String ID: 0-1476958264
                        • Opcode ID: 5b11f4b7c838e394f5afdd80530e46b07975916d0aa69864f1bd8cf73783d52c
                        • Instruction ID: 9ee7da160cea2915725649fd81db89aaa68be521b39e023571f350d8cdd307e9
                        • Opcode Fuzzy Hash: 5b11f4b7c838e394f5afdd80530e46b07975916d0aa69864f1bd8cf73783d52c
                        • Instruction Fuzzy Hash: 5CA1A17160C3818FD735CE68C494B9ABBE2BBD5324F184A2DD8E98B3C2D7759905CB42
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: bad array new length
                        • API String ID: 0-1242854226
                        • Opcode ID: e56470c30bed55d3925d759ad03637a261c1453ea52858753bb7ba7d5650f977
                        • Instruction ID: b3480d42f2bbc2627b63329acaf5f2a2e7e475b4e62e5b4ac388e0c633c2a843
                        • Opcode Fuzzy Hash: e56470c30bed55d3925d759ad03637a261c1453ea52858753bb7ba7d5650f977
                        • Instruction Fuzzy Hash: 3D035976A51AA04FFB41997888BA3DB1BE68773331F3A771586B40B2D3C54B110EAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: mM{$mM{
                        • API String ID: 0-2220883866
                        • Opcode ID: ffb82d1b00d32108db07c68c21e8b55e151c38dc538282f9a262c61964b916f5
                        • Instruction ID: 78b7294d3570d75b57fcaa9ba1b6eda306a3c70ea5b2a276b5a8a82d913b3c5d
                        • Opcode Fuzzy Hash: ffb82d1b00d32108db07c68c21e8b55e151c38dc538282f9a262c61964b916f5
                        • Instruction Fuzzy Hash: 44827A7AA609504FFF419838C9EA3C71BD387B3736F2A771586B44B6E2C54B110EAB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: Unknown exception
                        • API String ID: 0-410509341
                        • Opcode ID: 92a7e9cbd1796ee93d6c32d8ff50cda8cb39b6834f272cb2106cd042f9c33895
                        • Instruction ID: ce8999780e174267bbe89af9928873aa1a1b45619e07ebe9b3ba6fb56e086b22
                        • Opcode Fuzzy Hash: 92a7e9cbd1796ee93d6c32d8ff50cda8cb39b6834f272cb2106cd042f9c33895
                        • Instruction Fuzzy Hash: E2E29B76A91A900FEF419978C4B93DB1FE24773732F2A671586F40B6E3C54B110AAF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$8
                        • API String ID: 0-46163386
                        • Opcode ID: dcd6e10817bcf6b0dcfd9f8d90b9e05080c086d014f8be4c284e07c9d3f7dc20
                        • Instruction ID: a335059bf33039d5b392a982e06648b76c20e8b87da589c124e97eccb2037258
                        • Opcode Fuzzy Hash: dcd6e10817bcf6b0dcfd9f8d90b9e05080c086d014f8be4c284e07c9d3f7dc20
                        • Instruction Fuzzy Hash: 347224716083409FD724CF58C880B9EBBE2BFD6314F19892DE9898B391D7B5D845CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: FY~$d
                        • API String ID: 0-1120672609
                        • Opcode ID: 2a77dad7d625777af608848375b946450808228e89fcb9e73973c727a84eb25f
                        • Instruction ID: 8ac47ea2e1f6dd7da4857358ae9e6de462c13127ced1ceb5d39d6f1f5315612b
                        • Opcode Fuzzy Hash: 2a77dad7d625777af608848375b946450808228e89fcb9e73973c727a84eb25f
                        • Instruction Fuzzy Hash: ED42AD71104B418FD325CF25C894BA3BBE2BF56304F188A5DD4EB8BA96D778A809CB54
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: z$
                        • API String ID: 0-1376504176
                        • Opcode ID: 2c7021178ed4bff8e83ae50436233b2660486697bd32c8c9c7dcdc42a9523aa1
                        • Instruction ID: 749631be692ba0500262d4611b2ad63a43ba13cfa420e0ac9e01f431b7464613
                        • Opcode Fuzzy Hash: 2c7021178ed4bff8e83ae50436233b2660486697bd32c8c9c7dcdc42a9523aa1
                        • Instruction Fuzzy Hash: AEF1D2B02083828BE724CF14C4A4B5FBBE5BBC6348F144D1CE5D54B692C77AD949CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: uw$y{
                        • API String ID: 0-756344669
                        • Opcode ID: cd94a78860907570e88e08c6dc9872753c63102ca23bfd10c249738200a0b99a
                        • Instruction ID: 4ee9e130f057117e57c5c96a00bdb6e20b28b3351134f119dbbffdc41a2b5374
                        • Opcode Fuzzy Hash: cd94a78860907570e88e08c6dc9872753c63102ca23bfd10c249738200a0b99a
                        • Instruction Fuzzy Hash: E54117741083419BC724CF14C8A1AABBBF1FFC6394F149A1CF8958B6A2D7749845DB86
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: <=4
                        • API String ID: 0-979447913
                        • Opcode ID: 86e1fcea3d435c6822c6e7e50cbc205664531b226dda02baed332cea8563bab7
                        • Instruction ID: 216a009ec999e8bd4f0192b3e093c2a321a4f9d6f625cf16c29eccf83ba0656f
                        • Opcode Fuzzy Hash: 86e1fcea3d435c6822c6e7e50cbc205664531b226dda02baed332cea8563bab7
                        • Instruction Fuzzy Hash: 25D18B71A083129FD710CF18C8857ABBBE5FB85714F18492DF59587391E7B4E908CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: R-,T
                        • API String ID: 0-635581381
                        • Opcode ID: 560e430512cb16a1c1741d611f78755730a8e3f4ec7801fee53e254cf81ef1e9
                        • Instruction ID: 959a61c2f2bfeefbc88e72f86573cb6e51aba8e7c7630bb274ff5b5512315512
                        • Opcode Fuzzy Hash: 560e430512cb16a1c1741d611f78755730a8e3f4ec7801fee53e254cf81ef1e9
                        • Instruction Fuzzy Hash: 5EA1BD312047119FD724CF18C850B6ABBE5FF88764F158A2EE9A59B3A0E774D905CB82
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: ::34
                        • API String ID: 0-1123104282
                        • Opcode ID: 970b202120b6acec8297ed952c28573b78af85fde32d5b32feaca1a1dc70bab2
                        • Instruction ID: d1cd6929848c24609303c18b8eaa604bd136ecd558e1abf4b98fecb6052d0f89
                        • Opcode Fuzzy Hash: 970b202120b6acec8297ed952c28573b78af85fde32d5b32feaca1a1dc70bab2
                        • Instruction Fuzzy Hash: 1591D320104B81CED728CB798490B76FFE1BF56308F24666DD4EB4B6C2D735A845CB19
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: `123
                        • API String ID: 0-1835766495
                        • Opcode ID: f371ec5be9cfe348c9adbfe97d05548a62fc3287c840bcbf8332135b437d0a7c
                        • Instruction ID: 5ccb15860bb7007e90b5fddadb88066479d377933d660b7607dd3c5711a58e3e
                        • Opcode Fuzzy Hash: f371ec5be9cfe348c9adbfe97d05548a62fc3287c840bcbf8332135b437d0a7c
                        • Instruction Fuzzy Hash: 3D715675208301AFE310CF18C884B6ABBE5FB85724F144A2EF9A58B3D1D775D948CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: uvw
                        • API String ID: 0-3462500642
                        • Opcode ID: 97560bb2bbeedc7fd32a6568eb78f77fd416d4edd6c8241397858aa5d56f0e7c
                        • Instruction ID: f0fe3c49d3dbd7c4fb9fbb2ff968c0b9a2ab18aebe3722554f4482cc774c8218
                        • Opcode Fuzzy Hash: 97560bb2bbeedc7fd32a6568eb78f77fd416d4edd6c8241397858aa5d56f0e7c
                        • Instruction Fuzzy Hash: BF419D75240E42AFD718CF15C4A0A26F7B2FB85324B29DA1EC4A647B44CB34F465CF84
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8107378514094fb91d2011c44157bd921049a5dd61101435c93894fbe4891d56
                        • Instruction ID: f2e96c7121f8c3e9bce89e8feeb84e8d5ff7a1df6f57995a2a947865192c6b0d
                        • Opcode Fuzzy Hash: 8107378514094fb91d2011c44157bd921049a5dd61101435c93894fbe4891d56
                        • Instruction Fuzzy Hash: 1242F53160C71A8BC724DF18DC842BEBBE2FFD9314F15892DD98587291E734A955CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 26757ac80d42ced1fb4cf03ee6e31a23c17b94514262c8d0605aebe3b9ca67d3
                        • Instruction ID: db786a496bc6d3a85f034c833daab6cc788d19473ec7d0b1f4591b4bbd650e07
                        • Opcode Fuzzy Hash: 26757ac80d42ced1fb4cf03ee6e31a23c17b94514262c8d0605aebe3b9ca67d3
                        • Instruction Fuzzy Hash: F112AE76A915504FEB40987CC8AD3DB1FE247B7336F2A6B15C6B05B7E2C50B110EAB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 334614bb912fe0a8ec80b38eb42e96bf3f733cdb0d6b0b6837ec45e227af2fc4
                        • Instruction ID: b145ffe0b50437acb3fceb7bf8ec70b149e9891d7645ef9c0a0b27da93cba5fd
                        • Opcode Fuzzy Hash: 334614bb912fe0a8ec80b38eb42e96bf3f733cdb0d6b0b6837ec45e227af2fc4
                        • Instruction Fuzzy Hash: 7652D131508742AFC314CF29C4816AAFBE1FF89314F188A6DE89997B42D734E995CBC1
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 102393df12addee668e0cab0de08fc4e08f621fbbcb6102736f61e1656738cec
                        • Instruction ID: 5070a8f0e1a79fa9ac998618b46cb0b79e09ef245485934de448b92df361a069
                        • Opcode Fuzzy Hash: 102393df12addee668e0cab0de08fc4e08f621fbbcb6102736f61e1656738cec
                        • Instruction Fuzzy Hash: 7C4267B0514B518FC768CF29C59056ABBF1FF8A314BA08A2DE5978BB90D735FA44CB10
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 60abedbf0d7cdc9ed90b4759ded6b94b48f1fd9f7470bed82d4814919ef40edd
                        • Instruction ID: b938f0629a2a31cc8c163e59ec09ff48051a083b69377557ba59e5f83309c8b3
                        • Opcode Fuzzy Hash: 60abedbf0d7cdc9ed90b4759ded6b94b48f1fd9f7470bed82d4814919ef40edd
                        • Instruction Fuzzy Hash: 2E0237B0600B029FD324CF28C8A5BA6BBF1FF46304F548A5CD4A68BB91D775B954CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 157c2a1f72e5aeb674d4194251b1766745e95691f6069f276572bd04f70c292f
                        • Instruction ID: 652f03e3032b49f723bfbf01e270eab54f809a06ce477484ed6448f10e5c7b79
                        • Opcode Fuzzy Hash: 157c2a1f72e5aeb674d4194251b1766745e95691f6069f276572bd04f70c292f
                        • Instruction Fuzzy Hash: E7029C32608741CFC714CF28C880A2EBFE5FF9A314F59496DE9989B352E675D805CB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dcc788d35870b48299a5be17c72e36008dc41d56e2ad6c818609256912d8e203
                        • Instruction ID: 09e5cfeddd2f1f22d48c1c1dc4769ee1d9c70bd08d45b11b54b92cebae67b7a6
                        • Opcode Fuzzy Hash: dcc788d35870b48299a5be17c72e36008dc41d56e2ad6c818609256912d8e203
                        • Instruction Fuzzy Hash: 9CD1BF715083429FC718CF28C4957AFFBE2BBD6304F19892DE4998B252D735E945CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bcd2ffbc4b82c1d882844f184c9fdbdcd50d0f0be2e9b79395f6acbdad6169e4
                        • Instruction ID: 57b4df4a3eab9bf2a6b7c3b3a5a086cfce8b6677d5fa104f94c83a27b5121ace
                        • Opcode Fuzzy Hash: bcd2ffbc4b82c1d882844f184c9fdbdcd50d0f0be2e9b79395f6acbdad6169e4
                        • Instruction Fuzzy Hash: 21B189B16083118BE724CF14C8A17ABBBF2FFD5318F148A1DE8954B385E7799905CB82
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c672c105196754dd2aaeef6d798aba4eefc491f6edf1c72cf2cd09ee1f6529dd
                        • Instruction ID: 3ae68e730be33a18d2bba0034f745619a8ce6525569496fdd5b8795266b27b81
                        • Opcode Fuzzy Hash: c672c105196754dd2aaeef6d798aba4eefc491f6edf1c72cf2cd09ee1f6529dd
                        • Instruction Fuzzy Hash: F0B15671600B118BD724CF28C8A17A3B7F2FF95308F548A2CD8978BA91E775B446CB94
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2d090cc250f98bf42054d3bb8bbf8d12395c41b175a022f6c4bf0f105ce3ebf7
                        • Instruction ID: 4755084221d114bd353197c0675fe1c19b3465ce1b007b176b8fb5a4f42a4e92
                        • Opcode Fuzzy Hash: 2d090cc250f98bf42054d3bb8bbf8d12395c41b175a022f6c4bf0f105ce3ebf7
                        • Instruction Fuzzy Hash: 8CB17C752083059FD725CF18C880B2ABBE5FF88754F148A2DF9948B3A0E774E905CB92
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d99f8d41c7df77f2d3b52a78271401870cbe394498f7bd3f1d161ad2f4ec67f1
                        • Instruction ID: 26e34e9435e2abe2e1021454778453b5749a17d2b408ac29c41185f83643fbdc
                        • Opcode Fuzzy Hash: d99f8d41c7df77f2d3b52a78271401870cbe394498f7bd3f1d161ad2f4ec67f1
                        • Instruction Fuzzy Hash: A251A2B05046019FD7048F28EC4D71BBBA0FF55318F049538E49A962A1E775D979CBCB
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 813f2283ced66242b932afb7d5ae310599c0b57294438bfd8ef7d69577514262
                        • Instruction ID: 97425c12f3f77b1ae61660c483da8446097f0cf3d616653b1e324bbb4cdfb6bb
                        • Opcode Fuzzy Hash: 813f2283ced66242b932afb7d5ae310599c0b57294438bfd8ef7d69577514262
                        • Instruction Fuzzy Hash: FF41C332B082614BCB188A2DCC6127EBAD3AFC6344F1DC639E8C5DB78AE574DD019795
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d7173ae5d0430bb5046c5331b5ef1101a435c94758ffe20dc0c5fc3056e6a0f
                        • Instruction ID: 370650ac10abaf5f62e905c3364ea472fe8b3bc8fa158ba949dec46cdea6d292
                        • Opcode Fuzzy Hash: 0d7173ae5d0430bb5046c5331b5ef1101a435c94758ffe20dc0c5fc3056e6a0f
                        • Instruction Fuzzy Hash: 7C410AB27082144BD30C8A3AC4B037EBBD2EBC9310F19863EE5DAC73D1DA3888469711
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d18625f0908cecff049b9a64cb01ffa2d29a01b3a6db87df0c1a62bfb7c4c9bf
                        • Instruction ID: 4843ff27f91c25ed1052e2befebc824aefac768d815c091a2bd88831686b2c8d
                        • Opcode Fuzzy Hash: d18625f0908cecff049b9a64cb01ffa2d29a01b3a6db87df0c1a62bfb7c4c9bf
                        • Instruction Fuzzy Hash: E0418E71110B118FC724CF24C852BABB7F2FF95314F199A6CD4E68BAA1D739A506CB80
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 29dfaf6598850af173aa98e7724b302156e33b83498a2fec1274f73804136cd8
                        • Instruction ID: b88285e988e165fe0d827acdbbd314f25b6696e9e9d7978fb44fdeda1ebcc132
                        • Opcode Fuzzy Hash: 29dfaf6598850af173aa98e7724b302156e33b83498a2fec1274f73804136cd8
                        • Instruction Fuzzy Hash: E321F4757181B10B9B10CA3D8CD056BBBA2AFC7316B5E96BADBC0D7252C125D8069264
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 79e8db71ba4f9665dad2d026aa8b343711c060313d5c0f2216595d78a2d09bf0
                        • Instruction ID: 9286fce71b60c2dd5f4626c0e25b5f29d44eb25814970233f9c60a59fb151bd0
                        • Opcode Fuzzy Hash: 79e8db71ba4f9665dad2d026aa8b343711c060313d5c0f2216595d78a2d09bf0
                        • Instruction Fuzzy Hash: 25315AB6105B409FE765CF28C854B96BBF4FB09304F148A2CE5ABC7A90D774B809CB58
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 72abc1f488f3fc7b1de6a90e8d4f94ef489a32a748214985adf3ef8e5e25d72a
                        • Instruction ID: 92501fbfd9b33f6be5970e317c4c028aad66cf9a98605cbf17ed259639e97493
                        • Opcode Fuzzy Hash: 72abc1f488f3fc7b1de6a90e8d4f94ef489a32a748214985adf3ef8e5e25d72a
                        • Instruction Fuzzy Hash: 57214875100B108FE321CF24C845BA6BBF5FB45714F148A2CD6AA8BBA0C771F848CB59
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                        • Instruction ID: 9babfd50cabe76fe10f3c6be0ecd94974fb2172751387fcdcf50255edb88d7af
                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                        • Instruction Fuzzy Hash: 1C11E533A051D50EC3168D7C8400A66BFA32AA7234F59839DF4FC9B2D6D722CD8B8354
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7639dcc65c5d8be46f3ad0d870236425ebe6d137049c442f10c23d73c04440fb
                        • Instruction ID: f8833c53c69144339328f29689d3396a49ef86a3ef44f07543eda14728b97323
                        • Opcode Fuzzy Hash: 7639dcc65c5d8be46f3ad0d870236425ebe6d137049c442f10c23d73c04440fb
                        • Instruction Fuzzy Hash: F301C46990531286DB305F18D803232BAF1FF72745F18A06BE8469B3A0F729D641D31D
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: adb078615302290289a0f922f370e69c24df401b3e2536963dbb6dbbc34b158b
                        • Instruction ID: a717c141514f9ce05eccb930965b41743b0f9367556d31d8ded980e776d91339
                        • Opcode Fuzzy Hash: adb078615302290289a0f922f370e69c24df401b3e2536963dbb6dbbc34b158b
                        • Instruction Fuzzy Hash: 6D1128705183419FD304CF04C450B6FFBE4FB89318F408A1EF89897242D379E6098B96
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bd71607f690bce657e8853982f1fa76d169d81fd16fa2a586a5d4fd35f608dde
                        • Instruction ID: 6512fec38bc2cc3827343b3c2056b2c76f8b17da33a104a69701633083b62256
                        • Opcode Fuzzy Hash: bd71607f690bce657e8853982f1fa76d169d81fd16fa2a586a5d4fd35f608dde
                        • Instruction Fuzzy Hash: 24F0901454C3D28EC3018B6A80D4732FFA35FA7245F6C6099C0C02B356C767590E8A66
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ebc49a0553ebbd101380e3ae575d33830016ab1546283f0a9f204abc104f43c0
                        • Instruction ID: f7dfc8ebd38af7491749572c069e1cc3a55b315c1cecd7842f97f6b95146ca71
                        • Opcode Fuzzy Hash: ebc49a0553ebbd101380e3ae575d33830016ab1546283f0a9f204abc104f43c0
                        • Instruction Fuzzy Hash: 03E0483B91D7755742218A1CA81057ABBE5BDDF720F1A2949DC41F7304D621EC0787E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c5f1da324531e67c562e1cfadbf0852f7166e7d103d5258cb488b8e41f4f6388
                        • Instruction ID: e3eb3954bd331eb0e60a643b918f94394e89fe75df17fe08e93293c171d015b4
                        • Opcode Fuzzy Hash: c5f1da324531e67c562e1cfadbf0852f7166e7d103d5258cb488b8e41f4f6388
                        • Instruction Fuzzy Hash: C7E086145487D2CFC301CB5990D4733BF636BA7245F68A0AAC1C427356D667680ECA65
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2044051f06bb029c9e823812dcc2e061d3b89e47936c5c72b85e7b0847b4fd87
                        • Instruction ID: 2a18582a3469647c12d9bf41e262e32d9d7bae8c1f9f595996634241fee888bc
                        • Opcode Fuzzy Hash: 2044051f06bb029c9e823812dcc2e061d3b89e47936c5c72b85e7b0847b4fd87
                        • Instruction Fuzzy Hash: CED0A7A194D3F10E57594D3904A0477FFE4F947222B1854AEF0D1E3145D220EC0156B9
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 57b89f182764def7251bf465b3c8a7126975dbc71fa6886cdb6034776b4f3fcc
                        • Instruction ID: 4645570a0382b17b1b6c51f4e26db94bad45b1f3e3ce5700ada329c131968311
                        • Opcode Fuzzy Hash: 57b89f182764def7251bf465b3c8a7126975dbc71fa6886cdb6034776b4f3fcc
                        • Instruction Fuzzy Hash: 17C01230A402428AC304DF38D989A32FBF0EB2B205B20302AC487E32A1D32094668A0C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: da94d63b8ec6cece7e65a459c64aa78c2d0b4bc40c0ba22fb9f97c1c40e1aae0
                        • Instruction ID: 7770ab6b708bcd15daec446eb3a5e246c06f3721a660359b25f9d5e30aa820c4
                        • Opcode Fuzzy Hash: da94d63b8ec6cece7e65a459c64aa78c2d0b4bc40c0ba22fb9f97c1c40e1aae0
                        • Instruction Fuzzy Hash: D4C0123B90C120878640AF08AC00128E3EBAAC7260F5E29208D44B7320C270F8228BCD
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 68e6fbe17eb71514485956fdd485fa415fecd4696a6bdd50eae747e9863cc9c1
                        • Instruction ID: 7c6b7bd78b67ee6ceedf21f1d2ed7e46c718b4e63303c933d62d5ba34f4607c9
                        • Opcode Fuzzy Hash: 68e6fbe17eb71514485956fdd485fa415fecd4696a6bdd50eae747e9863cc9c1
                        • Instruction Fuzzy Hash: 5DC04C3ABC0250478308CF55EC91539E2F6979B51171EB1358402E3760D5A494414548
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5352d5a74675f77acd47e212ad8e59a7e0062af5d315182045b7aedf2aa6d508
                        • Instruction ID: c08aa4d372e9f5af8b490940a951aacf186fae9da1f0b66a2e298ebf15a278c4
                        • Opcode Fuzzy Hash: 5352d5a74675f77acd47e212ad8e59a7e0062af5d315182045b7aedf2aa6d508
                        • Instruction Fuzzy Hash: 1DC00225E59150879258CE14FA904B6B3F7ABCA2147B9B029D84663B59CA70EC02890C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4d24856321a6e452066d19aad862414ae37b90c2dd411f1b78de3affb8e1ff68
                        • Instruction ID: 023736880b9bd43421c6e6c74ebdcf06ec1962d12d21f34926fa163f4d450445
                        • Opcode Fuzzy Hash: 4d24856321a6e452066d19aad862414ae37b90c2dd411f1b78de3affb8e1ff68
                        • Instruction Fuzzy Hash: C3C08CB9D880008BC704CB20AC06971723F6297284B003438C803E3222E430E050860C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9d48b3c7d2e914f36e85ebb4af494930ed814840934d146237549294ac11a46f
                        • Instruction ID: cacd315472da8f1adfdb46a76d889c778805fd235407da719b80bb14d9e97af4
                        • Opcode Fuzzy Hash: 9d48b3c7d2e914f36e85ebb4af494930ed814840934d146237549294ac11a46f
                        • Instruction Fuzzy Hash: 32B00275E446018F8224CE00C150866F376AB9F221B25F6458859276058230F8868AD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 11c5bb682c4e1173fb85fafe91c63964559ee3f050481804446c2cae164d9f0b
                        • Instruction ID: 179238d3a42e7975d31a0b4d1fcc9a52f058f4605d86cf7c1cad0b364b4f1386
                        • Opcode Fuzzy Hash: 11c5bb682c4e1173fb85fafe91c63964559ee3f050481804446c2cae164d9f0b
                        • Instruction Fuzzy Hash: 3FA00220D4D1008A81048E09A444570E2B8621F205F103C24E04CF3153C210D805450C
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0d8189cabcdb90c19035327ce217268f333d6db7c63e2bec84614f7baa6318a
                        • Instruction ID: 6b829ceb6c1765329310cd6cac7a0d622d38305eb221885039c711e86d49a699
                        • Opcode Fuzzy Hash: e0d8189cabcdb90c19035327ce217268f333d6db7c63e2bec84614f7baa6318a
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C
                        • API String ID: 0-1918521486
                        • Opcode ID: c938d9e6c19457aab954c006da1c620e983825f560c4718e0d82284b1d787cc2
                        • Instruction ID: 17a564318dc008fab82d14543aed12bce6f8ff604ee98d149e5ce122277cf760
                        • Opcode Fuzzy Hash: c938d9e6c19457aab954c006da1c620e983825f560c4718e0d82284b1d787cc2
                        • Instruction Fuzzy Hash: 05F13DB490A7818BC739DF06E58578BBBE5BBC8308F10FD2E858847365D37465498F8A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C
                        • API String ID: 0-1806908614
                        • Opcode ID: aa12c5568008614e22bfeb7f6fb387fa9ede4ec4712e9ea2fb395dba554e2cbd
                        • Instruction ID: 855e3cc7b0681e4f4bdf058e62b607a8832b6e3fa6e9a7a7275163bacb192d3c
                        • Opcode Fuzzy Hash: aa12c5568008614e22bfeb7f6fb387fa9ede4ec4712e9ea2fb395dba554e2cbd
                        • Instruction Fuzzy Hash: 31E16FB494A3818BC774DF05E59969ABBE4BB89308F10BD2ED98D47391CB742508CF4E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$($4$@$L$X$d$p$|
                        • API String ID: 0-4215602226
                        • Opcode ID: fd5a510157a3eb7df68cc3e4bd4a1b70b6ab275ea9813702b4fccdf76dbdadc6
                        • Instruction ID: c565546c47d054021fca8928c08ec0a514a9422b6b0299143c43e1b34350dcb1
                        • Opcode Fuzzy Hash: fd5a510157a3eb7df68cc3e4bd4a1b70b6ab275ea9813702b4fccdf76dbdadc6
                        • Instruction Fuzzy Hash: 77E16FB451A3818BD774DF01E55979FBBE0BB89308F00AD1E9A8C5B391C7B91528CF4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: $&$)$*$/$0$0$1$4$5$7$9$<$I$R$V$[$\$^$_$a$c$c$e$f$g$h$i$i$k$k$l$m$o$o$q$s$x$|$~
                        • API String ID: 0-2076901766
                        • Opcode ID: 3bdebb55d431c8634d57a0e1e2d8ac3574faeff928a2f785b5f0b86b73f8aaba
                        • Instruction ID: 1625da2733e13926bdbf8e5ea2520bf8b743348ff6ffa37cb4a74078b439c189
                        • Opcode Fuzzy Hash: 3bdebb55d431c8634d57a0e1e2d8ac3574faeff928a2f785b5f0b86b73f8aaba
                        • Instruction Fuzzy Hash: EAB1B43000C7C28ED336CA2888587DFBFE16BA6324F084A9DD5E95B2D2D7B64545CB67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: #$/$0$3$6$8$>$K$Q$R$S$Y$[$]$^$_$a$b$c$e$f$g$i$k$m$o$q$s$u$w$y${$}
                        • API String ID: 0-1133209118
                        • Opcode ID: fcd249ec573c39407cf2c70f889c80ebafd94e547ca05926b1b178d7d28f4204
                        • Instruction ID: 71e6e082ea462a0ecb2c8559067d1fd347e9b7d9fc0c9835453c5640c1c9f3fc
                        • Opcode Fuzzy Hash: fcd249ec573c39407cf2c70f889c80ebafd94e547ca05926b1b178d7d28f4204
                        • Instruction Fuzzy Hash: EAB1937010CBC18ED336CA2888587DFBFE16BA6364F084A5DD4E94A2E2C7B55145CB67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: !$#$%$'$)$+$-$/$9$;$=$?$A$A$A$C$I$P$Q$R$S$\$_$_$d$z
                        • API String ID: 0-624435820
                        • Opcode ID: 741b58949618608ad9d621743f3b974a56599811373b7e935e3143183862f57d
                        • Instruction ID: 6256a119d061edf7368fc579588709c524e78426388c21a0b3f2cb23a49dc4b5
                        • Opcode Fuzzy Hash: 741b58949618608ad9d621743f3b974a56599811373b7e935e3143183862f57d
                        • Instruction Fuzzy Hash: 9F51E37020D7C08EE336DB68D5987DBBFE1AB96308F08496DD4D84B282C3B95949CB53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: $$1$3$5$7$9$=$>$?$@$T$U$a$b$g$o$o$u$w${
                        • API String ID: 0-803865081
                        • Opcode ID: 96d01b6ccda33baf9ae67b23402032f238422a132f2a4a2b2c855122dad561b6
                        • Instruction ID: b9c0112c4f010ebb314f17610c096de405615ae929100d349a7798454a9d5428
                        • Opcode Fuzzy Hash: 96d01b6ccda33baf9ae67b23402032f238422a132f2a4a2b2c855122dad561b6
                        • Instruction Fuzzy Hash: DB41E6601087C0CEEB26CF2884D87427FE15B26318F1982DDC8994F69BC3BAD51AC776
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C$ C
                        • API String ID: 0-4205221254
                        • Opcode ID: 930af8b64b56cd43365158fe36df7fe95aef3b4a0c2239a368953af2567379a9
                        • Instruction ID: 0153027d063e5706c6c29ec6e93e483daead757886c64c083bdd37ad514c2b1f
                        • Opcode Fuzzy Hash: 930af8b64b56cd43365158fe36df7fe95aef3b4a0c2239a368953af2567379a9
                        • Instruction Fuzzy Hash: 5B7142B0905B418BD724DF25E559797BBE1BB4A308F40AD2FD5AA473A1C7B43448CF88
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 1$1$3$4$:$A$D$D$H$I$J$M$Q$U$W$X$]$v
                        • API String ID: 0-3526330400
                        • Opcode ID: 4c4dde784ecaccb4c1f82dc4f83eb58c15311623e9b5025230cc517a33559933
                        • Instruction ID: ab20fe4ea6096b78a6bb8de981a9c84cf334f021927a871beb6bb334dfb57f48
                        • Opcode Fuzzy Hash: 4c4dde784ecaccb4c1f82dc4f83eb58c15311623e9b5025230cc517a33559933
                        • Instruction Fuzzy Hash: 3F51C77010C7C18ED322CB38845874FBFD16B96224F584A5DE5E98B3E2C775954ACB53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 1$1$3$4$:$A$D$D$H$I$J$M$Q$U$W$X$]$v
                        • API String ID: 0-3526330400
                        • Opcode ID: 21dc155316d35b391ad26d2ab4e86cee74c387308d8040a50545a97ed3e958a5
                        • Instruction ID: 48e0299e503574d3f374029b73c712eb1aa968803d03fa3a39a06f19707d04b9
                        • Opcode Fuzzy Hash: 21dc155316d35b391ad26d2ab4e86cee74c387308d8040a50545a97ed3e958a5
                        • Instruction Fuzzy Hash: 0751A47010CBC18ED322CB38844874FBFE16B96224F188A9DE5E54B3E2C775854ACB67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: D$I$L$P$T$k$q$z${${$|$}
                        • API String ID: 0-3654948518
                        • Opcode ID: eb987f407f37c6ecd8580b2140394d95563597a7645639d309ff5f17de0f5ef5
                        • Instruction ID: ea1d28c82bc65de195bf7abb1d821985be1a7a72ffd56d21156e90eb485c7eb5
                        • Opcode Fuzzy Hash: eb987f407f37c6ecd8580b2140394d95563597a7645639d309ff5f17de0f5ef5
                        • Instruction Fuzzy Hash: D751037010C7C18AE336CB28C498BDBBFE1AB96314F044A5DD5E94B2D2D77A9505CB93
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: I$K$L$M$O$q$s$u$w$y${$}
                        • API String ID: 0-2287174937
                        • Opcode ID: eb4ce4336640a3dafa6ced1e02c8dbdcee340fa4fed27c9f6b9ef64845528719
                        • Instruction ID: 976b4a21e1c6fc0403e9f0ba803a61ad5e6cf074645fa1ad23ca9c9be2cb0890
                        • Opcode Fuzzy Hash: eb4ce4336640a3dafa6ced1e02c8dbdcee340fa4fed27c9f6b9ef64845528719
                        • Instruction Fuzzy Hash: 7F51F27050C3C18EE335CB288858B9BBFE2AB96314F044A5DE4E84B292C7B955498B53
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: I$K$L$M$O$q$s$u$w$y${$}
                        • API String ID: 0-2287174937
                        • Opcode ID: b52ba7697a32cbfeeb4b21c81f5419e46dbb5c4d24021f58c5c95e1243109093
                        • Instruction ID: 7baf00e0173ea84dee848a04fa6ef80bdd9ca9e8773ac27a3322c0c8d249a859
                        • Opcode Fuzzy Hash: b52ba7697a32cbfeeb4b21c81f5419e46dbb5c4d24021f58c5c95e1243109093
                        • Instruction Fuzzy Hash: 0B51E47050C3C1CBE335CB28C858B9BBBE2AB96314F044A5DD4D94B2D2C7B95449CB63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: d$m$q$t$t$v$w$w$x$y$y
                        • API String ID: 0-516703108
                        • Opcode ID: 5b77419dbff5e1936998b48a1fe1d72f9740be4d262098fa61d9181769bf05f1
                        • Instruction ID: bf1ccc87ab3e3abf7e184fe182a579f7ed808c22b4445b44f1e7d9c9ad5a6492
                        • Opcode Fuzzy Hash: 5b77419dbff5e1936998b48a1fe1d72f9740be4d262098fa61d9181769bf05f1
                        • Instruction Fuzzy Hash: 5851E03050CBC1CAD336CA28989879ABFD16BD6364F080A5DE4ED4B3E2D7745545CBA3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: D)$GT$K9E;$RG$TN$WQ$Y\$ZR$[@$!#
                        • API String ID: 0-2740541214
                        • Opcode ID: 4ab964777bb2a9bcd58c2577d21e1a6dfbfb1548f92dee1b78d1290b4c8e7b8e
                        • Instruction ID: 20fa6134d79b2ccc7468fba3cee441dcbdff934fab71ffca39692fbb5d9247e0
                        • Opcode Fuzzy Hash: 4ab964777bb2a9bcd58c2577d21e1a6dfbfb1548f92dee1b78d1290b4c8e7b8e
                        • Instruction Fuzzy Hash: 0652B3B4105B818AE364CF21D894BD7BBE2BB85344F508E2DC1FB1B285CBB5614ACF95
                        APIs
                        • type_info::operator==.LIBVCRUNTIME ref: 0058E129
                        • ___TypeMatch.LIBVCRUNTIME ref: 0058E237
                        • _UnwindNestedFrames.LIBCMT ref: 0058E389
                        • CallUnexpected.LIBVCRUNTIME ref: 0058E3A4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 2751267872-393685449
                        • Opcode ID: 97af79e2e64291b1052b2f63078a1b1ec2e3d5e38b1876228455e09239f9478d
                        • Instruction ID: ea1f3680b35a669f9243c88df6c8795576dc9c05e1bac09b2d51e2a5545d610a
                        • Opcode Fuzzy Hash: 97af79e2e64291b1052b2f63078a1b1ec2e3d5e38b1876228455e09239f9478d
                        • Instruction Fuzzy Hash: BBB1887180020AEFCF18EFA4D88A9AEBFB5BF54310B14455AEC157B242D730EE51CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: ^$_$a$c$e$g$i$k$m
                        • API String ID: 0-3425094176
                        • Opcode ID: 3eb87c03781164b36f52ff7db0fd93214d06bb14808f17c1678df36346f50137
                        • Instruction ID: 4ade89cc0a81a71e8f496075ec333aae3e8dbf79bd597364424de98baa5abac8
                        • Opcode Fuzzy Hash: 3eb87c03781164b36f52ff7db0fd93214d06bb14808f17c1678df36346f50137
                        • Instruction Fuzzy Hash: 3E41253054C7C48ED339DB28C4A879BBFE1ABE6314F148A5CE4E94B282C7B54545CB93
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: CEE~$HVRP$LIGA$SD_\$Ta$bbp|$u}w~$2P
                        • API String ID: 0-1774221220
                        • Opcode ID: ed306716715ec182923c9cd8cc63dfba65a15c3bd9df844ffcd8c81a9f60aa2e
                        • Instruction ID: 38bbe9edbb813b989de2acae6d09ee800e8817305a3d1cc9f3a822d8f6507905
                        • Opcode Fuzzy Hash: ed306716715ec182923c9cd8cc63dfba65a15c3bd9df844ffcd8c81a9f60aa2e
                        • Instruction Fuzzy Hash: FB8125B19493928BD321CF25C49075FBFE1BFD2714F288A4CE8E41B285D7769809CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 6AC$:M,O$R%Z'$V9X;$^!^#$a-R/$Y[
                        • API String ID: 0-2223191178
                        • Opcode ID: fbaaa146c132f7d111ffcb86e1f245e71eaac4c225a319455b1c74a60d79a04b
                        • Instruction ID: 1030e426f4eb76ace363eeed6c6e5cc78f9400ff7a3fa6a387c36a45b3063527
                        • Opcode Fuzzy Hash: fbaaa146c132f7d111ffcb86e1f245e71eaac4c225a319455b1c74a60d79a04b
                        • Instruction Fuzzy Hash: 5C51E8B41493C19BE234CF11D892B8EBBE2BB86340F218E1CD5E81B245CB788146CF92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: !$)$B$Q$u$v$w
                        • API String ID: 0-614236814
                        • Opcode ID: 3b7f4ab4a208292ada3f69a24dd441349c952d78576ab4a6153cd3d00e0c0f13
                        • Instruction ID: 52eea7d7b870407bb6b7d9ff93d234914b6c80a0040ce62269c947e82c9a46c1
                        • Opcode Fuzzy Hash: 3b7f4ab4a208292ada3f69a24dd441349c952d78576ab4a6153cd3d00e0c0f13
                        • Instruction Fuzzy Hash: 7841EF7010C7C1CBD335CA6884AC79ABFE1ABD6324F088A5CE5D90B292C7B95509DB67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: DHB|$I@Fg$MmsT$Usr$l@e`$ySx${^w\
                        • API String ID: 0-2781994780
                        • Opcode ID: d6e41a6cf18baabb6e8cb67d77a9a6bff6e86c1c008bbb8b6b0abab65954b9d8
                        • Instruction ID: dd0818aca3a96dcaa3df618381914b158c9395dd2ea615ad08f7ea046f7e3823
                        • Opcode Fuzzy Hash: d6e41a6cf18baabb6e8cb67d77a9a6bff6e86c1c008bbb8b6b0abab65954b9d8
                        • Instruction Fuzzy Hash: D62112B45083818FD324CF65C495B9ABBE1BBC4744F144D1DE5EA8B3A1CB74A80ACF56
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0058D834,00000000,?,005E6B48,?,?,?,0058D9D7,00000004,InitializeCriticalSectionEx,0059A800,InitializeCriticalSectionEx), ref: 0058D890
                        • GetLastError.KERNEL32(?,0058D834,00000000,?,005E6B48,?,?,?,0058D9D7,00000004,InitializeCriticalSectionEx,0059A800,InitializeCriticalSectionEx,00000000,?,0058D757), ref: 0058D89A
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0058D8C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670735327.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.1670717248.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670856493.0000000000599000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: 999cd540cd405eeabce98fead5422f7b77018d13d5e8fb31087c6fcecba6b759
                        • Instruction ID: 48883a79de55452ea467b09fe12d0678ab7fc829fcb41fd465394b8f9f11bc00
                        • Opcode Fuzzy Hash: 999cd540cd405eeabce98fead5422f7b77018d13d5e8fb31087c6fcecba6b759
                        • Instruction Fuzzy Hash: 71E04F30280209FBEF502B61EC0BB583FA8BB20B51F204431FD0DF80E0D766E954ABA4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: W!A'$W%L;$\9n?$h-[#$h=t3
                        • API String ID: 0-1876427022
                        • Opcode ID: d4a0183eedbcec72fc9faccd38bb065b82f9f302c599514ef752f4cc02fa0c59
                        • Instruction ID: 56291f5db09d8a1d1c4d1ab9ca50be82c7a784f7c6c111fc3074bf03df39231b
                        • Opcode Fuzzy Hash: d4a0183eedbcec72fc9faccd38bb065b82f9f302c599514ef752f4cc02fa0c59
                        • Instruction Fuzzy Hash: ABB10575200B118FD365CF24C895B97BBE5FB48304F448A2DD5EB8BA81DB75B50ACB84
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: 2%Zc$9:]I$SYz,$TYhY
                        • API String ID: 0-2887525975
                        • Opcode ID: 867d6a1f2ebf885864a12db5e28d001c387d0e3474002c68b25a1037bf5d3136
                        • Instruction ID: 6d52a27655b92188468167d77231b2f83c184ca9b47ca1e266cfc4c63ec053ee
                        • Opcode Fuzzy Hash: 867d6a1f2ebf885864a12db5e28d001c387d0e3474002c68b25a1037bf5d3136
                        • Instruction Fuzzy Hash: 359148B4105F818BE7288F25D4A87A3BBE2BF96305F18995CC4EB0B382C7752505CF95
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: ,${$}$}
                        • API String ID: 0-728446245
                        • Opcode ID: 647350696943e9c5b411a443cd1b87a17007b20444049e6207778866511cb5fb
                        • Instruction ID: e44b5e1a795cf61a089c90977f984fd72a8f6de9dfac81d818b2fe3987f6e05c
                        • Opcode Fuzzy Hash: 647350696943e9c5b411a443cd1b87a17007b20444049e6207778866511cb5fb
                        • Instruction Fuzzy Hash: 2E5138B49043098FD7205F259C5872F7FE4BF96348F185938E4C687292E735D904CB96
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: afdx$mfgs$|~}x$~pv~
                        • API String ID: 0-695628238
                        • Opcode ID: 11507d8175d1d29e44784b882bbcdbb279b1f375ab6ac0885af2e402e2a0cf14
                        • Instruction ID: 74e6840ffc1e30654cc13c13ea0b8f26357f846cd0b44873ad1ea79b3d9dac8a
                        • Opcode Fuzzy Hash: 11507d8175d1d29e44784b882bbcdbb279b1f375ab6ac0885af2e402e2a0cf14
                        • Instruction Fuzzy Hash: 21512575604B818FD724CF28C4917A7BFE2FB55340F148A2ED0AB8B685D734B845CB99
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: /@$ /@$@/@$P/@
                        • API String ID: 0-873909677
                        • Opcode ID: 90ea0fe63ca919318d403ce11a13caa070a2f0a91cfa4d1db11bc91ef7697813
                        • Instruction ID: 9478faed413f468352df44de5df8c95d6fc93dc089aefbfbff9455c8e1d65993
                        • Opcode Fuzzy Hash: 90ea0fe63ca919318d403ce11a13caa070a2f0a91cfa4d1db11bc91ef7697813
                        • Instruction Fuzzy Hash: 0D418BB17106048BDB18CF59C8C47567BE2BBD5328F18C1A9DA058B28ED7B9C989CF81
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1670872716.00000000005A0000.00000004.00000001.01000000.00000003.sdmp, Offset: 005A0000, based on PE: true
                        • Associated: 00000000.00000002.1670908467.00000000005E8000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_445.jbxd
                        Similarity
                        • API ID:
                        • String ID: #./,$17,4$17,4$8$
                        • API String ID: 0-1726388302
                        • Opcode ID: 2c7d5255162c6dfa8c22f78920da2ff47ec92d9ec8d7e4496b41a6f46a099c67
                        • Instruction ID: 8f0d180a1ff2d9da4e5afd4f3e2852c30f1bf683519e19376d39df2e10f82218
                        • Opcode Fuzzy Hash: 2c7d5255162c6dfa8c22f78920da2ff47ec92d9ec8d7e4496b41a6f46a099c67
                        • Instruction Fuzzy Hash: 584155B1518381ABD318CF14C890B4FBFF0BB86354F946A2CF8C99B251D779D8458B92