Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_96.exe

Overview

General Information

Sample name:LisectAVT_2403002A_96.exe
Analysis ID:1482133
MD5:9256cf8bc71250fd9c9692477c308668
SHA1:d10d2a348bf3e76c728da35161307bc8872174f3
SHA256:7adf609b3d22801ddddc39747ef6344a17129f7159318962bcc67247be048ef2
Tags:exeLummaStealer
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LisectAVT_2403002A_96.exe (PID: 6832 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_96.exe" MD5: 9256CF8BC71250FD9C9692477C308668)
    • conhost.exe (PID: 6816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 7072 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 7084 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "relevantvoicelesskw.shop", "colorfulequalugliess.shop", "wisemassiveharmonious.shop", "sailsystemeyeusjw.shop"], "Build id": "1AsNN2--babah2"}
SourceRuleDescriptionAuthorStrings
decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Snort rule has matched
    Timestamp:2024-07-25T18:31:10.122811+0200
    SID:2050996
    Source Port:63712
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.135830+0200
    SID:2051473
    Source Port:50769
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.150003+0200
    SID:2050953
    Source Port:53889
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.109180+0200
    SID:2051584
    Source Port:65215
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.073532+0200
    SID:2051586
    Source Port:51633
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.009762+0200
    SID:2051898
    Source Port:57630
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.160891+0200
    SID:2050956
    Source Port:55815
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.093286+0200
    SID:2051587
    Source Port:60941
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected
    Timestamp:2024-07-25T18:31:10.177747+0200
    SID:2050952
    Source Port:64380
    Destination Port:53
    Protocol:UDP
    Classtype:Domain Observed Used for C2 Detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: LisectAVT_2403002A_96.exeAvira: detected
    Source: https://associationokeo.shop//iAvira URL Cloud: Label: malware
    Source: https://turkeyunlikelyofw.shop/apiAvira URL Cloud: Label: malware
    Source: https://detectordiscusser.shop/Avira URL Cloud: Label: malware
    Source: associationokeo.shopAvira URL Cloud: Label: malware
    Source: colorfulequalugliess.shopAvira URL Cloud: Label: phishing
    Source: https://associationokeo.shop/apiAvira URL Cloud: Label: malware
    Source: https://associationokeo.shop//Avira URL Cloud: Label: malware
    Source: https://associationokeo.shop/Avira URL Cloud: Label: malware
    Source: detectordiscusser.shopAvira URL Cloud: Label: malware
    Source: relevantvoicelesskw.shopAvira URL Cloud: Label: phishing
    Source: turkeyunlikelyofw.shopAvira URL Cloud: Label: malware
    Source: https://turkeyunlikelyofw.shop/Avira URL Cloud: Label: malware
    Source: 3.2.RegAsm.exe.400000.0.raw.unpackMalware Configuration Extractor: LummaC {"C2 url": ["associationokeo.shop", "turkeyunlikelyofw.shop", "pooreveningfuseor.pw", "edurestunningcrackyow.fun", "detectordiscusser.shop", "relevantvoicelesskw.shop", "colorfulequalugliess.shop", "wisemassiveharmonious.shop", "sailsystemeyeusjw.shop"], "Build id": "1AsNN2--babah2"}
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: LisectAVT_2403002A_96.exeJoe Sandbox ML: detected
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: associationokeo.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: turkeyunlikelyofw.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: pooreveningfuseor.pw
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: edurestunningcrackyow.fun
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: detectordiscusser.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: relevantvoicelesskw.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: colorfulequalugliess.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: wisemassiveharmonious.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: sailsystemeyeusjw.shop
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: Workgroup: -
    Source: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmpString decryptor: 1AsNN2--babah2
    Source: LisectAVT_2403002A_96.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: LisectAVT_2403002A_96.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: Casis.pdb source: LisectAVT_2403002A_96.exe
    Source: Binary string: Casis.pdbx source: LisectAVT_2403002A_96.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+08h]3_2_00432156
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx eax, byte ptr [esi+ecx]3_2_0040D1C0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000080h]3_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+00000080h]3_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000080h]3_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then test esi, esi3_2_004352C9
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000080h]3_2_004212E2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx3_2_00433458
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then cmp dword ptr [eax-08h], 5C3924FCh3_2_0041541A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_00434489
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]3_2_004095E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]3_2_004105BD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esp+28h]3_2_0041561D
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then movzx ebx, byte ptr [edx]3_2_0042D620
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000080h]3_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+00000080h]3_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+00000080h]3_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then lea esi, dword ptr [edx+ecx]3_2_0041D860
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+000000A8h]3_2_00414810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+04h]3_2_0041390E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp eax3_2_004119E7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx3_2_0040FA72
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp ecx3_2_0040FA7F
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [0043DC58h]3_2_0041CB43
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then add ecx, dword ptr [esp+eax*4+30h]3_2_00407B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esp+10h]3_2_0041CB80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov edi, dword ptr [esi+0Ch]3_2_0041FB8E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, dword ptr [esi+08h]3_2_00432C52
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+00000080h]3_2_00420D8E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov ecx, dword ptr [esi+04h]3_2_00410E43
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then mov eax, edi3_2_00434FB2

    Networking

    barindex
    Source: Malware configuration extractorURLs: associationokeo.shop
    Source: Malware configuration extractorURLs: turkeyunlikelyofw.shop
    Source: Malware configuration extractorURLs: pooreveningfuseor.pw
    Source: Malware configuration extractorURLs: edurestunningcrackyow.fun
    Source: Malware configuration extractorURLs: detectordiscusser.shop
    Source: Malware configuration extractorURLs: relevantvoicelesskw.shop
    Source: Malware configuration extractorURLs: colorfulequalugliess.shop
    Source: Malware configuration extractorURLs: wisemassiveharmonious.shop
    Source: Malware configuration extractorURLs: sailsystemeyeusjw.shop
    Source: unknownDNS traffic detected: query: wisemassiveharmonious.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: sailsystemeyeusjw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: turkeyunlikelyofw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: associationokeo.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: relevantvoicelesskw.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: detectordiscusser.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: colorfulequalugliess.shop replaycode: Name error (3)
    Source: unknownDNS traffic detected: query: edurestunningcrackyow.fun replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: sailsystemeyeusjw.shop
    Source: global trafficDNS traffic detected: DNS query: wisemassiveharmonious.shop
    Source: global trafficDNS traffic detected: DNS query: colorfulequalugliess.shop
    Source: global trafficDNS traffic detected: DNS query: relevantvoicelesskw.shop
    Source: global trafficDNS traffic detected: DNS query: detectordiscusser.shop
    Source: global trafficDNS traffic detected: DNS query: edurestunningcrackyow.fun
    Source: global trafficDNS traffic detected: DNS query: pooreveningfuseor.pw
    Source: global trafficDNS traffic detected: DNS query: turkeyunlikelyofw.shop
    Source: global trafficDNS traffic detected: DNS query: associationokeo.shop
    Source: RegAsm.exe, 00000003.00000002.1651767284.0000000001522000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop//
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop//i
    Source: RegAsm.exe, 00000003.00000002.1651681626.00000000014F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://associationokeo.shop/api
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://detectordiscusser.shop/
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw/
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://pooreveningfuseor.pw//
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sailsystemeyeusjw.shop/
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sailsystemeyeusjw.shop/.
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/
    Source: RegAsm.exe, 00000003.00000002.1651681626.00000000014F8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://turkeyunlikelyofw.shop/api
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042AC90 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_0042AC90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042AC90 OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_0042AC90
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042AE40 GetDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetCurrentObject,GetObjectW,DeleteObject,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,SelectObject,DeleteDC,ReleaseDC,DeleteObject,3_2_0042AE40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00414280 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00414280
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435440 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435440
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004324B2 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004324B2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004327F1 NtMapViewOfSection,3_2_004327F1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004327AF NtOpenSection,3_2_004327AF
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043286A NtClose,3_2_0043286A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00432987 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00432987
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436060 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436060
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004220C1 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004220C1
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419080 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00419080
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042F1E0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0042F1E0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00412277 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00412277
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431220 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431220
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00417305 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00417305
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00436400 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00436400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041541A NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041541A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00416492 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00416492
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004314A0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004314A0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C5F0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041C5F0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435640 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435640
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431600 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431600
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041960A NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041960A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004156F7 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004156F7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004146B7 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004146B7
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041A762 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041A762
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041C765 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041C765
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00412700 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00412700
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431710 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431710
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004367D0 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_004367D0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00416790 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00416790
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431840 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431840
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041D860 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041D860
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435810 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435810
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041A880 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041A880
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435940 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435940
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00431950 NtAllocateVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00431950
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435AB0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435AB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435BD0 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435BD0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419C41 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00419C41
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00432C52 NtFreeVirtualMemory,3_2_00432C52
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00417C59 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00417C59
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00435D40 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00435D40
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00414D10 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00414D10
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041EDB2 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041EDB2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00418E50 NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00418E50
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CF46 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_0041CF46
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00420F04 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00420F04
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00430F80 NtAllocateVirtualMemory,NtFreeVirtualMemory,NtAllocateVirtualMemory,NtFreeVirtualMemory,3_2_00430F80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004360603_2_00436060
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004010003_2_00401000
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004032403_2_00403240
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004052743_2_00405274
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004232163_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004212E23_2_004212E2
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041F3FD3_2_0041F3FD
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004223823_2_00422382
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004364003_2_00436400
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004046403_2_00404640
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041960A3_2_0041960A
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004232163_2_00423216
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004017003_2_00401700
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041D8603_2_0041D860
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00413A273_2_00413A27
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00417A8C3_2_00417A8C
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00407B203_2_00407B20
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00419C413_2_00419C41
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00403C603_2_00403C60
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00426D8E3_2_00426D8E
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040FDB03_2_0040FDB0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00402E703_2_00402E70
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041CF463_2_0041CF46
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00412F773_2_00412F77
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00420F043_2_00420F04
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00405F303_2_00405F30
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042EF803_2_0042EF80
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0040FF60 appears 154 times
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00408560 appears 44 times
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1649094618.0000000000C4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs LisectAVT_2403002A_96.exe
    Source: LisectAVT_2403002A_96.exe, 00000000.00000000.1646583317.00000000007A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCasis.exe8 vs LisectAVT_2403002A_96.exe
    Source: LisectAVT_2403002A_96.exeBinary or memory string: OriginalFilenameCasis.exe8 vs LisectAVT_2403002A_96.exe
    Source: LisectAVT_2403002A_96.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: LisectAVT_2403002A_96.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: classification engineClassification label: mal100.troj.evad.winEXE@6/1@9/0
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00428009 CoCreateInstance,3_2_00428009
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LisectAVT_2403002A_96.exe.logJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6816:120:WilError_03
    Source: LisectAVT_2403002A_96.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: LisectAVT_2403002A_96.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_96.exe "C:\Users\user\Desktop\LisectAVT_2403002A_96.exe"
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
    Source: LisectAVT_2403002A_96.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: LisectAVT_2403002A_96.exeStatic file information: File size 4066498 > 1048576
    Source: LisectAVT_2403002A_96.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: LisectAVT_2403002A_96.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: Casis.pdb source: LisectAVT_2403002A_96.exe
    Source: Binary string: Casis.pdbx source: LisectAVT_2403002A_96.exe
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043B016 push 980044CBh; retf 0044h3_2_0043B021
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043AF42 push esp; retf 0044h3_2_0043AF95
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043AF7C push esp; retf 0044h3_2_0043AF95
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043AFF2 push esp; retf 0044h3_2_0043AF95
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043AFF2 push 680044CBh; retf 3_2_0043B015
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0043AFA9 push 680044CBh; retf 3_2_0043B015
    Source: LisectAVT_2403002A_96.exeStatic PE information: section name: .text entropy: 7.946120539555088
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory allocated: 1010000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory allocated: 2920000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exe TID: 6936Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5676Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5676Thread sleep time: -30000s >= -30000sJump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllv
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeCode function: 0_2_02AD5429 CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_02AD5429
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: associationokeo.shop
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: turkeyunlikelyofw.shop
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: pooreveningfuseor.pw
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: edurestunningcrackyow.fun
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: detectordiscusser.shop
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: relevantvoicelesskw.shop
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: colorfulequalugliess.shop
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: wisemassiveharmonious.shop
    Source: LisectAVT_2403002A_96.exe, 00000000.00000002.1651239125.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: sailsystemeyeusjw.shop
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 437000Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43A000Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 445000Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1091008Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
    Source: C:\Users\user\Desktop\LisectAVT_2403002A_96.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_96.exe VolumeInformationJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    411
    Process Injection
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Screen Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory31
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Archive Collected Data
    1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager11
    System Information Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
    Process Injection
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts4
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    SourceDetectionScannerLabelLink
    LisectAVT_2403002A_96.exe100%AviraTR/AD.Nekark.uxhtt
    LisectAVT_2403002A_96.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://sailsystemeyeusjw.shop/0%Avira URL Cloudsafe
    pooreveningfuseor.pw0%Avira URL Cloudsafe
    https://sailsystemeyeusjw.shop/.0%Avira URL Cloudsafe
    edurestunningcrackyow.fun0%Avira URL Cloudsafe
    https://associationokeo.shop//i100%Avira URL Cloudmalware
    https://turkeyunlikelyofw.shop/api100%Avira URL Cloudmalware
    https://detectordiscusser.shop/100%Avira URL Cloudmalware
    associationokeo.shop100%Avira URL Cloudmalware
    colorfulequalugliess.shop100%Avira URL Cloudphishing
    https://associationokeo.shop/api100%Avira URL Cloudmalware
    https://associationokeo.shop//100%Avira URL Cloudmalware
    https://associationokeo.shop/100%Avira URL Cloudmalware
    detectordiscusser.shop100%Avira URL Cloudmalware
    relevantvoicelesskw.shop100%Avira URL Cloudphishing
    sailsystemeyeusjw.shop0%Avira URL Cloudsafe
    turkeyunlikelyofw.shop100%Avira URL Cloudmalware
    wisemassiveharmonious.shop0%Avira URL Cloudsafe
    https://turkeyunlikelyofw.shop/100%Avira URL Cloudmalware
    https://pooreveningfuseor.pw/0%Avira URL Cloudsafe
    https://pooreveningfuseor.pw//0%Avira URL Cloudsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    edurestunningcrackyow.fun
    unknown
    unknowntrue
      unknown
      turkeyunlikelyofw.shop
      unknown
      unknowntrue
        unknown
        detectordiscusser.shop
        unknown
        unknowntrue
          unknown
          relevantvoicelesskw.shop
          unknown
          unknowntrue
            unknown
            pooreveningfuseor.pw
            unknown
            unknowntrue
              unknown
              wisemassiveharmonious.shop
              unknown
              unknowntrue
                unknown
                associationokeo.shop
                unknown
                unknowntrue
                  unknown
                  sailsystemeyeusjw.shop
                  unknown
                  unknowntrue
                    unknown
                    colorfulequalugliess.shop
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      edurestunningcrackyow.funtrue
                      • Avira URL Cloud: safe
                      unknown
                      pooreveningfuseor.pwtrue
                      • Avira URL Cloud: safe
                      unknown
                      associationokeo.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      colorfulequalugliess.shoptrue
                      • Avira URL Cloud: phishing
                      unknown
                      turkeyunlikelyofw.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      detectordiscusser.shoptrue
                      • Avira URL Cloud: malware
                      unknown
                      relevantvoicelesskw.shoptrue
                      • Avira URL Cloud: phishing
                      unknown
                      wisemassiveharmonious.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      sailsystemeyeusjw.shoptrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://sailsystemeyeusjw.shop/RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://associationokeo.shop/apiRegAsm.exe, 00000003.00000002.1651681626.00000000014F8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://sailsystemeyeusjw.shop/.RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://turkeyunlikelyofw.shop/apiRegAsm.exe, 00000003.00000002.1651681626.00000000014F8000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://associationokeo.shop//iRegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://detectordiscusser.shop/RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://turkeyunlikelyofw.shop/RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://associationokeo.shop//RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://associationokeo.shop/RegAsm.exe, 00000003.00000002.1651767284.0000000001522000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://pooreveningfuseor.pw/RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://pooreveningfuseor.pw//RegAsm.exe, 00000003.00000002.1651633572.00000000014DA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      No contacted IP infos
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1482133
                      Start date and time:2024-07-25 18:30:20 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 25s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:4
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:LisectAVT_2403002A_96.exe
                      Detection:MAL
                      Classification:mal100.troj.evad.winEXE@6/1@9/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 31
                      • Number of non-executed functions: 83
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Not all processes where analyzed, report is missing behavior information
                      • VT rate limit hit for: LisectAVT_2403002A_96.exe
                      TimeTypeDescription
                      12:31:08API Interceptor2x Sleep call for process: RegAsm.exe modified
                      No context
                      No context
                      No context
                      No context
                      No context
                      Process:C:\Users\user\Desktop\LisectAVT_2403002A_96.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):42
                      Entropy (8bit):4.0050635535766075
                      Encrypted:false
                      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                      MD5:84CFDB4B995B1DBF543B26B86C863ADC
                      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                      Malicious:true
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                      Entropy (8bit):7.999091412536057
                      TrID:
                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      • Win32 Executable (generic) a (10002005/4) 49.78%
                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                      • Win16/32 Executable Delphi generic (2074/23) 0.01%
                      • Generic Win/DOS Executable (2004/3) 0.01%
                      File name:LisectAVT_2403002A_96.exe
                      File size:4'066'498 bytes
                      MD5:9256cf8bc71250fd9c9692477c308668
                      SHA1:d10d2a348bf3e76c728da35161307bc8872174f3
                      SHA256:7adf609b3d22801ddddc39747ef6344a17129f7159318962bcc67247be048ef2
                      SHA512:19a4f16d81e81f02cff730b9f3053c49413b55953b8f96aa6fe3347ffff5c68807c51b9b08405c22ca783864ad1c1ca9996d138f85fe56b3a9c30eb7d7cd249c
                      SSDEEP:98304:WbzczBM9Czp5+Yq501qQQS4pJ+02Ww/GJcBYX8QbvxLptP6FbKEq:Wb4zjzKY/F4pJ2KJcBYsmxL76FbKEq
                      TLSH:1816338EB86362B0E715273B8C1F66DA03F5030DBE23A1CB5AE152F95743B3E9580567
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ... ....@.. .......................`............`................................
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x45029e
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6600948B [Sun Mar 24 21:00:59 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                      Instruction
                      jmp dword ptr [00402000h]
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      add byte ptr [eax], al
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x502500x4b.text
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x534.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x540000xc.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x502040x1c.text
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x20000x4e2a40x4e4007f6ab5e02a082cdb20bfd0f49fc66c47False0.952856679313099data7.946120539555088IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rsrc0x520000x5340x60029a63f26f37222e40ab7f51e7effae08False0.40234375data3.9185262150899947IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x540000xc0x200a297d094f38e0b551988a203abf44e97False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_VERSION0x520a00x2a8data0.4661764705882353
                      RT_MANIFEST0x523480x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                      DLLImport
                      mscoree.dll_CorExeMain
                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                      2024-07-25T18:31:10.122811+0200UDP2050996ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (detectordiscusser .shop)6371253192.168.2.41.1.1.1
                      2024-07-25T18:31:10.135830+0200UDP2051473ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (edurestunningcrackyow .fun)5076953192.168.2.41.1.1.1
                      2024-07-25T18:31:10.150003+0200UDP2050953ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (pooreveningfuseor .pw)5388953192.168.2.41.1.1.1
                      2024-07-25T18:31:10.109180+0200UDP2051584ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (relevantvoicelesskw .shop)6521553192.168.2.41.1.1.1
                      2024-07-25T18:31:10.073532+0200UDP2051586ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (wisemassiveharmonious .shop)5163353192.168.2.41.1.1.1
                      2024-07-25T18:31:10.009762+0200UDP2051898ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (sailsystemeyeusjw .shop)5763053192.168.2.41.1.1.1
                      2024-07-25T18:31:10.160891+0200UDP2050956ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (turkeyunlikelyofw .shop)5581553192.168.2.41.1.1.1
                      2024-07-25T18:31:10.093286+0200UDP2051587ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (colorfulequalugliess .shop)6094153192.168.2.41.1.1.1
                      2024-07-25T18:31:10.177747+0200UDP2050952ET MALWARE Lumma Stealer Related CnC Domain in DNS Lookup (associationokeo .shop)6438053192.168.2.41.1.1.1
                      TimestampSource PortDest PortSource IPDest IP
                      Jul 25, 2024 18:31:10.009762049 CEST5763053192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.061292887 CEST53576301.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.073532104 CEST5163353192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.090089083 CEST53516331.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.093286037 CEST6094153192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.107244968 CEST53609411.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.109179974 CEST6521553192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.119343996 CEST53652151.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.122811079 CEST6371253192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.130491018 CEST53637121.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.135829926 CEST5076953192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.146205902 CEST53507691.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.150002956 CEST5388953192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.157958031 CEST53538891.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.160891056 CEST5581553192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.174453020 CEST53558151.1.1.1192.168.2.4
                      Jul 25, 2024 18:31:10.177747011 CEST6438053192.168.2.41.1.1.1
                      Jul 25, 2024 18:31:10.186146975 CEST53643801.1.1.1192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jul 25, 2024 18:31:10.009762049 CEST192.168.2.41.1.1.10xd8ccStandard query (0)sailsystemeyeusjw.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.073532104 CEST192.168.2.41.1.1.10x5226Standard query (0)wisemassiveharmonious.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.093286037 CEST192.168.2.41.1.1.10x9a1eStandard query (0)colorfulequalugliess.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.109179974 CEST192.168.2.41.1.1.10xfdd3Standard query (0)relevantvoicelesskw.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.122811079 CEST192.168.2.41.1.1.10x79ffStandard query (0)detectordiscusser.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.135829926 CEST192.168.2.41.1.1.10xe6f7Standard query (0)edurestunningcrackyow.funA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.150002956 CEST192.168.2.41.1.1.10x6f27Standard query (0)pooreveningfuseor.pwA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.160891056 CEST192.168.2.41.1.1.10x7d69Standard query (0)turkeyunlikelyofw.shopA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.177747011 CEST192.168.2.41.1.1.10x2909Standard query (0)associationokeo.shopA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jul 25, 2024 18:31:10.061292887 CEST1.1.1.1192.168.2.40xd8ccName error (3)sailsystemeyeusjw.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.090089083 CEST1.1.1.1192.168.2.40x5226Name error (3)wisemassiveharmonious.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.107244968 CEST1.1.1.1192.168.2.40x9a1eName error (3)colorfulequalugliess.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.119343996 CEST1.1.1.1192.168.2.40xfdd3Name error (3)relevantvoicelesskw.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.130491018 CEST1.1.1.1192.168.2.40x79ffName error (3)detectordiscusser.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.146205902 CEST1.1.1.1192.168.2.40xe6f7Name error (3)edurestunningcrackyow.funnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.174453020 CEST1.1.1.1192.168.2.40x7d69Name error (3)turkeyunlikelyofw.shopnonenoneA (IP address)IN (0x0001)false
                      Jul 25, 2024 18:31:10.186146975 CEST1.1.1.1192.168.2.40x2909Name error (3)associationokeo.shopnonenoneA (IP address)IN (0x0001)false

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:31:08
                      Start date:25/07/2024
                      Path:C:\Users\user\Desktop\LisectAVT_2403002A_96.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_96.exe"
                      Imagebase:0x750000
                      File size:4'066'498 bytes
                      MD5 hash:9256CF8BC71250FD9C9692477C308668
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:12:31:08
                      Start date:25/07/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:2
                      Start time:12:31:08
                      Start date:25/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Imagebase:0x330000
                      File size:65'440 bytes
                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:3
                      Start time:12:31:08
                      Start date:25/07/2024
                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Imagebase:0xea0000
                      File size:65'440 bytes
                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:47.7%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:3.3%
                        Total number of Nodes:246
                        Total number of Limit Nodes:9
                        execution_graph 1731 2ad5429 1732 2ad5461 1731->1732 1733 2ad556f CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 1732->1733 1738 2ad562e TerminateProcess 1732->1738 1733->1732 1734 2ad563e WriteProcessMemory 1733->1734 1735 2ad5683 1734->1735 1736 2ad5688 WriteProcessMemory 1735->1736 1737 2ad56c5 WriteProcessMemory Wow64SetThreadContext ResumeThread 1735->1737 1736->1735 1738->1733 1739 1060850 1742 1060860 1739->1742 1740 1060859 1744 1060879 1742->1744 1743 1060920 1743->1740 1744->1743 1749 1061ba6 1744->1749 1758 1061b38 1744->1758 1766 1061b27 1744->1766 1745 106097a 1745->1740 1750 1061b38 1749->1750 1751 1061b83 1749->1751 1774 1061e44 1750->1774 1801 1061e29 1750->1801 1828 1061fc9 1750->1828 1855 1061ecd 1750->1855 1882 1061e7f 1750->1882 1751->1745 1752 1061b46 1752->1745 1759 1061b44 1758->1759 1761 1061e44 24 API calls 1759->1761 1762 1061e7f 24 API calls 1759->1762 1763 1061ecd 24 API calls 1759->1763 1764 1061fc9 24 API calls 1759->1764 1765 1061e29 24 API calls 1759->1765 1760 1061b46 1760->1745 1761->1760 1762->1760 1763->1760 1764->1760 1765->1760 1767 1061b38 1766->1767 1769 1061e44 24 API calls 1767->1769 1770 1061e7f 24 API calls 1767->1770 1771 1061ecd 24 API calls 1767->1771 1772 1061fc9 24 API calls 1767->1772 1773 1061e29 24 API calls 1767->1773 1768 1061b46 1768->1745 1769->1768 1770->1768 1771->1768 1772->1768 1773->1768 1775 1061e2e 1774->1775 1776 1061e98 1775->1776 1909 1063130 1775->1909 1913 1063129 1775->1913 1917 1062f90 1775->1917 1921 1062893 1775->1921 1925 1062b36 1775->1925 1930 1062a2b 1775->1930 1935 10627ea 1775->1935 1939 1062e0e 1775->1939 1943 106276e 1775->1943 1947 10628c0 1775->1947 1951 1062ea3 1775->1951 1955 1062842 1775->1955 1959 1062984 1775->1959 1964 1062be7 1775->1964 1969 10627d1 1775->1969 1973 106287c 1775->1973 1977 1062838 1775->1977 1981 1062f98 1775->1981 1985 106291a 1775->1985 1990 10627bd 1775->1990 1995 1062d71 1775->1995 2000 106275c 1775->2000 2004 106281f 1775->2004 2008 1062dd0 1775->2008 1776->1752 1802 1061e2e 1801->1802 1803 1061e98 1802->1803 1804 1062be7 VirtualProtectEx 1802->1804 1805 1062984 VirtualProtectEx 1802->1805 1806 1062842 VirtualProtectEx 1802->1806 1807 1062ea3 VirtualProtectEx 1802->1807 1808 10628c0 VirtualProtectEx 1802->1808 1809 106276e VirtualProtectEx 1802->1809 1810 1062e0e VirtualProtectEx 1802->1810 1811 10627ea VirtualProtectEx 1802->1811 1812 1062a2b VirtualProtectEx 1802->1812 1813 1062b36 VirtualProtectEx 1802->1813 1814 1062893 VirtualProtectEx 1802->1814 1815 1062f90 VirtualProtectEx 1802->1815 1816 1062dd0 VirtualProtectEx 1802->1816 1817 1062d71 VirtualProtectEx 1802->1817 1818 10627d1 VirtualProtectEx 1802->1818 1819 106281f VirtualProtectEx 1802->1819 1820 106275c VirtualProtectEx 1802->1820 1821 106287c VirtualProtectEx 1802->1821 1822 10627bd VirtualProtectEx 1802->1822 1823 106291a VirtualProtectEx 1802->1823 1824 1062f98 VirtualProtectEx 1802->1824 1825 1062838 VirtualProtectEx 1802->1825 1826 1063130 CreateThread 1802->1826 1827 1063129 CreateThread 1802->1827 1803->1752 1804->1802 1805->1802 1806->1802 1807->1802 1808->1802 1809->1802 1810->1802 1811->1802 1812->1802 1813->1802 1814->1802 1815->1802 1816->1802 1817->1802 1818->1802 1819->1802 1820->1802 1821->1802 1822->1802 1823->1802 1824->1802 1825->1802 1826->1802 1827->1802 1829 1061e2e 1828->1829 1830 1061e98 1829->1830 1831 1062be7 VirtualProtectEx 1829->1831 1832 1062984 VirtualProtectEx 1829->1832 1833 1062842 VirtualProtectEx 1829->1833 1834 1062ea3 VirtualProtectEx 1829->1834 1835 10628c0 VirtualProtectEx 1829->1835 1836 106276e VirtualProtectEx 1829->1836 1837 1062e0e VirtualProtectEx 1829->1837 1838 10627ea VirtualProtectEx 1829->1838 1839 1062a2b VirtualProtectEx 1829->1839 1840 1062b36 VirtualProtectEx 1829->1840 1841 1062893 VirtualProtectEx 1829->1841 1842 1062f90 VirtualProtectEx 1829->1842 1843 1062dd0 VirtualProtectEx 1829->1843 1844 1062d71 VirtualProtectEx 1829->1844 1845 10627d1 VirtualProtectEx 1829->1845 1846 106281f VirtualProtectEx 1829->1846 1847 106275c VirtualProtectEx 1829->1847 1848 106287c VirtualProtectEx 1829->1848 1849 10627bd VirtualProtectEx 1829->1849 1850 106291a VirtualProtectEx 1829->1850 1851 1062f98 VirtualProtectEx 1829->1851 1852 1062838 VirtualProtectEx 1829->1852 1853 1063130 CreateThread 1829->1853 1854 1063129 CreateThread 1829->1854 1830->1752 1831->1829 1832->1829 1833->1829 1834->1829 1835->1829 1836->1829 1837->1829 1838->1829 1839->1829 1840->1829 1841->1829 1842->1829 1843->1829 1844->1829 1845->1829 1846->1829 1847->1829 1848->1829 1849->1829 1850->1829 1851->1829 1852->1829 1853->1829 1854->1829 1857 1061e2e 1855->1857 1856 1061e98 1856->1752 1857->1856 1858 1062be7 VirtualProtectEx 1857->1858 1859 1062984 VirtualProtectEx 1857->1859 1860 1062842 VirtualProtectEx 1857->1860 1861 1062ea3 VirtualProtectEx 1857->1861 1862 10628c0 VirtualProtectEx 1857->1862 1863 106276e VirtualProtectEx 1857->1863 1864 1062e0e VirtualProtectEx 1857->1864 1865 10627ea VirtualProtectEx 1857->1865 1866 1062a2b VirtualProtectEx 1857->1866 1867 1062b36 VirtualProtectEx 1857->1867 1868 1062893 VirtualProtectEx 1857->1868 1869 1062f90 VirtualProtectEx 1857->1869 1870 1062dd0 VirtualProtectEx 1857->1870 1871 1062d71 VirtualProtectEx 1857->1871 1872 10627d1 VirtualProtectEx 1857->1872 1873 106281f VirtualProtectEx 1857->1873 1874 106275c VirtualProtectEx 1857->1874 1875 106287c VirtualProtectEx 1857->1875 1876 10627bd VirtualProtectEx 1857->1876 1877 106291a VirtualProtectEx 1857->1877 1878 1062f98 VirtualProtectEx 1857->1878 1879 1062838 VirtualProtectEx 1857->1879 1880 1063130 CreateThread 1857->1880 1881 1063129 CreateThread 1857->1881 1858->1857 1859->1857 1860->1857 1861->1857 1862->1857 1863->1857 1864->1857 1865->1857 1866->1857 1867->1857 1868->1857 1869->1857 1870->1857 1871->1857 1872->1857 1873->1857 1874->1857 1875->1857 1876->1857 1877->1857 1878->1857 1879->1857 1880->1857 1881->1857 1884 1061e2e 1882->1884 1883 1061e98 1883->1752 1884->1883 1885 1062be7 VirtualProtectEx 1884->1885 1886 1062984 VirtualProtectEx 1884->1886 1887 1062842 VirtualProtectEx 1884->1887 1888 1062ea3 VirtualProtectEx 1884->1888 1889 10628c0 VirtualProtectEx 1884->1889 1890 106276e VirtualProtectEx 1884->1890 1891 1062e0e VirtualProtectEx 1884->1891 1892 10627ea VirtualProtectEx 1884->1892 1893 1062a2b VirtualProtectEx 1884->1893 1894 1062b36 VirtualProtectEx 1884->1894 1895 1062893 VirtualProtectEx 1884->1895 1896 1062f90 VirtualProtectEx 1884->1896 1897 1062dd0 VirtualProtectEx 1884->1897 1898 1062d71 VirtualProtectEx 1884->1898 1899 10627d1 VirtualProtectEx 1884->1899 1900 106281f VirtualProtectEx 1884->1900 1901 106275c VirtualProtectEx 1884->1901 1902 106287c VirtualProtectEx 1884->1902 1903 10627bd VirtualProtectEx 1884->1903 1904 106291a VirtualProtectEx 1884->1904 1905 1062f98 VirtualProtectEx 1884->1905 1906 1062838 VirtualProtectEx 1884->1906 1907 1063130 CreateThread 1884->1907 1908 1063129 CreateThread 1884->1908 1885->1884 1886->1884 1887->1884 1888->1884 1889->1884 1890->1884 1891->1884 1892->1884 1893->1884 1894->1884 1895->1884 1896->1884 1897->1884 1898->1884 1899->1884 1900->1884 1901->1884 1902->1884 1903->1884 1904->1884 1905->1884 1906->1884 1907->1884 1908->1884 1910 106317b CreateThread 1909->1910 1912 10631db 1910->1912 1912->1775 1914 1063130 CreateThread 1913->1914 1916 10631db 1914->1916 1916->1775 1918 1062f98 VirtualProtectEx 1917->1918 1920 1063027 1918->1920 1920->1775 1922 106275b 1921->1922 1922->1775 1923 1062ff6 VirtualProtectEx 1922->1923 1924 1063027 1923->1924 1924->1775 1927 1062b47 1925->1927 1926 1062e4a 1926->1775 1927->1926 1928 1062ff6 VirtualProtectEx 1927->1928 1929 1063027 1928->1929 1929->1775 1931 1062a38 1930->1931 1932 106275b 1930->1932 1931->1775 1932->1775 1933 1062ff6 VirtualProtectEx 1932->1933 1934 1063027 1933->1934 1934->1775 1936 106275b 1935->1936 1936->1775 1937 1062ff6 VirtualProtectEx 1936->1937 1938 1063027 1937->1938 1938->1775 1940 1062e1f VirtualProtectEx 1939->1940 1942 1063027 1940->1942 1942->1775 1944 106275b 1943->1944 1944->1775 1944->1943 1945 1062ff6 VirtualProtectEx 1944->1945 1946 1063027 1945->1946 1946->1775 1948 10628cd 1947->1948 1948->1775 1949 1062ff6 VirtualProtectEx 1948->1949 1950 1063027 1949->1950 1950->1775 1952 1062eb0 VirtualProtectEx 1951->1952 1954 1063027 1952->1954 1954->1775 1956 106275b 1955->1956 1956->1775 1957 1062ff6 VirtualProtectEx 1956->1957 1958 1063027 1957->1958 1958->1775 1960 106275b 1959->1960 1960->1775 1961 1062860 1960->1961 1962 1062ff6 VirtualProtectEx 1960->1962 1961->1775 1963 1063027 1962->1963 1963->1775 1966 106275b 1964->1966 1965 1062860 1965->1775 1966->1775 1966->1965 1967 1062ff6 VirtualProtectEx 1966->1967 1968 1063027 1967->1968 1968->1775 1970 106275b 1969->1970 1970->1775 1971 1062ff6 VirtualProtectEx 1970->1971 1972 1063027 1971->1972 1972->1775 1974 106275b 1973->1974 1974->1775 1975 1062ff6 VirtualProtectEx 1974->1975 1976 1063027 1975->1976 1976->1775 1978 106275b 1977->1978 1978->1775 1979 1062ff6 VirtualProtectEx 1978->1979 1980 1063027 1979->1980 1980->1775 1982 1062fe3 VirtualProtectEx 1981->1982 1984 1063027 1982->1984 1984->1775 1986 1062943 1985->1986 1987 1062956 1986->1987 1988 1062ff6 VirtualProtectEx 1986->1988 1987->1775 1989 1063027 1988->1989 1989->1775 1991 106275b 1990->1991 1991->1775 1992 1062860 1991->1992 1993 1062ff6 VirtualProtectEx 1991->1993 1992->1775 1994 1063027 1993->1994 1994->1775 1997 106275b 1995->1997 1996 1062860 1996->1775 1997->1775 1997->1996 1998 1062ff6 VirtualProtectEx 1997->1998 1999 1063027 1998->1999 1999->1775 2001 106275b 2000->2001 2001->1775 2002 1062ff6 VirtualProtectEx 2001->2002 2003 1063027 2002->2003 2003->1775 2005 106275b 2004->2005 2005->1775 2006 1062ff6 VirtualProtectEx 2005->2006 2007 1063027 2006->2007 2007->1775 2010 106275b 2008->2010 2009 1062ff6 VirtualProtectEx 2011 1063027 2009->2011 2010->1775 2010->2009 2011->1775 2012 106068a 2013 1060695 2012->2013 2014 1060859 2013->2014 2015 1060860 24 API calls 2013->2015 2015->2014

                        Control-flow Graph

                        APIs
                        • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 02AD5598
                        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02AD55AB
                        • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 02AD55C9
                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02AD55ED
                        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 02AD5618
                        • TerminateProcess.KERNELBASE(?,00000000), ref: 02AD5637
                        • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 02AD5670
                        • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 02AD56BB
                        • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 02AD56F9
                        • Wow64SetThreadContext.KERNEL32(?,?), ref: 02AD5735
                        • ResumeThread.KERNELBASE(?), ref: 02AD5744
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649780351.0000000002AD5000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AD5000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_2ad5000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                        • String ID: GetP$Load$aryA$ress
                        • API String ID: 2440066154-977067982
                        • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                        • Instruction ID: 843e0f81d48333b3825a899e3699ba731a48d375cfa3f71e783ddbf305a4cdac
                        • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                        • Instruction Fuzzy Hash: 67B1E47664028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA41CB94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 51 1062b36-1062b41 52 1062b47-1062b54 51->52 53 1062eec-1063025 VirtualProtectEx 51->53 52->53 54 1062b5a-1062b67 52->54 69 1063027-106302d 53->69 70 106302e-106305e 53->70 55 1062b71-1062b73 54->55 56 1062b69-1062b70 54->56 58 1062e61-1062e6a 55->58 59 1062e4a-1062e5c 55->59 56->55 58->53 61 1062e70-1062e8b 58->61 65 1062ee2-1062ee7 59->65 66 1062e8d-1062e8f 61->66 67 1062e99-1062ea1 61->67 66->67 67->59 67->65 69->70
                        APIs
                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 01063018
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 9e3fb1075ef4c74a97170dbce479fac478de37d1519dbd362ca25c5b55ca1272
                        • Instruction ID: d421b608b89b6bacce93d965e188f76bf505c662bd0d7154dd7321ce0eb17eab
                        • Opcode Fuzzy Hash: 9e3fb1075ef4c74a97170dbce479fac478de37d1519dbd362ca25c5b55ca1272
                        • Instruction Fuzzy Hash: B861D0709053598FCB51CF79C8445AABBF4FF49320F25856EE4C89B241D3389E51CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 1062838-1062963 76 1062c8e-1062ca7 74->76 77 1062969-1062977 74->77 83 1062eec-1063025 VirtualProtectEx 76->83 84 1062cad-1062cc9 76->84 78 106297d-106297f 77->78 79 106275b-106275e 77->79 78->79 81 1062764-1062777 79->81 82 1062c41-1062c44 79->82 86 1062786-106279c 81->86 87 1062779-106277e 81->87 82->83 96 1063027-106302d 83->96 97 106302e-106305e 83->97 84->83 86->83 93 10627a2-10627bb 86->93 87->86 93->79 96->97
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2be4f49f6fae6166bcc34cc75d612bedd1ac8e489fbe4e85d5a05dfae800acd0
                        • Instruction ID: 082f0db50f813e5b6da94ab14cc985829ccf2e89292fb8bcc90d6b532c3d482e
                        • Opcode Fuzzy Hash: 2be4f49f6fae6166bcc34cc75d612bedd1ac8e489fbe4e85d5a05dfae800acd0
                        • Instruction Fuzzy Hash: 5761EE70805349DFCB51CF79C844AAABBF5FF49320F25856EE4C8AA241D7389A51CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 101 106291a-106293d 102 1062943-1062950 101->102 103 1062eec-1063025 VirtualProtectEx 101->103 102->103 104 1062956-1062b7f 102->104 114 1063027-106302d 103->114 115 106302e-106305e 103->115 107 1062b85 104->107 108 1062e4a-1062ee7 104->108 107->108 114->115
                        APIs
                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 01063018
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: bd5051c46afa106a96d209d71ca969bd54bab39dd1628ba7bdd96459cfad286a
                        • Instruction ID: 64c516e34f111370a2970908a9c634c50f1f76d7be1972618de0fa98e1a02fd0
                        • Opcode Fuzzy Hash: bd5051c46afa106a96d209d71ca969bd54bab39dd1628ba7bdd96459cfad286a
                        • Instruction Fuzzy Hash: E351CE708053499FDB51CF79C8849AABFF4FF45320F25856EE4C89B282D3385A56CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 119 106276e-1062777 120 1062786-106279c 119->120 121 1062779-106277e 119->121 123 10627a2-10627bb 120->123 124 1062eec-1062fef 120->124 121->120 129 1062764 123->129 130 1062c41-1062c44 123->130 132 1062ff6-1063025 VirtualProtectEx 124->132 129->119 130->124 133 1063027-106302d 132->133 134 106302e-106305e 132->134 133->134
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cbc4b4eab908854c91b37710f02d49b195588eba35afefa0f7ae639e4ad93877
                        • Instruction ID: a8c6d4291d2081eefa6a3b196fdcaf7a54caaac51d67206d533b499190c49925
                        • Opcode Fuzzy Hash: cbc4b4eab908854c91b37710f02d49b195588eba35afefa0f7ae639e4ad93877
                        • Instruction Fuzzy Hash: 6851C0708053499FDB51CF79C844AAABBF4FF49320F15856EE4C89B242D3389A51CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 138 1062a2b-1062a32 139 1062dda-1062de2 138->139 140 1062a38-1062ee7 138->140 142 1062eec-1063025 VirtualProtectEx 139->142 143 1062de8-1062e00 139->143 158 1063027-106302d 142->158 159 106302e-106305e 142->159 144 1062e06-1062e09 143->144 145 106275b-106275e 143->145 144->145 147 1062764-1062777 145->147 148 1062c41-1062c44 145->148 153 1062786-106279c 147->153 154 1062779-106277e 147->154 148->142 153->142 160 10627a2-10627bb 153->160 154->153 158->159 160->145
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d6fd036dde8d14ce706c49b3d407a54acd873b33447a7c215a291418d9bc98cf
                        • Instruction ID: 60642bd15458d1bc1931c873c2a9ec568b3dc221da9191486d3d637119507e8f
                        • Opcode Fuzzy Hash: d6fd036dde8d14ce706c49b3d407a54acd873b33447a7c215a291418d9bc98cf
                        • Instruction Fuzzy Hash: 4151BC708053499FDB55CF79C884AEABBF4FF49320F25856EE4C89A281D3385A51CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 165 10628c0-1062a87 168 1062a96-1062a9f 165->168 169 1062a89-1062a8e 165->169 170 1062aa5-1062aac 168->170 171 1062eec-1063025 VirtualProtectEx 168->171 169->168 170->171 176 1063027-106302d 171->176 177 106302e-106305e 171->177 176->177
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ed6d9092e335fa55eeca4e8b754a6859cd606609ccb989828d7d25d73437fc8
                        • Instruction ID: 53bbfc866455bb7071f428fbf3a2fbea93d8b4892e6d29344f9a2be37297fc5d
                        • Opcode Fuzzy Hash: 2ed6d9092e335fa55eeca4e8b754a6859cd606609ccb989828d7d25d73437fc8
                        • Instruction Fuzzy Hash: 54518A708053599FCB51CF79C8449AABBF4FF49320F25856EE4C8AB241D738AA51CFA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 181 106281f-1062828 182 106282e-1062833 181->182 183 10628e9-10628f8 181->183 184 106275b-106275e 182->184 185 10628fe-1062907 183->185 186 1062eec-1063025 VirtualProtectEx 183->186 187 1062764-1062777 184->187 188 1062c41-1062c44 184->188 185->186 198 1063027-106302d 186->198 199 106302e-106305e 186->199 192 1062786-106279c 187->192 193 1062779-106277e 187->193 188->186 192->186 197 10627a2-10627bb 192->197 193->192 197->184 198->199
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d783ff16b2c98fb067a600bbaf440bd852654b43900761e08d6a409c0ebc5a99
                        • Instruction ID: 4cf80d21fb82b7d742773cc32f63d25056109d8a5ea1b8f056b75f0ce618b799
                        • Opcode Fuzzy Hash: d783ff16b2c98fb067a600bbaf440bd852654b43900761e08d6a409c0ebc5a99
                        • Instruction Fuzzy Hash: 27517C708053499FDB51CF75C8849EABBF4FF49320F25856EE4C49A241D338AA51CBA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 204 10627bd-10627c4 205 106284f-106285a 204->205 206 10627ca-10627cf 204->206 208 1062860-106286d 205->208 209 1062eec-1063025 VirtualProtectEx 205->209 206->205 207 106275b-106275e 206->207 210 1062764-1062777 207->210 211 1062c41-1062c44 207->211 221 1063027-106302d 209->221 222 106302e-106305e 209->222 215 1062786-106279c 210->215 216 1062779-106277e 210->216 211->209 215->209 220 10627a2-10627bb 215->220 216->215 220->207 221->222
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a0cef01d453063d3b24ba3af64c45c44e2cabe96391830335a8a6879e20cc379
                        • Instruction ID: fee83481c58b2b1da2aee95fe1750fa5ad915d5c23f7ba223730bc0b84abcc02
                        • Opcode Fuzzy Hash: a0cef01d453063d3b24ba3af64c45c44e2cabe96391830335a8a6879e20cc379
                        • Instruction Fuzzy Hash: 59519E708053599FDB51CF79C8449EABBF4FF49320F25856EE4C8AA281D3385A51CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 227 1062ea3-1062eae 228 1062eb0-1062ebe 227->228 229 1062eec-1063025 VirtualProtectEx 227->229 230 1062ec0-1062ec7 228->230 231 1062ec8-1062ecb 228->231 236 1063027-106302d 229->236 237 106302e-106305e 229->237 230->231 231->229 236->237
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f57c878cade55b9a5f4dce5a2754a913cfd779995218c234b92212c136dd31e3
                        • Instruction ID: ca8ceba99b66127cd04492e2ea273766ffaae17eedf4b05fea652d0bfeb6f50d
                        • Opcode Fuzzy Hash: f57c878cade55b9a5f4dce5a2754a913cfd779995218c234b92212c136dd31e3
                        • Instruction Fuzzy Hash: 6E519D708053599FDB51CF79C8449EABBF4FF49320F25856EE4C8AA282D3385A51CFA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 241 1062e0e-1062e19 242 1062e1f-1062e2d 241->242 243 1062eec-1063025 VirtualProtectEx 241->243 242->243 244 1062e33-1062e3a 242->244 249 1063027-106302d 243->249 250 106302e-106305e 243->250 244->243 249->250
                        APIs
                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 01063018
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 5b02faa9a72b5632f312f83f7d43db289a1979848df0c796d9c205f846fb2faf
                        • Instruction ID: f498fbca91a9af8e61620d7a22c3651db31d1ecf40d80629fbaddad89dcd6c72
                        • Opcode Fuzzy Hash: 5b02faa9a72b5632f312f83f7d43db289a1979848df0c796d9c205f846fb2faf
                        • Instruction Fuzzy Hash: B651BE708053599FCB51CF79C8449EABBF4FF49324F25856EE4C8AA242D3385A51CFA4

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 254 1063129-1063187 257 1063197-10631d9 CreateThread 254->257 258 1063189-1063195 254->258 260 10631e2-1063207 257->260 261 10631db-10631e1 257->261 258->257 261->260
                        APIs
                        • CreateThread.KERNELBASE(?,?,?,00000000,?,?), ref: 010631CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: CreateThread
                        • String ID:
                        • API String ID: 2422867632-0
                        • Opcode ID: 1af385af1771737482c480f971dd456cdb6b138a69316256822a04a0cc82e770
                        • Instruction ID: f783da3505e7e05d6ebb94a9934f10bcaac0312db311af0952361b3ba5e066b9
                        • Opcode Fuzzy Hash: 1af385af1771737482c480f971dd456cdb6b138a69316256822a04a0cc82e770
                        • Instruction Fuzzy Hash: 873126B19003499FDB10DFAAC884ADEBFF5FF48310F108429E919A7340C7759A55CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 265 1063130-1063187 267 1063197-10631d9 CreateThread 265->267 268 1063189-1063195 265->268 270 10631e2-1063207 267->270 271 10631db-10631e1 267->271 268->267 271->270
                        APIs
                        • CreateThread.KERNELBASE(?,?,?,00000000,?,?), ref: 010631CC
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: CreateThread
                        • String ID:
                        • API String ID: 2422867632-0
                        • Opcode ID: 54aa33ef9b1c7e62e4fdcd16401dc9e09cee45e249efe201093746de30b2aa20
                        • Instruction ID: 1fa1fa74a51109fe3cb3e45e4ffb8cbd733d0e262bca05e6c48a043030ce24dc
                        • Opcode Fuzzy Hash: 54aa33ef9b1c7e62e4fdcd16401dc9e09cee45e249efe201093746de30b2aa20
                        • Instruction Fuzzy Hash: 3E2115B59003499FCB10DFAAD885ADEBFF5FF48314F20842AE919A7340C7759A54CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 275 1062f90-1063025 VirtualProtectEx 279 1063027-106302d 275->279 280 106302e-106305e 275->280 279->280
                        APIs
                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 01063018
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 80c86197d9e990f59d99f63fce89da98bc81ebc4d3784e7fb26a06eb2f3ccf57
                        • Instruction ID: 5ae0eb7f37888d20782566cc0754be0eb1ea65c37cf6e2c3dca0496fd6572f02
                        • Opcode Fuzzy Hash: 80c86197d9e990f59d99f63fce89da98bc81ebc4d3784e7fb26a06eb2f3ccf57
                        • Instruction Fuzzy Hash: 9B2139B1C003499FDB10DFAAC885AEEFBF5FF48310F108429E559A7240D7789945DBA5
                        APIs
                        • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 01063018
                        Memory Dump Source
                        • Source File: 00000000.00000002.1649636877.0000000001060000.00000040.00000800.00020000.00000000.sdmp, Offset: 01060000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_1060000_LisectAVT_2403002A_96.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 646f66bb35b79fcc08e3131441382103196d5c80e22862ad80f85eebd1a35d26
                        • Instruction ID: 82d69cd64404d4a80ca4a629c10e642d31271ea0850cc6ee9638f2d1f8e93411
                        • Opcode Fuzzy Hash: 646f66bb35b79fcc08e3131441382103196d5c80e22862ad80f85eebd1a35d26
                        • Instruction Fuzzy Hash: 0D2137B18003499FDB10DFAAC885AEEFBF5FF48320F10842AE559A7240C7789944DBA5

                        Execution Graph

                        Execution Coverage:3.2%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:43.8%
                        Total number of Nodes:48
                        Total number of Limit Nodes:4
                        execution_graph 8919 408ba0 8922 408bab 8919->8922 8920 408baf ExitProcess 8922->8920 8923 408bc0 GetStdHandle 8922->8923 8925 408bbc 8922->8925 8923->8925 8926 4341b0 8925->8926 8927 4341c2 FreeLibrary 8926->8927 8928 4341b9 8926->8928 8929 4341da 8927->8929 8928->8927 8929->8920 8930 414280 8931 4142bb 8930->8931 8932 41429a 8930->8932 8932->8931 8933 4142c0 NtAllocateVirtualMemory 8932->8933 8934 41434e NtFreeVirtualMemory 8933->8934 8934->8931 8935 435440 8937 435450 8935->8937 8936 43554f 8937->8936 8938 435554 NtAllocateVirtualMemory 8937->8938 8939 435610 NtFreeVirtualMemory 8938->8939 8939->8936 8948 43286a 8949 43287a 8948->8949 8950 4328a0 NtClose 8949->8950 8951 4327af 8954 434a60 8951->8954 8953 4327bf NtOpenSection 8955 430d33 8957 430d6f RtlAllocateHeap 8955->8957 8958 4324b2 8959 4324c0 8958->8959 8964 4324df NtAllocateVirtualMemory 8958->8964 8961 4324ec NtAllocateVirtualMemory 8959->8961 8959->8964 8962 432575 NtFreeVirtualMemory 8961->8962 8962->8964 8963 43265d NtFreeVirtualMemory 8964->8963 8969 433396 8970 433429 LoadLibraryW 8969->8970 8971 4333f8 8969->8971 8972 433433 8970->8972 8971->8970 8973 4331b5 8974 43320b 8973->8974 8975 43323d LoadLibraryW 8973->8975 8974->8974 8974->8975 8976 433244 8975->8976 8977 430ebb 8978 430f3f RtlFreeHeap 8977->8978 8979 430ef1 8977->8979 8979->8978 8979->8979 8980 43349a 8982 4334aa 8980->8982 8981 433630 LoadLibraryW 8983 433637 8981->8983 8982->8981

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 74 4324b2-4324ba 75 4324c0-4324ca 74->75 76 4325bf-4325d1 74->76 77 4324d0-4324d7 75->77 78 4325d4-43268b NtAllocateVirtualMemory NtFreeVirtualMemory 76->78 79 4324d9-4324dd 77->79 80 4324ec-432599 NtAllocateVirtualMemory NtFreeVirtualMemory 77->80 79->77 81 4324df-4324e1 79->81 80->76 85 43259b-4325a3 80->85 84 4324e7 81->84 81->85 84->76 86 4325b0-4325b7 85->86 86->78 87 4325b9-4325bd 86->87 87->76 87->86
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00432543
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0043258B
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0043262B
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00432673
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: 4JH
                        • API String ID: 292159236-2930965107
                        • Opcode ID: d481d630a5b8d5a9e8a5691eb967baa4d0b19a6a76c4a807ddfd3ffdc9a89d23
                        • Instruction ID: e57bc33411c52b55f67eae1a2d9bac0583ccc31d05605645e86a6c579d410437
                        • Opcode Fuzzy Hash: d481d630a5b8d5a9e8a5691eb967baa4d0b19a6a76c4a807ddfd3ffdc9a89d23
                        • Instruction Fuzzy Hash: 475117B5200B009FE734CF14C855B17B7E5FB09315F148B2DE6A68BBA0D7B4E9498B98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 88 435440-43544b 89 435450-435459 88->89 89->89 90 43545b-435462 89->90 91 435464-435469 90->91 92 43546b 90->92 93 43546e-43549b call 408550 91->93 92->93 96 4354b2-43552d 93->96 97 43549d 93->97 99 435533-43553b 96->99 100 43562d-43563f call 408560 96->100 98 4354a0-4354b0 97->98 98->96 98->98 101 435540-435547 99->101 103 435554-435627 NtAllocateVirtualMemory NtFreeVirtualMemory 101->103 104 435549-43554d 101->104 103->100 104->101 106 43554f 104->106 106->100
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004355B5
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00435627
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: ,$@
                        • API String ID: 292159236-1227015840
                        • Opcode ID: 856cd1b58afa6bc134fa03a889fbc70798f28364a2ecd4c6e9760d5773f632fd
                        • Instruction ID: f8360100b9cb7d3cb57d77f65ba4c6ccbb3f9379dda1dcf08f2b3c6d20ea6815
                        • Opcode Fuzzy Hash: 856cd1b58afa6bc134fa03a889fbc70798f28364a2ecd4c6e9760d5773f632fd
                        • Instruction Fuzzy Hash: BB519EB11047009FE710CF14CC46B5BBBE5EF88318F158A2DF5A98B3E0E77999088B86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 108 432987-4329a6 109 432b45-432b64 108->109 110 4329ac-4329b4 108->110 112 432b30-432b42 109->112 113 432b66-432b6f 109->113 111 4329c0-4329c7 110->111 114 432a76-432b22 NtAllocateVirtualMemory NtFreeVirtualMemory 111->114 115 4329cd-4329d1 111->115 112->109 116 432b70-432b77 113->116 114->109 115->111 117 4329d3 115->117 118 432b90-432c4e NtAllocateVirtualMemory NtFreeVirtualMemory 116->118 119 432b79-432b7d 116->119 117->109 119->116 122 432b7f 119->122 122->112
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00432ACD
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00432B1C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 42dae8a1bee0bef5fb7ba0b2853ffd8c3125a0c385f60d813a3b9d2991cfd157
                        • Instruction ID: 295fa45e4d408423eabf138bee41277be027f8e9f289c2ea6cb46de8400daab2
                        • Opcode Fuzzy Hash: 42dae8a1bee0bef5fb7ba0b2853ffd8c3125a0c385f60d813a3b9d2991cfd157
                        • Instruction Fuzzy Hash: F95113B5100B009FE324CF04C895B17B7F4BB09715F148A2DE6A68BAE1C7B5B9498B98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 151 432c52-432c54 152 432c56 151->152 153 432c19-432c1b 151->153 154 432c58-432c5d 152->154 155 432c1f-432c24 152->155 157 432c20-432c33 153->157 158 432c26-432c33 154->158 159 432c5f-432c6b 154->159 155->158 160 432c34-432c4e NtFreeVirtualMemory 157->160 158->160 159->160 162 432c6d-432c9a 159->162 163 432cdb-432d04 call 434300 162->163 164 432c9c-432c9f 162->164 165 432ca0-432cd9 164->165 165->163 165->165
                        APIs
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00432C36
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: FreeMemoryVirtual
                        • String ID: JM
                        • API String ID: 3963845541-1126336605
                        • Opcode ID: 4c57a4efb765355fab4178c6956b6285595b26ad7eb704c4faddeec0770cddab
                        • Instruction ID: 7792fbddc69783f63ebb1d4035c585e78bd1a7d627786f70673d153a23fe61f1
                        • Opcode Fuzzy Hash: 4c57a4efb765355fab4178c6956b6285595b26ad7eb704c4faddeec0770cddab
                        • Instruction Fuzzy Hash: 463127751447814BE718CF24CC907577BE0FB06325F18665DD893CB6A7D678E546C708

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 172 43286a-4328b9 call 434a60 * 2 NtClose
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Close
                        • String ID: `LH
                        • API String ID: 3535843008-2472401817
                        • Opcode ID: 86ab5c0938e1b830f481357698d7d6090946e8db4a46c1e3f054870f591dd6ac
                        • Instruction ID: 3204b7d4919afa1bd31a539cca70297fecf578bfa73307c8a78c10fe3bfb4898
                        • Opcode Fuzzy Hash: 86ab5c0938e1b830f481357698d7d6090946e8db4a46c1e3f054870f591dd6ac
                        • Instruction Fuzzy Hash: EEE01279484004DBCB45FF68FC42D647661FF9A30A7101074E802E1232DF6A1A64AE1D

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 178 414280-414294 179 41436b-414374 178->179 180 41429a-4142aa 178->180 181 4142b0-4142b3 180->181 182 4142c0-414349 NtAllocateVirtualMemory 181->182 183 4142b5-4142b9 181->183 185 41434e-414365 NtFreeVirtualMemory 182->185 183->181 184 4142bb 183->184 184->179 185->179
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00414321
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00414365
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 0177d12dfe376cca5f37222a2906533dcaa952e0eb16e3c2ccb901f969772b5a
                        • Instruction ID: 868897cf0748b6c88601c0dcc4a7e9804739e8613007b25ed20e9ee7eb803c6b
                        • Opcode Fuzzy Hash: 0177d12dfe376cca5f37222a2906533dcaa952e0eb16e3c2ccb901f969772b5a
                        • Instruction Fuzzy Hash: AA21AFB5109315AFE310CF08D845B5BBBE8EBC5764F108A2DF9A4873D0D3B49944CB96

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 245 4327f1-432849 call 434a60 NtMapViewOfSection
                        APIs
                        • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000002,00000000,00000002), ref: 0043282D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: SectionView
                        • String ID:
                        • API String ID: 1323581903-0
                        • Opcode ID: 035a58a4ac49a97b24cc7d0bd94c7107132f3e706de7e0b625d0706f1f055b85
                        • Instruction ID: 7d97224ab8d063000262d9b4a55516943ef22394f512bf34d6ca9625f87aa892
                        • Opcode Fuzzy Hash: 035a58a4ac49a97b24cc7d0bd94c7107132f3e706de7e0b625d0706f1f055b85
                        • Instruction Fuzzy Hash: 21F01C79280740AFE7209F18DC42F11B7F1BB4A704F200518F792AAAE1C7B67850CB08
                        APIs
                        • NtOpenSection.NTDLL(?,00000004), ref: 004327C9
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: OpenSection
                        • String ID:
                        • API String ID: 1950954290-0
                        • Opcode ID: 100327a6f294a97e0d3f15f25135b08b87efce59eb2cea405b9adfa94b504eb5
                        • Instruction ID: 26adc72d2ccf5801e9a77bfe4c4923719abfef157c5aa9430de75e6ed24b83b7
                        • Opcode Fuzzy Hash: 100327a6f294a97e0d3f15f25135b08b87efce59eb2cea405b9adfa94b504eb5
                        • Instruction Fuzzy Hash: F9E0C2B9080240DBE744DB64EC02B32B3A1B789309F14202CE383EB6A1C771FD528F88

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 125 408ba0-408bad call 432130 128 408bb1-408bba call 42d6b0 125->128 129 408baf 125->129 134 408bbc 128->134 135 408bbe-408bee GetStdHandle call 408c20 call 409f50 128->135 130 408c09-408c12 ExitProcess 129->130 136 408c02 call 4341b0 134->136 145 408bf3-408bf5 135->145 141 408c07 136->141 141->130 146 408bf7 145->146 147 408bf9-408bfe call 40ff70 145->147 148 408c00 146->148 147->148 148->136
                        APIs
                        Strings
                        • eleet or leetspeak, is a system of modified spellings used primarily on the internet. it often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance, xrefs: 00408BDA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: ExitProcess
                        • String ID: eleet or leetspeak, is a system of modified spellings used primarily on the internet. it often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance
                        • API String ID: 621844428-3721107060
                        • Opcode ID: b71804b9997aa554e16004a83a96f55f800cf84d45723589b227d08796950f40
                        • Instruction ID: f1808be77cff1eb31d72e978934db848b61890ee2b0dfd9146d7a31faa626585
                        • Opcode Fuzzy Hash: b71804b9997aa554e16004a83a96f55f800cf84d45723589b227d08796950f40
                        • Instruction Fuzzy Hash: D8F01DB040D600CAD6007B65970636A7BB4BF51394F20553FE4D7711C1EE7DA446AA6F

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 168 430ebb-430eef 169 430ef1 168->169 170 430f3f-430f65 RtlFreeHeap 168->170 171 430f00-430f3d 169->171 171->170 171->171
                        APIs
                        • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00430F4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: FreeHeap
                        • String ID: \-"#
                        • API String ID: 3298025750-2514456039
                        • Opcode ID: ca35d4fa510ca61bad3c211c373f68befa3b02ba84f1bee3b89ec66d48974bdb
                        • Instruction ID: 812974517138c8aff2ad21617ce4751b91424872a0d23016b608d76a644f7d63
                        • Opcode Fuzzy Hash: ca35d4fa510ca61bad3c211c373f68befa3b02ba84f1bee3b89ec66d48974bdb
                        • Instruction Fuzzy Hash: 00112E742083409FD318CF14D8A4B2FBBA1FBC5318F148A5DE8AA47791C7799916CF86

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 186 43349a-43352f call 434a60 * 3 193 433531 186->193 194 433560-433565 186->194 195 433540-43355e 193->195 197 433567 194->197 198 43356c-433602 call 434a60 * 3 194->198 195->194 195->195 197->198 206 433630-433635 LoadLibraryW 198->206 207 433604 198->207 209 433637 206->209 210 43363c-43364f 206->210 208 433610-43362e 207->208 208->206 208->208 209->210
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 453e1395d4cd7f01499e03e2c3fd89198ecca2b65677bebf01668ae4618eeb37
                        • Instruction ID: 05879597b36f340204e54eefabb3aa78cb91631a6f28e7ec5fb6b6756ed41326
                        • Opcode Fuzzy Hash: 453e1395d4cd7f01499e03e2c3fd89198ecca2b65677bebf01668ae4618eeb37
                        • Instruction Fuzzy Hash: AE418FB8100B42AFD314CF16ECA1626BBB1FB46706F50862DD49647B61D738F6A1CF98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 211 430d33-430d6d 212 430db0-430dc2 211->212 213 430d6f 211->213 216 430df8-430e32 212->216 214 430d70-430dae 213->214 214->212 214->214 217 430dd0-430df5 RtlAllocateHeap 216->217 218 430e34 216->218 217->216 219 430e40-430e7e 218->219 219->219 220 430e80 219->220 220->217
                        APIs
                        • RtlAllocateHeap.NTDLL(?,00000000), ref: 00430DDC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 378380c59ab7deeedbf844b2be65350c1b2df18023da69360a3b69a43fc4cd10
                        • Instruction ID: 6c7d86bb20e7512e0980dc883ce85d6ef295a5f790affbbfa7a9690a99a341db
                        • Opcode Fuzzy Hash: 378380c59ab7deeedbf844b2be65350c1b2df18023da69360a3b69a43fc4cd10
                        • Instruction Fuzzy Hash: 644144342406018FD314CF29C894B16BBE3EB89324F24C66DD9A58B7A5D776F857CB84

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 221 432e56-433602 call 434a60 * 3 229 433630-433635 LoadLibraryW 221->229 230 433604 221->230 232 433637 229->232 233 43363c-43364f 229->233 231 433610-43362e 230->231 231->229 231->231 232->233
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 197706f2a6f4593b94a649efe21b69c80866ef0c4be32c16bef3ca1d0a16588b
                        • Instruction ID: 58631fd8b282c1a11470803616a2f005a7f8d0b17c781736e0482700b0d315c4
                        • Opcode Fuzzy Hash: 197706f2a6f4593b94a649efe21b69c80866ef0c4be32c16bef3ca1d0a16588b
                        • Instruction Fuzzy Hash: E62190B4100B42AFD314CF22EC91626BBB1FB46306F50861DD45607B61D738A691CF98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 234 433396-4333f6 235 433429-433431 LoadLibraryW 234->235 236 4333f8 234->236 238 433433 235->238 239 433438-433454 235->239 237 433400-433427 236->237 237->235 237->237 238->239
                        APIs
                        • LoadLibraryW.KERNELBASE(?), ref: 0043342A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 1d9fafaf88a8faf340e27bd8f8408155bedffa904f35b9538d4d166bcb0415c7
                        • Instruction ID: ac2c790b1fc1a3f59a991d20ee33573d98549c45b6f28e19746bc35e08f0584e
                        • Opcode Fuzzy Hash: 1d9fafaf88a8faf340e27bd8f8408155bedffa904f35b9538d4d166bcb0415c7
                        • Instruction Fuzzy Hash: 9E1103B9200B428BC318CF24D9A0717BBB1FF4A315B509A5CC4A65BB61C734E981CB88

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 240 4331b5-433209 241 43320b-43323b 240->241 242 43323d-433242 LoadLibraryW 240->242 241->241 241->242 243 433244 242->243 244 433249-433265 242->244 243->244
                        APIs
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 9d142ec2f202c3a93a3bc966abc59e870bd095bf133c8f10dd987d28d565b27c
                        • Instruction ID: 327e9fcf5c09f3c99b27c50919e6ad6266d6078656913635956d24c9b1847ba5
                        • Opcode Fuzzy Hash: 9d142ec2f202c3a93a3bc966abc59e870bd095bf133c8f10dd987d28d565b27c
                        • Instruction Fuzzy Hash: 5E114C751007428BD319CF15C5A0626FBB2BF46314F19D69DC4A64BB55CB34E581CF84
                        APIs
                        • FreeLibrary.KERNELBASE(00408C07), ref: 004341C8
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 513b45c6974d4a246ee32657e5f30ea2f279fd49f7bf0d96532289f74e7f9a1a
                        • Instruction ID: 34726e395fa879ebbd2bdff8ea1e481c3f1f4678e9850b4833e67583b8036a63
                        • Opcode Fuzzy Hash: 513b45c6974d4a246ee32657e5f30ea2f279fd49f7bf0d96532289f74e7f9a1a
                        • Instruction Fuzzy Hash: A0D092B9A00000ABDF016FA0FD4AA1A3B36BB86B4771811B9B121D1070DBB69A50EB1D
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Object$DeleteMetricsSelectSystem
                        • String ID: $HVH$RWH$RWH$RWH$RWH$sWH$UH$VH
                        • API String ID: 3911056724-4180904444
                        • Opcode ID: e055fe877abc44b63b1dcfdcb8bd3dedf39a36a7745de8474bb4adde08ef3ca1
                        • Instruction ID: d336f9680c2c80765347343122a820d99364ef955cbf8dd5265351ec383eaf10
                        • Opcode Fuzzy Hash: e055fe877abc44b63b1dcfdcb8bd3dedf39a36a7745de8474bb4adde08ef3ca1
                        • Instruction Fuzzy Hash: A69165B4919380DFD764EF68D584B9ABBF0FB89304F50992EE88987350D7749848CF4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: E$J%$JQ$[Q$)+$57$=?
                        • API String ID: 292159236-1103543027
                        • Opcode ID: 0bb61f644cf164a5b7bd3e7e5a4839d0630b2550bb2a8b415e81011de3df14a6
                        • Instruction ID: af662492b1772ae99da2f549c3987d361bf92e187eff3c49f3daefb35f4ab968
                        • Opcode Fuzzy Hash: 0bb61f644cf164a5b7bd3e7e5a4839d0630b2550bb2a8b415e81011de3df14a6
                        • Instruction Fuzzy Hash: FE0262B1100B05CFE724CF25D885BA7B7E4FB49304F548A2DE5AB8BAA0DB74B445CB58
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: %I8O$&QaW$)M:S$*E0K$,Y+_$0$1A;G$<U%[$E-^3$J9S?$X)\/$b5K;$c%U+$m]8c
                        • API String ID: 0-997815367
                        • Opcode ID: d7fb3e74ec2e28aa543b637f803960ee737ed12f5e5709a3deba42899b75493b
                        • Instruction ID: 8b2ad76d28e35d9b16d3389fbbbd24c75959c0fa443f5104ffe7841e359e9b10
                        • Opcode Fuzzy Hash: d7fb3e74ec2e28aa543b637f803960ee737ed12f5e5709a3deba42899b75493b
                        • Instruction Fuzzy Hash: DA0202B02183818BE324CF15C4A4B6FBBE1BBC2348F144D2DE5D59B392D7799909CB96
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: String
                        • String ID: @$C$E$G$L$Z$w
                        • API String ID: 2568140703-3096178343
                        • Opcode ID: 87b9087248ae5eace9f90d9ca8cc5c9f7d9fa184371e6c5ee72b762536391599
                        • Instruction ID: 9e35a21059ff4ddcf5d1cec1c932da6d5e7adec0eece979922aa03f3d44e8adc
                        • Opcode Fuzzy Hash: 87b9087248ae5eace9f90d9ca8cc5c9f7d9fa184371e6c5ee72b762536391599
                        • Instruction Fuzzy Hash: 5CA1E57170D3908FD725CA28D89479EBBD2AFD5320F598A2DD8D98B3C1CB798804C742
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 0041FC9D
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0041FCC6
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,00000000,?), ref: 004200DD
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000009,00000000,?,?), ref: 0042010B
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: MO${cH$qrs
                        • API String ID: 237503144-732795104
                        • Opcode ID: 8670f8c9293279a242689b2c3cfda6a3a1a1e25064178ff9fa20b943fc823e12
                        • Instruction ID: 65a3cd21bf31c4a700145bba2377a232baa2ce444e148d85dfe348caaee142c8
                        • Opcode Fuzzy Hash: 8670f8c9293279a242689b2c3cfda6a3a1a1e25064178ff9fa20b943fc823e12
                        • Instruction Fuzzy Hash: AC325AB0500A009FD724CF29C495B17BBE1FB89324F158A5DD8AA8BB99D734E816CBC5
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 8#$@%z'$X!G#$Y5[7$Z-K/$d)C+$d9:;$s1]3$s;$s}
                        • API String ID: 0-3001701124
                        • Opcode ID: 78fa73f9304cb6e3878cd8a34dcb9abd98b3adb902670527a849b8cb8d2205ba
                        • Instruction ID: 19c8075aa3001c786487764f0464367b61e8b25b92a190ce5d8e6f54d34452f3
                        • Opcode Fuzzy Hash: 78fa73f9304cb6e3878cd8a34dcb9abd98b3adb902670527a849b8cb8d2205ba
                        • Instruction Fuzzy Hash: 74919AB06083418BD714CF18D8906ABBBF1FF82354F148A2DF9A65B391E378D945CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004228F6
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0042294F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: EXEC$Y]KB
                        • API String ID: 292159236-105863924
                        • Opcode ID: b01179a94c9c1e486c4d7d47bd9e708c0eecc83578f5eda10a58d939a586235d
                        • Instruction ID: b8fe15191a4cb810a11d2c1cdebb326c90956e945b5c8991cfbfe6dc89b5b8e9
                        • Opcode Fuzzy Hash: b01179a94c9c1e486c4d7d47bd9e708c0eecc83578f5eda10a58d939a586235d
                        • Instruction Fuzzy Hash: 1A52DF70204B508BD335CF29C5947A3BBE2BF56314F548A5ED4EB8BB91C7B8A409CB58
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041AB42
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041AB97
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: IXta$JaLc$`w$~w
                        • API String ID: 292159236-2358998091
                        • Opcode ID: 1e42106d24df261cb5d18390cad165dcb4a8f8667792d7f965dff132a2665357
                        • Instruction ID: bfa11fb85def840ccfc55144673c2037c260f26699fa6ce15004a86c85d04321
                        • Opcode Fuzzy Hash: 1e42106d24df261cb5d18390cad165dcb4a8f8667792d7f965dff132a2665357
                        • Instruction Fuzzy Hash: 8F613EB0219381AFD364CF08D884B5BBBF1FB81744F50992DF5A58B2A1D774D849CB86
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00100000,00003000,00000004), ref: 004319A0
                        • NtAllocateVirtualMemory.NTDLL(000000FF,0000BA00,00000000,?,00003000,00000040), ref: 00431AA0
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000010,00008000), ref: 00431AFC
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00010000,00008000), ref: 00431B46
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000000,00003000,00000004), ref: 00431B6C
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00431E54
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 157d70de22d84546dcc6f03ec508dbbd0ac7a1b4d7918f13c0c178961d6826b7
                        • Instruction ID: 6e07ae5db53da8b8030a6f5ed98da4aac5f7c7e97a2b8d8c8d50efb31124d513
                        • Opcode Fuzzy Hash: 157d70de22d84546dcc6f03ec508dbbd0ac7a1b4d7918f13c0c178961d6826b7
                        • Instruction Fuzzy Hash: D7D1CF716083419FC714CF18C891B1FBBE1AF89314F148A2EF9A58B3A1D775D905CB56
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: .$.$0$[$false$null$true
                        • API String ID: 0-2094208800
                        • Opcode ID: 336e1c7765ce89bb735e74a889a6d7a4bd5a3082db35aa5a2400fc6e68fc1a1d
                        • Instruction ID: 41d43fbf767d37e6ec8a8abe32da969266ce922f9d187371dfd17c08855f5b2d
                        • Opcode Fuzzy Hash: 336e1c7765ce89bb735e74a889a6d7a4bd5a3082db35aa5a2400fc6e68fc1a1d
                        • Instruction Fuzzy Hash: 6A0205B0A043098BE7105F25DD45727BAE4AF80348F18853EE8C5A73E2EB7DD954CB5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: amjh
                        • API String ID: 0-1051360590
                        • Opcode ID: 3c864a5787bef8e8bf11816a1f0be47a4128881dbfddf9688fc9d708efbe6f7c
                        • Instruction ID: 9be15c44005d4cd772ac0dc45af3ef8c8a4b2f40223aa877db9f9181b0955942
                        • Opcode Fuzzy Hash: 3c864a5787bef8e8bf11816a1f0be47a4128881dbfddf9688fc9d708efbe6f7c
                        • Instruction Fuzzy Hash: 51E19CB11093908FD324CF18C891BAFB7E1FBC9714F048A2DE9A99B390C7759905CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004364A8
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,?,00008000), ref: 00436506
                        • NtAllocateVirtualMemory.NTDLL(000000FF,D2FF0000,00000000,?,00003000,00000040), ref: 004365CB
                        • NtFreeVirtualMemory.NTDLL(000000FF,000000B8,?,00008000), ref: 00436628
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: R-,T
                        • API String ID: 292159236-635581381
                        • Opcode ID: 25cc491f51e0b02a01cc23991ae46c5c8c7385e2a947bdd4057e2fd019247081
                        • Instruction ID: 6766c571de64f46344bf9091094ab8d6f915d2aa4d0fce071a77462ede05d51d
                        • Opcode Fuzzy Hash: 25cc491f51e0b02a01cc23991ae46c5c8c7385e2a947bdd4057e2fd019247081
                        • Instruction Fuzzy Hash: 15B1BE756083029FD310CF18C881B1BF7E6EF88754F158A2DE9A49B3A0D7B5E905CB86
                        APIs
                        • OpenClipboard.USER32(?), ref: 0042ACCA
                        • GetClipboardData.USER32 ref: 0042ACE7
                        • GlobalLock.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0042AD0D
                        • GlobalUnlock.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0042AE0B
                        • CloseClipboard.USER32 ref: 0042AE15
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock
                        • String ID:
                        • API String ID: 1006321803-0
                        • Opcode ID: c74de18eb7989096d09118fb3c0b39538c3871bbba6d16bab27a7ae700e19bbc
                        • Instruction ID: 7405af5fef2ee02590b6c5cda373b50619dce14ffee90a184e179fa75e513b97
                        • Opcode Fuzzy Hash: c74de18eb7989096d09118fb3c0b39538c3871bbba6d16bab27a7ae700e19bbc
                        • Instruction Fuzzy Hash: 79518F70508B90DFD3209F68E088756FFF0AB05304F548A6AD8D687B81D379B869DB97
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004193A9
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004193F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: >!$z9I;
                        • API String ID: 292159236-571071913
                        • Opcode ID: c2d6abffb20397381d36a57533f72bf4df7645fb43c2d5d99f013694d5bca3d9
                        • Instruction ID: aa37f20bd95380eb3b1cf3ce97e7b55e3a9c329d782f0430e56bd6cf2f5431aa
                        • Opcode Fuzzy Hash: c2d6abffb20397381d36a57533f72bf4df7645fb43c2d5d99f013694d5bca3d9
                        • Instruction Fuzzy Hash: 5391FFB1508315ABD710DF14C862BABB7E4EF55364F04492DE8919B390E378DD84C79A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041D90B
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041D962
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041DA21
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000010,00008000), ref: 0041DA74
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: c05590aa284f659ab1ff88a352693644d4d9c9bbbb4b0d03a98c03f22095cace
                        • Instruction ID: f12e9bd3b3976943500a4a5f30f00e633bcb2abb5d438019c33a3e3fa2868f53
                        • Opcode Fuzzy Hash: c05590aa284f659ab1ff88a352693644d4d9c9bbbb4b0d03a98c03f22095cace
                        • Instruction Fuzzy Hash: 8FD112B1A083118FE710CF18C88175BBBE1EF85754F14892EF59997390E7B8D948CB8A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00436108
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00436165
                        • NtAllocateVirtualMemory.NTDLL(000000FF,D2FF0000,00000000,?,00003000,00000040), ref: 00436226
                        • NtFreeVirtualMemory.NTDLL(000000FF,D2FF0000,00000010,00008000), ref: 0043627F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 36e699c151b95e193061f1270c83b02f5e5ee10053037986066b4e40700681da
                        • Instruction ID: 49ca7f5242dbcd3fd022b125e302c8249992bda91177800689f0051a8a520eb2
                        • Opcode Fuzzy Hash: 36e699c151b95e193061f1270c83b02f5e5ee10053037986066b4e40700681da
                        • Instruction Fuzzy Hash: 15B16575208306AFD714CF18C880A2BB7E5FF89754F158A2DF9948B3A0D778E905CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004368C8
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00436926
                        • NtAllocateVirtualMemory.NTDLL(000000FF,900000C2,00000000,?,00003000,00000040), ref: 004369EB
                        • NtFreeVirtualMemory.NTDLL(000000FF,900000C2,00000010,00008000), ref: 00436A45
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: cd884081bc9818a92c9e4489b6c376264a57f2caf2c6f68c8f954098abf983da
                        • Instruction ID: 672c033b801017c53f79d511c546924481f449b2fd683b032dd6c08182a559c1
                        • Opcode Fuzzy Hash: cd884081bc9818a92c9e4489b6c376264a57f2caf2c6f68c8f954098abf983da
                        • Instruction Fuzzy Hash: B991CBB1208311AFD314DF18C851B2BB7E5EB89714F058A2DF9A99B3D0D7B49D05CB86
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00435DE5
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00435E43
                        • NtAllocateVirtualMemory.NTDLL(000000FF,D2FF0000,00000000,?,00003000,00000040), ref: 00435F0A
                        • NtFreeVirtualMemory.NTDLL(000000FF,000000B8,00000000,00008000), ref: 00435F67
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 4a3c08387ba274aee60c5d1916ac08ad76f402cccef1bc708aadcba37f2ba750
                        • Instruction ID: bd20d81453ee42f1f4b7517343d47f95c4903e9cee43dcbda37a065a7916872a
                        • Opcode Fuzzy Hash: 4a3c08387ba274aee60c5d1916ac08ad76f402cccef1bc708aadcba37f2ba750
                        • Instruction Fuzzy Hash: B591AC712083119BD714CF18C881B2FB7E5EF89754F148A2DF9A49B3A0D779D905CB8A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00431029
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00431077
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,?,00003000,00000040), ref: 00431142
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000010,00008000), ref: 00431192
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: a928b237f57b0b17e53b70244af814c1913241562c810474d508885c7ce79cd2
                        • Instruction ID: c97853a5428db815bb4a3b326629f8a94def980331a2ce0bb860a58eabe7095b
                        • Opcode Fuzzy Hash: a928b237f57b0b17e53b70244af814c1913241562c810474d508885c7ce79cd2
                        • Instruction Fuzzy Hash: 81618AB56083019FE310CF18C841B1BB7E5FB88714F158A2DFAA49B3E0D7B4D9058B9A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004312C9
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00431319
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004313DD
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000010,00008000), ref: 00431427
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 1317986512a92aea0aef00c007c68f029f6b7b3d695bedc9aa596dc7e27db6d2
                        • Instruction ID: 6f54af3a3fb07f1279d8d25ef031b3d3afcffbe3443a1c77ef3a1e6406ca0462
                        • Opcode Fuzzy Hash: 1317986512a92aea0aef00c007c68f029f6b7b3d695bedc9aa596dc7e27db6d2
                        • Instruction Fuzzy Hash: 1D5150B52083009FE310CF18C845B1BBBE5EB89754F154A2DF5A89B3E0D7B5D905CB9A
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: )$IDAT$IEND$IHDR
                        • API String ID: 0-3181356877
                        • Opcode ID: ca540d9b534587f1f1c4cf09f415fc0d99ba53e3f9cded33c2fb97ebabd2fd25
                        • Instruction ID: 52c9ff8d80b28e55c4cceb9f7a15d076c8ed26dd8b530def0313672c4869bde4
                        • Opcode Fuzzy Hash: ca540d9b534587f1f1c4cf09f415fc0d99ba53e3f9cded33c2fb97ebabd2fd25
                        • Instruction Fuzzy Hash: A102FFB16083848BD714CF29D840B5B7BE1ABC5304F05857EEA85AB3D2D379D909CB96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,00000000,?), ref: 0041484D
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,00000000,?,?), ref: 0041487E
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: qrs
                        • API String ID: 237503144-2859022563
                        • Opcode ID: 6a2eb27cb63cb8baa3aa34835cc2b373ab2eb411cd5040f0f9ccd58027fba355
                        • Instruction ID: eda3c44ddcc75995ddaab91c4b5a5cf42fb6c5c1e63a284cc22a84cb6203eb7d
                        • Opcode Fuzzy Hash: 6a2eb27cb63cb8baa3aa34835cc2b373ab2eb411cd5040f0f9ccd58027fba355
                        • Instruction Fuzzy Hash: 6351CEB02183409FD320DF24C892BABB7F4EFC6714F409A1DE8D99B281DB749944CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00435795
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004357F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: @
                        • API String ID: 292159236-2766056989
                        • Opcode ID: 38ed3db7c2e87a1274921157910650fb39ff12a4cbf8ea07823737d1814df106
                        • Instruction ID: 6640b2f459528be8d0ed829b28907b644bf569f604b01024f8043f355826c467
                        • Opcode Fuzzy Hash: 38ed3db7c2e87a1274921157910650fb39ff12a4cbf8ea07823737d1814df106
                        • Instruction Fuzzy Hash: EB416AB60097049FD710CF14C845B1BB7E4EF89368F554A1DF9A89B3E0E3B99908CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041A926
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 0041A97C
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: 45
                        • API String ID: 292159236-2889884971
                        • Opcode ID: d22ce7d15f1133c231ec79a868faf920eebfc69913041afbbb1573a07fd066be
                        • Instruction ID: d172e4884ac4b56c25201fe419e0efd8a582d02c9bafbf27299bb1ac4db13203
                        • Opcode Fuzzy Hash: d22ce7d15f1133c231ec79a868faf920eebfc69913041afbbb1573a07fd066be
                        • Instruction Fuzzy Hash: 92512FB51193809FE324CF14C881B9BBBE5BB85708F508E1DF5A58B290C7B89849CF87
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00435CD5
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00435D27
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: @
                        • API String ID: 292159236-2766056989
                        • Opcode ID: a90ab8a0cd4daf71cf99f0cea92b0cb68cb84263e84544a18a9e6542edb803e4
                        • Instruction ID: 3fe43d9126eda68c299371970ff5079824eaf48954e339369717326f8e609661
                        • Opcode Fuzzy Hash: a90ab8a0cd4daf71cf99f0cea92b0cb68cb84263e84544a18a9e6542edb803e4
                        • Instruction Fuzzy Hash: 4B315CB51093049FE300CF14C845B5BBBE8FF89758F049A2DF9A49B3A0D3B499488B96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004359F4
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00435A53
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: $
                        • API String ID: 292159236-3993045852
                        • Opcode ID: 30ad43094ebbc4f817eefb129fcb90fb56446f4a3ca0fb091276ba7818ccea24
                        • Instruction ID: b6cd4fc5617f75307aa5fadbe52b7a1f9cf99ceb11813469de56fd7ad4c8632b
                        • Opcode Fuzzy Hash: 30ad43094ebbc4f817eefb129fcb90fb56446f4a3ca0fb091276ba7818ccea24
                        • Instruction Fuzzy Hash: 85316FB5208314AFE310CF14DC41B1BBBE8EF89764F104A2DFAA49B3D0D7B599048B96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00435B5F
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00435BB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: $
                        • API String ID: 292159236-3993045852
                        • Opcode ID: f5e773b2f091788966350e0a63bc577158c978624ae734252711e3eb6f38622d
                        • Instruction ID: 8c0168298c7295535ec8f70261b5bf10024e0362d6a3083afa8bfc7d94816d77
                        • Opcode Fuzzy Hash: f5e773b2f091788966350e0a63bc577158c978624ae734252711e3eb6f38622d
                        • Instruction Fuzzy Hash: B3318F71208301AFE310DF58CC81B5BBBE5EB89754F114A29F9A49B3E0C7B1A905CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00412460
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004124AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: E~a
                        • API String ID: 292159236-3518370834
                        • Opcode ID: 4ec0fb3348beb14298eb5bde9ead10086aa30b580c5cd0f929b09c49f456a438
                        • Instruction ID: 11d32cca0f2d967b8800cdc6045bc695aa9ecc9cc7748b148549f3881b9b6f47
                        • Opcode Fuzzy Hash: 4ec0fb3348beb14298eb5bde9ead10086aa30b580c5cd0f929b09c49f456a438
                        • Instruction Fuzzy Hash: 10313AB5200B008FD324CF24C841B97B7F5FB49305F148A2DE6A68BBA0C7B5A905DB94
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 00418EF1
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 00418F58
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: ,
                        • API String ID: 292159236-3772416878
                        • Opcode ID: 5073f53ea448efe73cfd1a5e613e150b8b0f03f3a0146396ac1f71bdd646be84
                        • Instruction ID: c39eaa0980eb77a23462792ed0638b2d9eb6cc88ce49c722e2c9ac0daceb6dad
                        • Opcode Fuzzy Hash: 5073f53ea448efe73cfd1a5e613e150b8b0f03f3a0146396ac1f71bdd646be84
                        • Instruction Fuzzy Hash: 2D314975108304AFE310CF14CC41B6BBBE9FB89754F148A1DFAA49B390D7B599448B96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041475E
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 004147A2
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: MyH
                        • API String ID: 292159236-33148060
                        • Opcode ID: 783c9c79ea28bf6b904bb3e1589747c1a0522653b3f78ca33469997ff13faa65
                        • Instruction ID: 89284e16cfb180a63f5b2f4dd5b3ad2cb6a359738ac1b9e6e4e8c1e1501f9b14
                        • Opcode Fuzzy Hash: 783c9c79ea28bf6b904bb3e1589747c1a0522653b3f78ca33469997ff13faa65
                        • Instruction Fuzzy Hash: F5317CB5901119AFDB04CF94D882BEEBBB4FB49315F140129EA22F7390D7745945CB98
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041C80C
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041C85F
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID: &C$C
                        • API String ID: 292159236-3372019179
                        • Opcode ID: a320b92534bb12aa352c3b6f978209940fae640b8343fccefaeb5386bda2c14a
                        • Instruction ID: a1b4da1b89d6a531a30288af52cc7f0f37e80405d102a15e68b7a4a03f5cf653
                        • Opcode Fuzzy Hash: a320b92534bb12aa352c3b6f978209940fae640b8343fccefaeb5386bda2c14a
                        • Instruction Fuzzy Hash: 5B216BB5200B009FE324CF24C845BA7B3E4FB46705F544A2DE6FA8B690DBB47444CB96
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,00000000,00000000,00000000,?), ref: 00413242
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,?,?,?,?,?), ref: 0041328F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID:
                        • API String ID: 237503144-0
                        • Opcode ID: 846e30466f025941176c5ed187ab03b8379f7e8a16f2f023c214fb270b272f9d
                        • Instruction ID: 370c0065ea5b4beb083f328f44a09b0753181469b918c3f1cb35a00d41c76884
                        • Opcode Fuzzy Hash: 846e30466f025941176c5ed187ab03b8379f7e8a16f2f023c214fb270b272f9d
                        • Instruction Fuzzy Hash: 66D18C75600B008FD324CF24C995BA7B7F1EF49304F148A6DD4AA8B7A1DB78E985CB94
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0$8
                        • API String ID: 0-46163386
                        • Opcode ID: 1abdc6b63e22dd11904a1ee86f960341f2f1a47027cd18bbf98a06cdafb77c06
                        • Instruction ID: 2685ed99e930a88b6a444edf578d8c7800c495bedd5273bf380fdebf249e4964
                        • Opcode Fuzzy Hash: 1abdc6b63e22dd11904a1ee86f960341f2f1a47027cd18bbf98a06cdafb77c06
                        • Instruction Fuzzy Hash: 837244716087409FD724CF28C840B9BBBE2EF84354F08892EE8899B391D779D945CF96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00419E02
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00419E64
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: c818f4acac1573eb2f55fa89ca4ef4672e9b9d69f08bd813ffd7a28c305afde6
                        • Instruction ID: ef2dd0e930401fa5a73100609a87089f9c83a23e717f8076bb724ae4ec2485e9
                        • Opcode Fuzzy Hash: c818f4acac1573eb2f55fa89ca4ef4672e9b9d69f08bd813ffd7a28c305afde6
                        • Instruction Fuzzy Hash: 6C61C075A09201CFE318CF18E851BAAB3E5FB88314F15867DE9A9873A0C731E951CB45
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e34805080d53ba31cd0dafb1168a335e08e1931c73bed86b3dde03d7fa16ec1c
                        • Instruction ID: f67b520d0fb51807c1141d65a7a6df99394b1f85f9b6efa1675f3c862845f7e4
                        • Opcode Fuzzy Hash: e34805080d53ba31cd0dafb1168a335e08e1931c73bed86b3dde03d7fa16ec1c
                        • Instruction Fuzzy Hash: 33618F30109B909FD322CF38C950BA3BBE1BF46304F58499ED5E6CB2D2DB696419CB54
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004315A2
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 004315F5
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 3739636bdda2710c77407f792419aaf8df7373abf80077719d8cd839f7acb28d
                        • Instruction ID: 373573dada1b8fec116a7e944fa744d7db8ffbdfa9a01e3b745a84476fd8f0fc
                        • Opcode Fuzzy Hash: 3739636bdda2710c77407f792419aaf8df7373abf80077719d8cd839f7acb28d
                        • Instruction Fuzzy Hash: 95316FB1109301AFE304CF04C884B5BBBE4FB89358F144A2DF5A987390D7B5D909CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004358B5
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 0043590D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 47544bb659c4cfd43654f101cfe8d4759f23581a17b4450c7eb10cfe68b3c5ff
                        • Instruction ID: 39c264756e49c1a15df50a2ec3f4bfee241a058cc953e55265a8f82379b9cd45
                        • Opcode Fuzzy Hash: 47544bb659c4cfd43654f101cfe8d4759f23581a17b4450c7eb10cfe68b3c5ff
                        • Instruction Fuzzy Hash: B2318FB5108315AFE710CF14D845B5FB7E8EB89724F00862DF9A4973D0D7B49A08CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,000000B8,00003000,00000040), ref: 00416561
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004165CE
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: aa6079a2d465fcca66b080a542ad6d32fd647b3d6439b3602048b88abe4e3342
                        • Instruction ID: 662979595e1f8448e9bc717329ca2773543966924be9934eb7ee8aa9e4973668
                        • Opcode Fuzzy Hash: aa6079a2d465fcca66b080a542ad6d32fd647b3d6439b3602048b88abe4e3342
                        • Instruction Fuzzy Hash: 7B319EB52083409FE320CF14C845B9BB7E5BBC8314F104A2DE6A99B3D0CBB4D909CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004128BC
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00412926
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: a2c0668474d3c721ace4716a2093cf44091f707ee633c9640d5b9477d6de5c45
                        • Instruction ID: 89ad83917c57849a99ccee8b3a6a282fdf18feef20c8f14891511dd553be9e7c
                        • Opcode Fuzzy Hash: a2c0668474d3c721ace4716a2093cf44091f707ee633c9640d5b9477d6de5c45
                        • Instruction Fuzzy Hash: 71318D752407019FE324CF28C841BA773F5EB85314F248A2DE6B697BD0DBB5A805CB94
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004317D5
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 0043181F
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: c22cad9922336621611a5ba96424e7c162cdbfab6079ca7b48d45348b6a5d34d
                        • Instruction ID: 2c3b7f65c9778523a6217a447f64df0a55ff9242bb1c7e90e8322349b2f22bc1
                        • Opcode Fuzzy Hash: c22cad9922336621611a5ba96424e7c162cdbfab6079ca7b48d45348b6a5d34d
                        • Instruction Fuzzy Hash: 5531C3752043049FE314DF04C845B1FB7E8EB85754F199A2DF9A48B3E0C7B98849CB9A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041C68E
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041C6DC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 95b4433346de604a57decd086e46d7ea66cc79d2f21a47821e9884c1906957b7
                        • Instruction ID: 5004e03b200649e865742a75115f279f857f3c9b49231f41bfc5bfaa4fcfa137
                        • Opcode Fuzzy Hash: 95b4433346de604a57decd086e46d7ea66cc79d2f21a47821e9884c1906957b7
                        • Instruction Fuzzy Hash: 7B3106B5201B108FD324CF28C985B56B7F5FB48714F508A2DE6AA87B90D775B805CB54
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 0041EE44
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 0041EE93
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 40a6e9a88eff1cf3dced5062257cdb4bcc8a8ab64e59868662a6492c10e729d3
                        • Instruction ID: bc97ef5a6b9aba287739b4455e37505b36f581c285794e946224220d9b43c55b
                        • Opcode Fuzzy Hash: 40a6e9a88eff1cf3dced5062257cdb4bcc8a8ab64e59868662a6492c10e729d3
                        • Instruction Fuzzy Hash: 052126B5101B008FE324CF15C845B57B7F5FB49705F104A2DE9A687BA0C7B4B908CB98
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00414DAC
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 00414E03
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 827742012b53ffb956235984f13c0178477c2ebd437e590f19bd19c6f341695e
                        • Instruction ID: e21d31337b195916cbb3e7d6e06b2d062e57eb2767732df694966801d4ad23bf
                        • Opcode Fuzzy Hash: 827742012b53ffb956235984f13c0178477c2ebd437e590f19bd19c6f341695e
                        • Instruction Fuzzy Hash: 6F3186B1108345AFD750CF04C881BABBBE5FB88714F505A2DFAA5872A0D774D844CB5A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004173AC
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 004173F6
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 48f30e354db75d0fa2dcb1ac3f84d331473e3a9368c37d07d5c1377ccd77e318
                        • Instruction ID: c9c7b957e64fe2e7d63f6ecf1f4768f9f08e564ed570af856d7a03f108a46801
                        • Opcode Fuzzy Hash: 48f30e354db75d0fa2dcb1ac3f84d331473e3a9368c37d07d5c1377ccd77e318
                        • Instruction Fuzzy Hash: 1A318CB51083459FD314CF18C881B6BB7E5FB89309F144A2DFAA5973A0C7B5E905CB4A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 004154D9
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 0041552D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 00065bc885ccb2301342028d2e1d2da75b2b2aa27fbf5402ff18a715aa299922
                        • Instruction ID: 278507a08f5af3b181118b873276c577df7c409526f840b0eed888fd091c052b
                        • Opcode Fuzzy Hash: 00065bc885ccb2301342028d2e1d2da75b2b2aa27fbf5402ff18a715aa299922
                        • Instruction Fuzzy Hash: DF3189B2219340AFD314CF18C881B6BB7E4AB89718F545A2CF6A5DB3A0D774D804CB4A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004316A5
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 004316EB
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: de3270cfd8f4fa526337b5d4f90f01e957131db555acf8c6aea374fdb7c32536
                        • Instruction ID: c35680033795f098efc5421160bde45de33c357b61e38b53ffe78f44d28b410c
                        • Opcode Fuzzy Hash: de3270cfd8f4fa526337b5d4f90f01e957131db555acf8c6aea374fdb7c32536
                        • Instruction Fuzzy Hash: 5621F1B51083059FE310CF44C845B1BBBE8EB84704F14892DF9A48B3E0C7B59908CB96
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,000000B8,00003000,00000040), ref: 0041682A
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,00000000,00008000), ref: 00416882
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: ccc271ce4834fb6ab81506d54b6ebbb012f350948a4cdc6b0f5bccc42e909f27
                        • Instruction ID: 720153c1f65c8f26b5d20917e99fe5eefd48c24c676ba47020318df60b0e615c
                        • Opcode Fuzzy Hash: ccc271ce4834fb6ab81506d54b6ebbb012f350948a4cdc6b0f5bccc42e909f27
                        • Instruction Fuzzy Hash: E5218EB52183408FE324CF14C841BAFB7E8FB89305F104A2DE6A997391C7749909CB9A
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 0042F281
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 0042F2DA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 18e8c0dd9ebe68ac0df007a971596653b35d8e4150956291f8ca6074491937a4
                        • Instruction ID: cd220f0b313901de8ba89210f0484f636b3935d8fc13056dc4fe951aea46baac
                        • Opcode Fuzzy Hash: 18e8c0dd9ebe68ac0df007a971596653b35d8e4150956291f8ca6074491937a4
                        • Instruction Fuzzy Hash: 5F218DB5208310AFD300CF44D840B1FBBF8EB86754F108A2DFAA497390D7769908CBA6
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00417D03
                        • NtFreeVirtualMemory.NTDLL(000000FF,00000000,00000000,00008000), ref: 00417D46
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: c31a6071f5fd7f96317114b26a8910f1a884ffd4622189ef5279387d2d96cc47
                        • Instruction ID: 3db4b3e1d00fd50a9bc169d524c4fee68065df46d58180670e460394c7cd3ea8
                        • Opcode Fuzzy Hash: c31a6071f5fd7f96317114b26a8910f1a884ffd4622189ef5279387d2d96cc47
                        • Instruction Fuzzy Hash: F3318CB5A1021A8FDB04CF98C885BEEB7B4FB09715F144228E521F73D0D7759A04CBA8
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,?,00000000,00000010,00003000,00000040), ref: 004318E5
                        • NtFreeVirtualMemory.NTDLL(000000FF,0000BA00,00000000,00008000), ref: 0043193A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 32b84dfc94bb73d8406914cca6e252c7cae1e96feb907231bc762d0ea80a401c
                        • Instruction ID: 6b126e7e0ce0632770a5d6b7a5534b564c0ae88b5910b704f1aeaa45c0594127
                        • Opcode Fuzzy Hash: 32b84dfc94bb73d8406914cca6e252c7cae1e96feb907231bc762d0ea80a401c
                        • Instruction Fuzzy Hash: BB21BDB1108304AFD310CF04C840B5BBBE8EB89754F108A2DFAA5873A0D7B59908CBA6
                        APIs
                        • NtAllocateVirtualMemory.NTDLL(000000FF,00000000,00000000,00000010,00003000,00000040), ref: 00415AE5
                        • NtFreeVirtualMemory.NTDLL(000000FF,?,?,00008000), ref: 00415B39
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: MemoryVirtual$AllocateFree
                        • String ID:
                        • API String ID: 292159236-0
                        • Opcode ID: 1a5af60e32216ef9f3611fc47d51c7df91418815ac4bd59391b9ca0a8d076c36
                        • Instruction ID: 54d6ea0e2f743d7e5857fbe281753a3b1fccb42ff69e2b202ed6251b16fdd3c7
                        • Opcode Fuzzy Hash: 1a5af60e32216ef9f3611fc47d51c7df91418815ac4bd59391b9ca0a8d076c36
                        • Instruction Fuzzy Hash: 0D314AB5208340AFD364CF04C885B5BB7E4FB85354F505A2DF9A5973A0CB749904CB4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: Tzrp$p}w/
                        • API String ID: 0-1275741564
                        • Opcode ID: 77a4f5eb5d99b2075c0fd27f64357495d895f34beae2b97a9c96fb5bd27607c3
                        • Instruction ID: 8516eb65667c1b9dfb56d3a02e1b180b79a41715407cea7974276e7dc11585d9
                        • Opcode Fuzzy Hash: 77a4f5eb5d99b2075c0fd27f64357495d895f34beae2b97a9c96fb5bd27607c3
                        • Instruction Fuzzy Hash: 8D227D70204B908AE725CF34C494BE3BBE1BB66304F48899DD0FB8B293DB796509CB55
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: U;Gy
                        • API String ID: 0-1665677991
                        • Opcode ID: f1806364249207e65d897304ebc93d72f4f27ce44e147a4eade0884c6cd842c7
                        • Instruction ID: d7258c4eb2ce83d0554d98002dc95a6a6c56b53b7fbc30ec147fd3360628309c
                        • Opcode Fuzzy Hash: f1806364249207e65d897304ebc93d72f4f27ce44e147a4eade0884c6cd842c7
                        • Instruction Fuzzy Hash: 9E524A70204B508AE765CF35C0A87A3BBF1BF16309F54895DD0EA8B382D77DA509CB55
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: /
                        • API String ID: 0-2043925204
                        • Opcode ID: 99366c02946542bc186517ed4eb94a5d48fb1a995c784a48a55d23fe09246eb2
                        • Instruction ID: e8deeecb93aaaa9436bc7c50b48a70d822c30eb13d0cfe0281f96441dd7ece4e
                        • Opcode Fuzzy Hash: 99366c02946542bc186517ed4eb94a5d48fb1a995c784a48a55d23fe09246eb2
                        • Instruction Fuzzy Hash: B012177140C3919BDB158E28C4913AB7FD29B92350F18897FE8D5AB3F2C23D8945D78A
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: TaH
                        • API String ID: 0-2417347642
                        • Opcode ID: 5b86973df1b486412a4365bf3400b10059a3f8f486096a1b63d5135ce53ae8d2
                        • Instruction ID: 5ce74c19dc13c8cfc29d1aee17a1f79b46338ffae588c98281eaa3d84f2bb6eb
                        • Opcode Fuzzy Hash: 5b86973df1b486412a4365bf3400b10059a3f8f486096a1b63d5135ce53ae8d2
                        • Instruction Fuzzy Hash: 0DE18AB0504B419FD320CF28C481B52BBE2BF59314F148B6ED4AA4BB92E739F44ACB54
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: b
                        • API String ID: 0-1908338681
                        • Opcode ID: 9290a50bccac568a856e3de76278488ef3e7846cef2d07d93656f66f302889d6
                        • Instruction ID: e4165f24884359248b5001b375dd16af44f0695ac9c5d8c6eb7107912fba4887
                        • Opcode Fuzzy Hash: 9290a50bccac568a856e3de76278488ef3e7846cef2d07d93656f66f302889d6
                        • Instruction Fuzzy Hash: 43416CB01007018BE718CF24C5A4757BBF2BF46308F08C45CD89A4BB86D7B9E819CB95
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID: $WH
                        • API String ID: 0-1308112159
                        • Opcode ID: ff07fafbcb64e4dbec8ee2fb06162ccc5008aea93c71416dfb0cf98052e2f64c
                        • Instruction ID: eaba2cd65facd31915807d51d36ca71fc7796c6bfe25c2e706542fcbc80e4904
                        • Opcode Fuzzy Hash: ff07fafbcb64e4dbec8ee2fb06162ccc5008aea93c71416dfb0cf98052e2f64c
                        • Instruction Fuzzy Hash: E4B0922CE480018B860CCF14D850479B23EBF973D8B6AB12AC10223636C2209456C90C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 31971f4d6380977fc7eac421c415a41e0d26190d4cf17307f1ba65e36c26d59a
                        • Instruction ID: 07a6c18f929ec054ab611a65b22034f4389f06a7d378097b8cbb4029302e576e
                        • Opcode Fuzzy Hash: 31971f4d6380977fc7eac421c415a41e0d26190d4cf17307f1ba65e36c26d59a
                        • Instruction Fuzzy Hash: B552C2315087128BC725DF18D58067AB3E1FFC4314F198A3ED9C6A7385EB39A855CB8A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7baeec879a51715a6fb99e628e73fbdf4d86138da3628f47ca06570b7d25ff8d
                        • Instruction ID: d3d596e64fe5aaf16f46270e1ca1f40214ef4a0f5035b6d547cca3ddadfacf55
                        • Opcode Fuzzy Hash: 7baeec879a51715a6fb99e628e73fbdf4d86138da3628f47ca06570b7d25ff8d
                        • Instruction Fuzzy Hash: D7529A71608B418FC325CF29C08066BFBE5BF89305F148A6EE4DA97792D738EA45CB45
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4674853348b518fe51280cf43b98534ea95c916aa7cf61aaa94c4cf91fed02c0
                        • Instruction ID: 48324f430adcb02a9f072f594d160767e89fef8af2c9d0d2100ae14cf2c622d5
                        • Opcode Fuzzy Hash: 4674853348b518fe51280cf43b98534ea95c916aa7cf61aaa94c4cf91fed02c0
                        • Instruction Fuzzy Hash: A8426AB0614B518FC368CF28C58056ABBF1FF95310B608A2ED6979BB90D739F945CB18
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 076beb7752143696acc8b69a1040e0566f21b35b270ddcacdee470e0fee06f8b
                        • Instruction ID: 055bf2327ea2b70be3f427664b7a337a7c6c5f626e3e754f07ce211969309af7
                        • Opcode Fuzzy Hash: 076beb7752143696acc8b69a1040e0566f21b35b270ddcacdee470e0fee06f8b
                        • Instruction Fuzzy Hash: E802C635608350CFCB14CF19C88075BBBE6AFC9304F09846EE8899B396DB79D815CB96
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cf9318731ec8ac89eb675802e40718612ac6da8c029f92f1e99a2ec412a01679
                        • Instruction ID: 04c4832ac7164a43c352fe0f779f7a12e3d0e6ce0dc6103c7448c57aa41f2777
                        • Opcode Fuzzy Hash: cf9318731ec8ac89eb675802e40718612ac6da8c029f92f1e99a2ec412a01679
                        • Instruction Fuzzy Hash: 8CD1E270204B518BD3358F39D1943A3BBE2BF96304F588A5ED0EB8B386DB79A505CB54
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f0f2cc26890daa8189b96b810b99e95a5ba0b27fccc0beac7a0023a9e4fb69db
                        • Instruction ID: 45962eb2decec1df715c021f7369d0b0b973fd81592691187958a152977faf35
                        • Opcode Fuzzy Hash: f0f2cc26890daa8189b96b810b99e95a5ba0b27fccc0beac7a0023a9e4fb69db
                        • Instruction Fuzzy Hash: 3ED1EF71108B408FD729CF25C0A13A2BBE2FF56311B194A5ED4D74BB95D339E986CB88
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bb0564d9bcdf403d2e4839fd4c5ad673e14c5f1acf4c73d570165f63ae789460
                        • Instruction ID: 6d9c8b9e748fcdea59a7b4f8d2797e5869a8a1c6b3449739a300939d64184ef7
                        • Opcode Fuzzy Hash: bb0564d9bcdf403d2e4839fd4c5ad673e14c5f1acf4c73d570165f63ae789460
                        • Instruction Fuzzy Hash: 70516CB16087548FE314DF29D89475BBBE1BBC4318F444A3EE4E987351E379DA088B86
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: deb9e88ca9c4e1293fa784d621018e3444c1b9758284c9722dab37a4fea8c74a
                        • Instruction ID: 1caa6a703d54519c89b5f4bfa3d8a5df902c3299b38047a4515c147995bcaaf8
                        • Opcode Fuzzy Hash: deb9e88ca9c4e1293fa784d621018e3444c1b9758284c9722dab37a4fea8c74a
                        • Instruction Fuzzy Hash: 7A515CB0900B008FD728DF29D95AB137BE5EB09314F11875CE9A68B7A2D374E444CBCA
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fae3cdc1a8909d95e7fbba672c885f52d80703272f9501adc06347a69e68e35e
                        • Instruction ID: 30e6442998a3a44d6722a720f2c651c78d2dfb7d97cc19c6a14db8ee58dfab70
                        • Opcode Fuzzy Hash: fae3cdc1a8909d95e7fbba672c885f52d80703272f9501adc06347a69e68e35e
                        • Instruction Fuzzy Hash: EC41F9B22083504FE3189A3AC4A037ABBD2AFC9710F09863EF1E9873D1D6788549E755
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 513684c1d86cb7e4d0c8697cb68479c75be5aaeb68b1b23c6aced5c0a04259ea
                        • Instruction ID: 6629a41a025456f28dff0c440210363fa9ba3e205cfdaddc4f48fa14fcb1afb0
                        • Opcode Fuzzy Hash: 513684c1d86cb7e4d0c8697cb68479c75be5aaeb68b1b23c6aced5c0a04259ea
                        • Instruction Fuzzy Hash: 764168BA5142508BD750DF28ECD1A623BB0FF59324B04A53AF845EB3E1E338A980C75D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4b004cb2c4a6f1d0dc45651f8ac36cf1f05fa46ffd5eca07fb521ef7a88d7007
                        • Instruction ID: 800d309dfbe3b792a961d651a3af81d9cdc07eef777c172838c488bd3b971425
                        • Opcode Fuzzy Hash: 4b004cb2c4a6f1d0dc45651f8ac36cf1f05fa46ffd5eca07fb521ef7a88d7007
                        • Instruction Fuzzy Hash: F72145717181B207D360CA398CC452777A3DBC721272D92B7DBC0D33D6C17AD806A298
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 64a0d51ecdb21380397ce5b78989964821fb794bc37cc94022c655011b96d591
                        • Instruction ID: f376e0825e94ea2331c21c8896b3eb8f9b489db03b714074c4014fd88a4b0a01
                        • Opcode Fuzzy Hash: 64a0d51ecdb21380397ce5b78989964821fb794bc37cc94022c655011b96d591
                        • Instruction Fuzzy Hash: 40016D2280CB9C0AD3196970A8B1377BA965B8B294F09361EE5F95B1D2F51AD50446C8
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                        • Instruction ID: 8eaa9216552694f0a6efe99b3112ae4451f792994acd44972f5a6118374a637e
                        • Opcode Fuzzy Hash: 3e517b76c81f2f0a6076fdce7dc782eea2d3cbf91ba42ade49569ad1c1c074a0
                        • Instruction Fuzzy Hash: 0B118A33F051E40EC3158D3C94005657FA34AD3635B69439AE4F8972D6D5268D8A8359
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 75dfa9a4884457dce4fc74b6033b7ce61d9fcfdd3f68719420741ff4c2a8110b
                        • Instruction ID: 519d7a56c6b56333256d6c0668fc1d6874d7a947a6a0dc52ff8748bdd24eaad6
                        • Opcode Fuzzy Hash: 75dfa9a4884457dce4fc74b6033b7ce61d9fcfdd3f68719420741ff4c2a8110b
                        • Instruction Fuzzy Hash: 1F217270104BD08FD3668B28D8A07A7BBF0BF12306F4959AED0E7CB292D7286409CF14
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: Object$MetricsSelectSystem$Delete
                        • String ID:
                        • API String ID: 3299334569-0
                        • Opcode ID: b2e239ff4e3ec89c166cf7a9e3997b749561d0047b92aaea6031bf0e23876ed0
                        • Instruction ID: cce2ada2153569562c322a6337db7c046403c085858744b693d3a4ce488df618
                        • Opcode Fuzzy Hash: b2e239ff4e3ec89c166cf7a9e3997b749561d0047b92aaea6031bf0e23876ed0
                        • Instruction Fuzzy Hash: 65216AB16007408BEB15CF14C9D1B52B7F2AF46308F08886DD89A9B796DB78E905CB55
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 27d2b1cd7c574ec602404e23193f01f8c5e8e3fc1f893b6c7767cbb7704c00b1
                        • Instruction ID: 75f145016c671befc23404dbc861ed4879f85f32f666120485f73330d3d1790d
                        • Opcode Fuzzy Hash: 27d2b1cd7c574ec602404e23193f01f8c5e8e3fc1f893b6c7767cbb7704c00b1
                        • Instruction Fuzzy Hash: 8D113674201B029BD7148F21CA64B27F7F6EF82704F14891DC45A5BB81C779F925CB88
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9f7d422ba1a35d639b328539018ae243784b3c1143205dac9b9662b4e469a832
                        • Instruction ID: b0bfe5d4de48fd99e7331d5f2a247961e7baddaa943f96647ce36a32244f5977
                        • Opcode Fuzzy Hash: 9f7d422ba1a35d639b328539018ae243784b3c1143205dac9b9662b4e469a832
                        • Instruction Fuzzy Hash: CB11F5B5508344AFC740DF24E48089FBBF1FB99358F84692DF889A7251D330D9918F4A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 408c5df8bd425de925e479bc886196f4af41ff4cc65f312a68bee035edc5c1ec
                        • Instruction ID: a84d78f813fee3adda7330d1a6ca53cd61c13742b07c7bc7353681767fb2d639
                        • Opcode Fuzzy Hash: 408c5df8bd425de925e479bc886196f4af41ff4cc65f312a68bee035edc5c1ec
                        • Instruction Fuzzy Hash: 28F05E35A193118BC749CF19D55063AFBF0AF86741F99586EF485D3340CB30DD059B4A
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8818c2abf4ecc78f630fb9ea865fa7607d9193dbbcc83948b867971efb1357db
                        • Instruction ID: ce485ebb93233df4bc7e8e3288d243df8de408af998be4bf21e4d091bf36e330
                        • Opcode Fuzzy Hash: 8818c2abf4ecc78f630fb9ea865fa7607d9193dbbcc83948b867971efb1357db
                        • Instruction Fuzzy Hash: DEF0547011D3C18FD316DF28C8146877BF1BB86304F54485ED485CB252C7B55908DB56
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2044051f06bb029c9e823812dcc2e061d3b89e47936c5c72b85e7b0847b4fd87
                        • Instruction ID: 21b4a5b2d36639708a878ae6fdf5a4c74f651265d5738b3eb8c98cd9134a9d8a
                        • Opcode Fuzzy Hash: 2044051f06bb029c9e823812dcc2e061d3b89e47936c5c72b85e7b0847b4fd87
                        • Instruction Fuzzy Hash: 24D09770A083B00E87084D380460433FBE4E847212F0810AFF0C2F7284C634DC0452AC
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 25bc749fd17f88683fa8adf8193934d49525026852037a895d3829fff585e429
                        • Instruction ID: df5b7e2b569f04db5f49db89617276ba6c7beaeda75e14a5596dd023a1867cdf
                        • Opcode Fuzzy Hash: 25bc749fd17f88683fa8adf8193934d49525026852037a895d3829fff585e429
                        • Instruction Fuzzy Hash: E0D0C921B680148B871C8F20DC20A7A72B6E7CEB04755643C8A03AB655DB2499168B8C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dd689b4edf37a42a43b3fcc9b7e28963ac80fa34631fe5fcf31d13711efd50c6
                        • Instruction ID: 9168cea3e2b344ec0e9888c1e6194936020cc1656f860627784ca2e01d039111
                        • Opcode Fuzzy Hash: dd689b4edf37a42a43b3fcc9b7e28963ac80fa34631fe5fcf31d13711efd50c6
                        • Instruction Fuzzy Hash: E1C08C21D500009BC105CF29BC4283273319B07208F00303CA893F3291EE54D41CCC0D
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 840822eb54daab1c8820f1ca977bb3fa982d50878fd3a026cbfd78508b2a16c8
                        • Instruction ID: 54e6d1c3f3ba8806ee637ffe0cef45773103c76bb334e75210dbb34c4d509c28
                        • Opcode Fuzzy Hash: 840822eb54daab1c8820f1ca977bb3fa982d50878fd3a026cbfd78508b2a16c8
                        • Instruction Fuzzy Hash: 8EC08C34E1820087C34CCF04C880737B7B6EBCE304F107028DA021B312C320E8418A4C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 043d0fd37857779313936d78f70a5c40b06c8ed69d29ab11f6ab6b6594349452
                        • Instruction ID: 3a12948dfbdfd68152cfbea5bb627fc3546c02fb5bd934d1994e8a45fb63d81d
                        • Opcode Fuzzy Hash: 043d0fd37857779313936d78f70a5c40b06c8ed69d29ab11f6ab6b6594349452
                        • Instruction Fuzzy Hash: F0C09B34F540404B860CCE10EC91575F377D357215714B435DA16D3755C734D4018D4C
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1fb68f65190db135316a592940d69e2b01eaba8ed0c9d8953160d9140597cd99
                        • Instruction ID: 777a6fc16b50d7c3721b87b258d1e782cde24941737e10d385237bf121344f5f
                        • Opcode Fuzzy Hash: 1fb68f65190db135316a592940d69e2b01eaba8ed0c9d8953160d9140597cd99
                        • Instruction Fuzzy Hash: E2B09238A890008B864DCF24EA51430A378DB17209B44343AB902F3262C564E402891C
                        APIs
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,00000000,?), ref: 0041AECE
                        • RtlExpandEnvironmentStrings.NTDLL(00000000,00000000,0000001E,00000000,?,?), ref: 0041AEFD
                        Strings
                        Memory Dump Source
                        • Source File: 00000003.00000002.1651401322.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings
                        • String ID: Me+c
                        • API String ID: 237503144-2767035324
                        • Opcode ID: 63d4f08bbabbfdf3902aec2507fb5a840303fa89a4d933df12fc30f75bda29b6
                        • Instruction ID: a13543ed3ffbf71520c79c386d50d5a7626435ce53941ad9e5994be13f31298b
                        • Opcode Fuzzy Hash: 63d4f08bbabbfdf3902aec2507fb5a840303fa89a4d933df12fc30f75bda29b6
                        • Instruction Fuzzy Hash: C25140B0109341AFD314CF14D880B9BBBE6EBC6354F108A2DF8A91B295D774E9458B96