Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_35.exe

Overview

General Information

Sample name:LisectAVT_2403002A_35.exe
Analysis ID:1482318
MD5:292b38ef1365ee19ef46925535305891
SHA1:4e7d964212b15097bc867935dae6ab71b72ec6fc
SHA256:81794c637b54a673f7e5af3f1f0aeb3479e9279b6870c07caa0a380ea7ad1dce
Tags:DarkTortillaexe
Infos:

Detection

AgentTesla, DarkTortilla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected DarkTortilla Crypter
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to launch a process as a different user
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_35.exe (PID: 7756 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_35.exe" MD5: 292B38EF1365EE19EF46925535305891)
    • RegAsm.exe (PID: 756 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
DarkTortillaDarkTortilla is a complex and highly configurable .NET-based crypter that has possibly been active since at least August 2015. It typically delivers popular information stealers and remote access trojans (RATs) such as AgentTesla, AsyncRat, NanoCore, and RedLine. While it appears to primarily deliver commodity malware, Secureworks Counter Threat Unit (CTU) researchers identified DarkTortilla samples delivering targeted payloads such as Cobalt Strike and Metasploit. It can also deliver "addon packages" such as additional malicious payloads, benign decoy documents, and executables. It features robust anti-analysis and anti-tamper controls that can make detection, analysis, and eradication challenging.From January 2021 through May 2022, an average of 93 unique DarkTortilla samples per week were uploaded to the VirusTotal analysis service. Code similarities suggest possible links between DarkTortilla and other malware: a crypter operated by the RATs Crew threat group, which was active between 2008 and 2012, and the Gameloader malware that emerged in 2021.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.darktortilla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.rusticpensiune.ro", "Username": "FTPAdmin@rusticpensiune.ro", "Password": "99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.2112490398.0000000002901000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
        00000000.00000002.2122076409.00000000053C0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
          00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 14 entries
              SourceRuleDescriptionAuthorStrings
              0.2.LisectAVT_2403002A_35.exe.3b219f0.0.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                0.2.LisectAVT_2403002A_35.exe.3b219f0.0.raw.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                  0.2.LisectAVT_2403002A_35.exe.53c0000.6.raw.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                    0.2.LisectAVT_2403002A_35.exe.53c0000.6.unpackJoeSecurity_DarkTortillaYara detected DarkTortilla CrypterJoe Security
                      0.2.LisectAVT_2403002A_35.exe.3944642.5.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                        Click to see the 45 entries
                        No Sigma rule has matched
                        No Snort rule has matched
                        Timestamp:2024-07-25T21:18:24.137078+0200
                        SID:2855542
                        Source Port:62221
                        Destination Port:54603
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T21:17:54.682331+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:62219
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T21:17:27.394284+0200
                        SID:2022930
                        Source Port:443
                        Destination Port:49711
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T21:18:23.528932+0200
                        SID:2029927
                        Source Port:62220
                        Destination Port:21
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-07-25T21:18:24.143987+0200
                        SID:2855542
                        Source Port:62221
                        Destination Port:54603
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: LisectAVT_2403002A_35.exeAvira: detected
                        Source: LisectAVT_2403002A_35.exe.7756.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.rusticpensiune.ro", "Username": "FTPAdmin@rusticpensiune.ro", "Password": "99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt"}
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: LisectAVT_2403002A_35.exeJoe Sandbox ML: detected
                        Source: LisectAVT_2403002A_35.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: LisectAVT_2403002A_35.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: global trafficTCP traffic: 192.168.2.8:62221 -> 185.146.87.128:54603
                        Source: Joe Sandbox ViewIP Address: 185.146.87.128 185.146.87.128
                        Source: Joe Sandbox ViewASN Name: GTSCEGTSCentralEuropeAntelGermanyCZ GTSCEGTSCentralEuropeAntelGermanyCZ
                        Source: unknownFTP traffic detected: 185.146.87.128:21 -> 192.168.2.8:62220 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficDNS traffic detected: DNS query: ftp.rusticpensiune.ro
                        Source: LisectAVT_2403002A_35.exeString found in binary or memory: http://api.radioreference.com/soap2
                        Source: RegAsm.exe, 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.2660172800.00000000030AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.rusticpensiune.ro
                        Source: RegAsm.exe, 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: LisectAVT_2403002A_35.exeString found in binary or memory: http://www.radioreference.com/apps/register/
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, 8AYyiOU7.cs.Net Code: _7y2ZauGs
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, 8AYyiOU7.cs.Net Code: _7y2ZauGs
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, 8AYyiOU7.cs.Net Code: _7y2ZauGs
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, 8AYyiOU7.cs.Net Code: _7y2ZauGs
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, 8AYyiOU7.cs.Net Code: _7y2ZauGs

                        System Summary

                        barindex
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_02779BA8 CreateProcessAsUserW,0_2_02779BA8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_00E679780_2_00E67978
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_00E69CD80_2_00E69CD8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0277A2480_2_0277A248
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_02774AFB0_2_02774AFB
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027740480_2_02774048
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027728E00_2_027728E0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027732100_2_02773210
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027732000_2_02773200
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027783780_2_02778378
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_02772B780_2_02772B78
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_02777BB90_2_02777BB9
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0277E3900_2_0277E390
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_02772B800_2_02772B80
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027738780_2_02773878
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027738690_2_02773869
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027700400_2_02770040
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027740380_2_02774038
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027700070_2_02770007
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027768000_2_02776800
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027728D00_2_027728D0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027779C00_2_027779C0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027779B10_2_027779B1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0277EE100_2_0277EE10
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027767F00_2_027767F0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_027767980_2_02776798
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05A410AC0_2_05A410AC
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05A4ADFC0_2_05A4ADFC
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05A4CD200_2_05A4CD20
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05A4CD100_2_05A4CD10
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CD22B80_2_05CD22B8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CDD1FB0_2_05CDD1FB
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CDD2000_2_05CDD200
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE24880_2_05CE2488
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE24830_2_05CE2483
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEC3B00_2_05CEC3B0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_072F1C680_2_072F1C68
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730AF690_2_0730AF69
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730B9380_2_0730B938
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_07308C310_2_07308C31
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730A8400_2_0730A840
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730C8480_2_0730C848
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730EFB30_2_0730EFB3
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730EB900_2_0730EB90
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730EB800_2_0730EB80
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730D6F00_2_0730D6F0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730D6E00_2_0730D6E0
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730E2E80_2_0730E2E8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730E2D80_2_0730E2D8
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730E9580_2_0730E958
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730E95C0_2_0730E95C
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730B1800_2_0730B180
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730E5DB0_2_0730E5DB
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_07309C000_2_07309C00
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_073000070_2_07300007
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730C80D0_2_0730C80D
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730A80F0_2_0730A80F
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_073000400_2_07300040
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_0730CC880_2_0730CC88
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_072F1C4F0_2_072F1C4F
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_054D94006_2_054D9400
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_054DD0606_2_054DD060
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_054D3E406_2_054D3E40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_054D9BB06_2_054D9BB0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_054D4A586_2_054D4A58
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_054D41886_2_054D4188
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064156D86_2_064156D8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06413F406_2_06413F40
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0641DC206_2_0641DC20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_0641BCF06_2_0641BCF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06412AF06_2_06412AF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06418B806_2_06418B80
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064100406_2_06410040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_06414FF86_2_06414FF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 6_2_064132406_2_06413240
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2125558779.0000000007560000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameRP8SH.dll, vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename9f5f3d95-0f9a-4fca-99d3-94ce8fa4a2b9.exe4 vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMiPro.dll, vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000000.1408033059.0000000000166000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameONUMUJURUEKELE240322.exeP vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename9f5f3d95-0f9a-4fca-99d3-94ce8fa4a2b9.exe4 vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2122076409.00000000053C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMiPro.dll, vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2111675749.0000000000B2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exeBinary or memory string: OriginalFilenameONUMUJURUEKELE240322.exeP vs LisectAVT_2403002A_35.exe
                        Source: LisectAVT_2403002A_35.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                        Source: LisectAVT_2403002A_35.exe, Fb7r9.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, pedwBeAo9.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, Mi6W.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, s0nDliRGT.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, UGDeyt2ww1.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, xpue.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, u4JW9.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, EBT4fOCjU.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, EBT4fOCjU.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, EBT4fOCjU.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, EBT4fOCjU.csCryptographic APIs: 'TransformFinalBlock'
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\LisectAVT_2403002A_35.exe.logJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                        Source: LisectAVT_2403002A_35.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: LisectAVT_2403002A_35.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_35.exe "C:\Users\user\Desktop\LisectAVT_2403002A_35.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                        Source: LisectAVT_2403002A_35.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: LisectAVT_2403002A_35.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: LisectAVT_2403002A_35.exeStatic file information: File size 1062923 > 1048576
                        Source: LisectAVT_2403002A_35.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x102e00
                        Source: LisectAVT_2403002A_35.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                        Data Obfuscation

                        barindex
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3b219f0.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3b219f0.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.53c0000.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.53c0000.6.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.2112490398.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2122076409.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTR
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Zi62.cs.Net Code: NewLateBinding.LateCall(frmkolix, (Type)null, "InvokeAsync", obj, (string[])null, (Type[])null, array2 = new bool[4] { false, false, true, true }, true)
                        Source: LisectAVT_2403002A_35.exe, Eg0b.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "invoke", new object[2]{null,new object[0]}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_00E6D99F push 5D0C50FFh; ret 0_2_00E6D99C
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_02777414 push edi; retf 0_2_02777415
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05A37798 push eax; retf 0_2_05A37799
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CD88CB push eax; iretd 0_2_05CD8919
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEE5EB pushfd ; retf 0_2_05CEE5F2
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE140B push es; retf 0_2_05CE1412
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE1407 push es; retf 0_2_05CE140A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE979B push edi; retf 0_2_05CE97A2
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE9799 push edi; retf 0_2_05CE979A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEA773 pushad ; retf 0_2_05CEA77A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEA771 pushad ; retf 0_2_05CEA772
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE9718 push edi; retf 0_2_05CE971A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE96E9 push esi; retf 0_2_05CE96EA
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE96B3 push esi; retf 0_2_05CE96BA
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE96B0 push esi; retf 0_2_05CE96B2
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE9621 push esi; retf 0_2_05CE9622
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEE1DB pushfd ; retf 0_2_05CEE392
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE91E9 push edx; retf 0_2_05CE91EA
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE9123 push ecx; retf 0_2_05CE912A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEE39B pushfd ; retf 0_2_05CEE5EA
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE1351 push es; retf 0_2_05CE1352
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE2364 push eax; retf 0_2_05CE3911
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE1373 push es; retf 0_2_05CE137A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE1370 push es; retf 0_2_05CE1372
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE8DBF push eax; retf 0_2_05CE8E12
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE8F23 push eax; retf 0_2_05CE8F2A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE8F20 push eax; retf 0_2_05CE8F22
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE8EF0 push eax; retf 0_2_05CE8EF2
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEA913 pushad ; retf 0_2_05CEA91A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CE9809 push edi; retf 0_2_05CE980A
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeCode function: 0_2_05CEE813 push 9805CB9Dh; iretd 0_2_05CEE81D
                        Source: LisectAVT_2403002A_35.exeStatic PE information: section name: .text entropy: 6.948309386213313
                        Source: LisectAVT_2403002A_35.exe, Zi62.csHigh entropy of concatenated method names: 'Yg1', 'c5R', 'o7A', 'p2K', 'r9S', 'j4H', 'Eq7', 'Di1', 'Df2', 'Qe4'
                        Source: LisectAVT_2403002A_35.exe, Ze52.csHigh entropy of concatenated method names: 'SetWindowPos', 'ShellExecute', 'c3AF', 'Jm93', 'o2N8', 'Pm15', 'Cn6o', 'w7ZT', 'Ee6g', 'd7F4'
                        Source: LisectAVT_2403002A_35.exe, Fb7r9.csHigh entropy of concatenated method names: 'Ya5f8', 'y7E4Z', 'r9YQy', 'e7WJb', 'Mg7c1', 't9E7W', 'f6', 'Do', 'x7', 'Km'

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeFile opened: C:\Users\user\Desktop\LisectAVT_2403002A_35.exe\:Zone.Identifier read attributes | deleteJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: E20000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: 2900000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: 2700000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: 7E70000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: 8E70000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: 9040000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: A040000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: A3F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: B3F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3050000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeWindow / User API: threadDelayed 8749Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeWindow / User API: threadDelayed 1118Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exe TID: 8044Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exe TID: 8044Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeThread delayed: delay time: 30000Jump to behavior
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_35.exe, 00000000.00000002.2122076409.00000000053C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VBoxTray
                        Source: LisectAVT_2403002A_35.exe, 00000000.00000002.2122076409.00000000053C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: sandboxierpcssGSOFTWARE\VMware, Inc.\VMware VGAuth
                        Source: RegAsm.exe, 00000006.00000002.2664566925.00000000062E0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllstringPNPDeviceID
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43E000Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 440000Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: F03008Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeQueries volume information: C:\Users\user\Desktop\LisectAVT_2403002A_35.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\LisectAVT_2403002A_35.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2660172800.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 756, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2660172800.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 756, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.39ba7f2.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.397f722.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3944642.5.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a6ba30.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.LisectAVT_2403002A_35.exe.3a30972.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000002.2660172800.0000000003051000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: LisectAVT_2403002A_35.exe PID: 7756, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 756, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire Infrastructure1
                        Valid Accounts
                        121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Encrypted Channel
                        1
                        Exfiltration Over Alternative Protocol
                        Abuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        Valid Accounts
                        1
                        Valid Accounts
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        Input Capture
                        24
                        System Information Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Access Token Manipulation
                        2
                        Obfuscated Files or Information
                        1
                        Credentials in Registry
                        111
                        Security Software Discovery
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook311
                        Process Injection
                        11
                        Software Packing
                        NTDS1
                        Process Discovery
                        Distributed Component Object Model1
                        Input Capture
                        11
                        Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets141
                        Virtualization/Sandbox Evasion
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain Credentials1
                        Application Window Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Valid Accounts
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Access Token Manipulation
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt141
                        Virtualization/Sandbox Evasion
                        /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
                        Process Injection
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                        Hidden Files and Directories
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        LisectAVT_2403002A_35.exe100%AviraTR/AD.GenSteal.rawzd
                        LisectAVT_2403002A_35.exe100%Joe Sandbox ML
                        No Antivirus matches
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://account.dyn.com/0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        http://www.radioreference.com/apps/register/0%Avira URL Cloudsafe
                        http://api.radioreference.com/soap20%Avira URL Cloudsafe
                        http://ftp.rusticpensiune.ro0%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        ftp.rusticpensiune.ro
                        185.146.87.128
                        truetrue
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://api.radioreference.com/soap2LisectAVT_2403002A_35.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          https://account.dyn.com/LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, LisectAVT_2403002A_35.exe, 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://ftp.rusticpensiune.roRegAsm.exe, 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000006.00000002.2660172800.00000000030AC000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.radioreference.com/apps/register/LisectAVT_2403002A_35.exefalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          185.146.87.128
                          ftp.rusticpensiune.roRomania
                          5588GTSCEGTSCentralEuropeAntelGermanyCZtrue
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1482318
                          Start date and time:2024-07-25 21:16:14 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 49s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:10
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:LisectAVT_2403002A_35.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 96%
                          • Number of executed functions: 162
                          • Number of non-executed functions: 38
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: LisectAVT_2403002A_35.exe
                          TimeTypeDescription
                          15:17:16API Interceptor226x Sleep call for process: LisectAVT_2403002A_35.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          185.146.87.128COMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                  BESTELLU.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    Ordine_nr.24061168372.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                        ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                          CCTC_PO_N.24042291PDF.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            MILTECH_N24032201PDF.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              ftp.rusticpensiune.roCOMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              BESTELLU.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              Ordine_nr.24061168372.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                              • 185.146.87.128
                                              CCTC_PO_N.24042291PDF.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              MILTECH_N24032201PDF.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              GTSCEGTSCentralEuropeAntelGermanyCZsh4.elfGet hashmaliciousMiraiBrowse
                                              • 195.56.40.173
                                              RiI7W2cj7p.elfGet hashmaliciousUnknownBrowse
                                              • 213.29.127.166
                                              https://liceultehnologicrosiajiu.ro/ulin/ulin8ce.htmlGet hashmaliciousCVE-2024-21412Browse
                                              • 85.9.47.248
                                              KBNCt45Gpk.elfGet hashmaliciousMiraiBrowse
                                              • 212.203.170.235
                                              5xUAAMwlnJ.elfGet hashmaliciousUnknownBrowse
                                              • 193.86.218.248
                                              COMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              • 185.146.87.128
                                              92.249.48.47-skid.ppc-2024-07-20T09_04_20.elfGet hashmaliciousMirai, MoobotBrowse
                                              • 217.153.110.218
                                              waybill_shipping_documents_original_BL_CI&PL_01_07_2024_00000000_doc.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                              • 188.214.214.160
                                              botx.arm6.elfGet hashmaliciousMiraiBrowse
                                              • 213.29.20.194
                                              botx.mips.elfGet hashmaliciousMiraiBrowse
                                              • 194.149.9.246
                                              No context
                                              No context
                                              Process:C:\Users\user\Desktop\LisectAVT_2403002A_35.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1216
                                              Entropy (8bit):5.34331486778365
                                              Encrypted:false
                                              SSDEEP:24:ML9E4KiE4Kx1qE4x84qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MxHKiHKx1qHxviYHKh3oPtHo6hAHKzea
                                              MD5:E6FF533E8DBB2605A16817894AAAD8BA
                                              SHA1:B5DAB6E50E652D392A005E6C1B03D6CE526ECEC1
                                              SHA-256:D0E8C3274C00E0278C7F1D4C57CD0AB9B1F76107FB76D0F02FE0C2C89ACC3063
                                              SHA-512:45B7A0B75DFD3E4C8C44E16177E11CCFC04DDF837DF6D27A1718C1951E03333CBD6C5FAF4481520F9AF4C4840F00E26B0975E8184E27E83F52A1D5984042CB33
                                              Malicious:true
                                              Reputation:low
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a
                                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Entropy (8bit):6.940387730444121
                                              TrID:
                                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                              • Win32 Executable (generic) a (10002005/4) 49.75%
                                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                              • Windows Screen Saver (13104/52) 0.07%
                                              • Generic Win/DOS Executable (2004/3) 0.01%
                                              File name:LisectAVT_2403002A_35.exe
                                              File size:1'062'923 bytes
                                              MD5:292b38ef1365ee19ef46925535305891
                                              SHA1:4e7d964212b15097bc867935dae6ab71b72ec6fc
                                              SHA256:81794c637b54a673f7e5af3f1f0aeb3479e9279b6870c07caa0a380ea7ad1dce
                                              SHA512:9aefe7897746af6afc77016dca6b57012d94085b6346c9769d78e3e5780c85c597a58c5dc730e9a2395c55b55abeee4f7acb52590505a255a4876e62d413a932
                                              SSDEEP:12288:Ac3bAWWghMMjiPPcgFXw4+sNS3RbtEgMfSNhjAyiXBo5JNHrU322WrM9uOAHnh42:I2ziPPcgFXRShqgFNhoRo4wA9gh4q
                                              TLSH:E935D05C6BF8E510F27E3B75A4B512204334F8DB9622D31E02E150E97BB27D28A51BE7
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....(.M............................NL... ...`....@.. ....................................`................................
                                              Icon Hash:00928e8e8686b000
                                              Entrypoint:0x504c4e
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x4D1128AC [Tue Dec 21 22:22:36 2010 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                              Instruction
                                              jmp dword ptr [00402000h]
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              add byte ptr [eax], al
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x104bf80x53.text
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1060000x440.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1080000xc.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x20000x102c540x102e00cef10b4641961f3bd209bfb702e0c689False0.6612945512433607data6.948309386213313IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rsrc0x1060000x4400x6003f3a33811cdc8e8c06f28ffc63d35f54False0.3059895833333333data2.698453529095136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x1080000xc0x200ee93ee7d44811945b1d33eb6af2e3ce4False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_VERSION0x1060580x3e8data0.434
                                              DLLImport
                                              mscoree.dll_CorExeMain
                                              TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                              2024-07-25T21:18:24.137078+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity6222154603192.168.2.8185.146.87.128
                                              2024-07-25T21:17:54.682331+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436221940.127.169.103192.168.2.8
                                              2024-07-25T21:17:27.394284+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971140.127.169.103192.168.2.8
                                              2024-07-25T21:18:23.528932+0200TCP2029927ET MALWARE AgentTesla Exfil via FTP6222021192.168.2.8185.146.87.128
                                              2024-07-25T21:18:24.143987+0200TCP2855542ETPRO MALWARE Agent Tesla CnC Exfil Activity6222154603192.168.2.8185.146.87.128
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jul 25, 2024 21:18:20.752249002 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:20.757215023 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:20.757596970 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:21.381934881 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:21.382250071 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:21.387095928 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:21.592977047 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:21.593214035 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:21.598259926 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:21.854808092 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:21.854981899 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:21.859817028 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:22.066272020 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:22.070596933 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:22.075504065 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:22.691878080 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:22.692133904 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:22.693696022 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:22.693753004 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.000746965 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.093033075 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.093142033 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.099307060 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.099323988 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.310800076 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.311142921 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.316152096 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.522793055 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.523772955 CEST6222154603192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.528793097 CEST5460362221185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:23.528873920 CEST6222154603192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.528932095 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:23.533796072 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:24.136720896 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:24.137078047 CEST6222154603192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:24.137183905 CEST6222154603192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:24.143271923 CEST5460362221185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:24.143922091 CEST5460362221185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:24.143986940 CEST6222154603192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:24.188240051 CEST6222021192.168.2.8185.146.87.128
                                              Jul 25, 2024 21:18:24.370178938 CEST2162220185.146.87.128192.168.2.8
                                              Jul 25, 2024 21:18:24.422708035 CEST6222021192.168.2.8185.146.87.128
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jul 25, 2024 21:17:52.792355061 CEST5355611162.159.36.2192.168.2.8
                                              Jul 25, 2024 21:17:53.344027996 CEST53618201.1.1.1192.168.2.8
                                              Jul 25, 2024 21:18:20.661515951 CEST5214853192.168.2.81.1.1.1
                                              Jul 25, 2024 21:18:20.742671967 CEST53521481.1.1.1192.168.2.8
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jul 25, 2024 21:18:20.661515951 CEST192.168.2.81.1.1.10x7b26Standard query (0)ftp.rusticpensiune.roA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jul 25, 2024 21:18:20.742671967 CEST1.1.1.1192.168.2.80x7b26No error (0)ftp.rusticpensiune.ro185.146.87.128A (IP address)IN (0x0001)false
                                              TimestampSource PortDest PortSource IPDest IPCommands
                                              Jul 25, 2024 21:18:21.381934881 CEST2162220185.146.87.128192.168.2.8220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.
                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.
                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.220-This is a private system - No anonymous login
                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                              220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 3 of 50 allowed.220-Local time is now 22:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                              Jul 25, 2024 21:18:21.382250071 CEST6222021192.168.2.8185.146.87.128USER FTPAdmin@rusticpensiune.ro
                                              Jul 25, 2024 21:18:21.592977047 CEST2162220185.146.87.128192.168.2.8331 User FTPAdmin@rusticpensiune.ro OK. Password required
                                              Jul 25, 2024 21:18:21.593214035 CEST6222021192.168.2.8185.146.87.128PASS 99AM}+NZ&CCq!4Vq)9!(zXx01.lQ!~nS.fBnY,4Z~fjHnGo*B3Gd;B{Q1!%-Xw--%vn^0%nt
                                              Jul 25, 2024 21:18:21.854808092 CEST2162220185.146.87.128192.168.2.8230 OK. Current restricted directory is /
                                              Jul 25, 2024 21:18:22.066272020 CEST2162220185.146.87.128192.168.2.8504 Unknown command
                                              Jul 25, 2024 21:18:22.070596933 CEST6222021192.168.2.8185.146.87.128PWD
                                              Jul 25, 2024 21:18:22.691878080 CEST2162220185.146.87.128192.168.2.8257 "/" is your current location
                                              Jul 25, 2024 21:18:22.692133904 CEST6222021192.168.2.8185.146.87.128TYPE I
                                              Jul 25, 2024 21:18:22.693696022 CEST2162220185.146.87.128192.168.2.8257 "/" is your current location
                                              Jul 25, 2024 21:18:23.000746965 CEST6222021192.168.2.8185.146.87.128TYPE I
                                              Jul 25, 2024 21:18:23.093033075 CEST2162220185.146.87.128192.168.2.8257 "/" is your current location
                                              Jul 25, 2024 21:18:23.310800076 CEST2162220185.146.87.128192.168.2.8200 TYPE is now 8-bit binary
                                              Jul 25, 2024 21:18:23.311142921 CEST6222021192.168.2.8185.146.87.128PASV
                                              Jul 25, 2024 21:18:23.522793055 CEST2162220185.146.87.128192.168.2.8227 Entering Passive Mode (185,146,87,128,213,75)
                                              Jul 25, 2024 21:18:23.528932095 CEST6222021192.168.2.8185.146.87.128STOR PW_user-414408_2024_07_25_15_18_19.html
                                              Jul 25, 2024 21:18:24.136720896 CEST2162220185.146.87.128192.168.2.8150 Accepted data connection
                                              Jul 25, 2024 21:18:24.370178938 CEST2162220185.146.87.128192.168.2.8226-File successfully transferred
                                              226-File successfully transferred226 0.213 seconds (measured here), 1.47 Kbytes per second

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:15:17:09
                                              Start date:25/07/2024
                                              Path:C:\Users\user\Desktop\LisectAVT_2403002A_35.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_35.exe"
                                              Imagebase:0x60000
                                              File size:1'062'923 bytes
                                              MD5 hash:292B38EF1365EE19EF46925535305891
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2112490398.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2122076409.00000000053C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2119612704.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_DarkTortilla, Description: Yara detected DarkTortilla Crypter, Source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2119612704.0000000003A30000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:6
                                              Start time:15:17:46
                                              Start date:25/07/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                              Imagebase:0xd30000
                                              File size:65'440 bytes
                                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2660172800.000000000309E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2657339981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2660172800.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2660172800.0000000003051000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:18.8%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:7.5%
                                                Total number of Nodes:120
                                                Total number of Limit Nodes:12
                                                execution_graph 68891 7309b50 68892 7309b98 VirtualProtect 68891->68892 68893 7309bd2 68892->68893 68778 5a31080 68779 5a310c2 68778->68779 68781 5a310c9 68778->68781 68780 5a3111a CallWindowProcW 68779->68780 68779->68781 68780->68781 68782 5a4a680 DuplicateHandle 68783 5a4a716 68782->68783 68784 277be50 68785 277be90 VirtualAllocEx 68784->68785 68787 277becd 68785->68787 68788 277cbd0 68789 277cc10 ResumeThread 68788->68789 68791 277cc41 68789->68791 68751 5cd9bc0 68752 5cd9c06 DeleteFileW 68751->68752 68754 5cd9c3f 68752->68754 68894 5a4e9d0 68895 5a4ea38 CreateWindowExW 68894->68895 68897 5a4eaf4 68895->68897 68897->68897 68792 277c6c0 68793 277c708 VirtualProtectEx 68792->68793 68795 277c746 68793->68795 68831 277cfa0 68832 277d12b 68831->68832 68834 277cfc6 68831->68834 68834->68832 68835 27749c0 68834->68835 68836 27749c7 PostMessageW 68835->68836 68838 277d28c 68836->68838 68838->68834 68898 277b780 68899 277b7c5 Wow64GetThreadContext 68898->68899 68901 277b80d 68899->68901 68839 7308b68 68841 7308b7c 68839->68841 68840 7308bb8 68841->68840 68850 27702e8 68841->68850 68854 277021b 68841->68854 68858 2770c0a 68841->68858 68862 277133c 68841->68862 68867 2770ebb 68841->68867 68871 2770377 68841->68871 68875 27702a4 68841->68875 68881 2770aea 68841->68881 68851 27702a5 68850->68851 68851->68850 68885 27727d8 68851->68885 68888 27727d0 68851->68888 68856 27727d0 VirtualProtect 68854->68856 68857 27727d8 VirtualProtect 68854->68857 68855 277017f 68855->68841 68856->68855 68857->68855 68860 27727d0 VirtualProtect 68858->68860 68861 27727d8 VirtualProtect 68858->68861 68859 2770c1e 68860->68859 68861->68859 68863 2771345 68862->68863 68865 27727d0 VirtualProtect 68863->68865 68866 27727d8 VirtualProtect 68863->68866 68864 2771357 68865->68864 68866->68864 68869 27727d0 VirtualProtect 68867->68869 68870 27727d8 VirtualProtect 68867->68870 68868 2770ece 68869->68868 68870->68868 68873 27727d0 VirtualProtect 68871->68873 68874 27727d8 VirtualProtect 68871->68874 68872 277038b 68873->68872 68874->68872 68876 27702a5 68875->68876 68877 27727d0 VirtualProtect 68875->68877 68878 27727d8 VirtualProtect 68875->68878 68879 27727d0 VirtualProtect 68876->68879 68880 27727d8 VirtualProtect 68876->68880 68877->68876 68878->68876 68879->68876 68880->68876 68883 27727d0 VirtualProtect 68881->68883 68884 27727d8 VirtualProtect 68881->68884 68882 2770afb 68883->68882 68884->68882 68886 2772820 VirtualProtect 68885->68886 68887 277285a 68886->68887 68887->68851 68889 2772820 VirtualProtect 68888->68889 68890 277285a 68889->68890 68890->68851 68755 5a480b8 68756 5a480c7 68755->68756 68758 5a481b0 68755->68758 68759 5a481c1 68758->68759 68760 5a481e4 68758->68760 68759->68760 68766 5a48448 68759->68766 68770 5a48438 68759->68770 68760->68756 68761 5a481dc 68761->68760 68762 5a483e8 GetModuleHandleW 68761->68762 68763 5a48415 68762->68763 68763->68756 68767 5a4845c 68766->68767 68768 5a48481 68767->68768 68774 5a47c28 68767->68774 68768->68761 68771 5a4845c 68770->68771 68772 5a48481 68771->68772 68773 5a47c28 LoadLibraryExW 68771->68773 68772->68761 68773->68772 68775 5a48628 LoadLibraryExW 68774->68775 68777 5a486a1 68775->68777 68777->68768 68796 2774048 68797 277406f 68796->68797 68798 27740b7 68797->68798 68800 2774afb 68797->68800 68801 2774b05 68800->68801 68802 2774f6c 68801->68802 68806 27774e0 68801->68806 68811 2776fd8 68801->68811 68815 2776fc8 68801->68815 68802->68797 68807 2777507 68806->68807 68809 277750c 68806->68809 68807->68801 68808 27776c4 68808->68801 68809->68801 68809->68808 68819 2779ba8 68809->68819 68812 2776fe6 68811->68812 68813 2776fed 68811->68813 68812->68801 68813->68801 68813->68812 68814 2779ba8 CreateProcessAsUserW 68813->68814 68814->68813 68817 2776fcc 68815->68817 68816 2776fe6 68816->68801 68817->68801 68817->68816 68818 2779ba8 CreateProcessAsUserW 68817->68818 68818->68817 68820 2779c27 CreateProcessAsUserW 68819->68820 68822 2779d28 68820->68822 68823 277c948 68824 277c98d Wow64SetThreadContext 68823->68824 68826 277c9d5 68824->68826 68827 277c1c8 68828 277c210 WriteProcessMemory 68827->68828 68830 277c267 68828->68830

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 72f1c4f-72f1e97 28 72f1e9d-72f2be2 0->28 29 72f3eec-72f41d2 0->29 438 72f2ece-72f3ee4 28->438 439 72f2be8-72f2ec6 28->439 104 72f518b-72f6206 29->104 105 72f41d8-72f5183 29->105 695 72f654d-72f6560 104->695 696 72f620c-72f6545 104->696 105->104 438->29 439->438 700 72f6c0d-72f7ae6 call 72f91d1 695->700 701 72f6566-72f6c05 695->701 696->695 1083 72f7aec-72f7af3 700->1083 701->700
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cce852190240311bff037433d9aa06c62db6dad4876163f525d7ea5b64b89a1e
                                                • Instruction ID: ce690b3f02506e8a43c6cc77ff4e392d25d9454d7caba5394012638daa351b5d
                                                • Opcode Fuzzy Hash: cce852190240311bff037433d9aa06c62db6dad4876163f525d7ea5b64b89a1e
                                                • Instruction Fuzzy Hash: F0C32B70A15219CFCB58EF79E9996ACBBF2BB89200F4045EAD048A7350EF355E84CF45

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1085 72f1c68-72f1e97 1113 72f1e9d-72f2be2 1085->1113 1114 72f3eec-72f41d2 1085->1114 1523 72f2ece-72f3ee4 1113->1523 1524 72f2be8-72f2ec6 1113->1524 1189 72f518b-72f6206 1114->1189 1190 72f41d8-72f5183 1114->1190 1780 72f654d-72f6560 1189->1780 1781 72f620c-72f6545 1189->1781 1190->1189 1523->1114 1524->1523 1785 72f6c0d-72f7ae6 call 72f91d1 1780->1785 1786 72f6566-72f6c05 1780->1786 1781->1780 2168 72f7aec-72f7af3 1785->2168 1786->1785
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 65c555d4f514ac27340891ece71609e956ebe9af3965a0872c841303aa3a4803
                                                • Instruction ID: 4ae4321719e30a065605a682bd39f0d619dd634136db3f1f730d28532f7738c7
                                                • Opcode Fuzzy Hash: 65c555d4f514ac27340891ece71609e956ebe9af3965a0872c841303aa3a4803
                                                • Instruction Fuzzy Hash: 56C32B70A15219CFCB58EF79E9996ACBBF2BB89200F4045EAD048A7350EF355E84CF45

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3129 5cd22b8-5cd7983 call 5cd8a3b call 5cd90df 4084 5cd7989-5cd7990 3129->4084
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123891257.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5cd0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0bd699cda37de317f60e1aef6ae90360c6277b6902ff4bde4730cc3e140efa16
                                                • Instruction ID: b222cfbabe508c8e12bf8bd4a6cc4d51f5ec7e0ac4cb01f22c2e4ac691a8bbee
                                                • Opcode Fuzzy Hash: 0bd699cda37de317f60e1aef6ae90360c6277b6902ff4bde4730cc3e140efa16
                                                • Instruction Fuzzy Hash: 38B31970A15218CFCB18EF79DA996ACBBF2FB84200F4485EAD488A7250DF315D84CF95

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4116 277a248-277a26d 4117 277a274-277a2a8 4116->4117 4118 277a26f 4116->4118 4120 277a2ab 4117->4120 4118->4117 4121 277a2b2-277a2ce 4120->4121 4122 277a2d7-277a2d8 4121->4122 4123 277a2d0 4121->4123 4124 277a4d8-277a4e1 4122->4124 4123->4120 4123->4122 4123->4124 4125 277a3b7-277a3c9 4123->4125 4126 277a4b5-277a4bd 4123->4126 4127 277a3ff-277a417 4123->4127 4128 277a47e-277a482 4123->4128 4129 277a3dd-277a3e0 4123->4129 4130 277a2dd-277a2ee 4123->4130 4131 277a443-277a476 call 2772b80 4123->4131 4132 277a343-277a36d 4123->4132 4133 277a3a0-277a3b2 4123->4133 4134 277a3ce-277a3d8 4123->4134 4135 277a308-277a33b call 2776800 4123->4135 4125->4121 4140 277a4c4-277a4d3 4126->4140 4150 277a42a-277a431 4127->4150 4151 277a419-277a428 4127->4151 4138 277a495-277a49c 4128->4138 4139 277a484-277a493 4128->4139 4144 277a3e9-277a3fa 4129->4144 4148 277a2f4-277a306 4130->4148 4149 277a4bf-277a4c1 4130->4149 4131->4128 4156 277a380-277a387 4132->4156 4157 277a36f-277a37e 4132->4157 4133->4121 4134->4121 4135->4132 4145 277a4a3-277a4b0 4138->4145 4139->4145 4140->4121 4144->4121 4145->4121 4148->4121 4149->4140 4155 277a438-277a43e 4150->4155 4151->4155 4155->4121 4158 277a38e-277a39b 4156->4158 4157->4158 4158->4121
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Q+(i$Q+(i
                                                • API String ID: 0-3998099878
                                                • Opcode ID: ccb0391ae4d2ba4cfa211ba1074c725bd53f332ff2bcc4a1d6925cece8949450
                                                • Instruction ID: b9b31f97c78dd1a32c91ba8c2f399156a3f50f8005d826b0009f4492f288b050
                                                • Opcode Fuzzy Hash: ccb0391ae4d2ba4cfa211ba1074c725bd53f332ff2bcc4a1d6925cece8949450
                                                • Instruction Fuzzy Hash: E181DEB4D01259CFDF04CFA9C9846AEFBB2BB89310F24942AD816BB354DB345981CF94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4161 27728e0-27728fa 4162 2772901-27729ac 4161->4162 4163 27728fc 4161->4163 4173 27729af 4162->4173 4163->4162 4174 27729b6-27729d2 4173->4174 4175 27729d4 4174->4175 4176 27729db-27729dc 4174->4176 4175->4173 4175->4176 4177 2772a15-2772a2f 4175->4177 4178 2772a85-2772a8a 4175->4178 4179 27729e1-27729e5 4175->4179 4180 2772a31-2772a72 call 2773ff0 4175->4180 4181 2772b48-2772b4e 4175->4181 4176->4181 4177->4174 4185 2772a95-2772b15 4178->4185 4182 27729e7-27729f6 4179->4182 4183 27729f8-27729ff 4179->4183 4195 2772a78-2772a80 4180->4195 4184 2772a06-2772a13 4182->4184 4183->4184 4184->4174 4198 2772b17-2772b26 4185->4198 4199 2772b28-2772b2f 4185->4199 4195->4174 4200 2772b36-2772b43 4198->4200 4199->4200 4200->4174
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Q!$Q!
                                                • API String ID: 0-2963764794
                                                • Opcode ID: 4f078689653d4d9bf39f20ef483ff66fd2d2f271abb3e2e348b5919a0d9c38d9
                                                • Instruction ID: c406cbd16c0a8d31d0e35b527edee4cc39be8dd4c1f1893be79c8768e0d1ec07
                                                • Opcode Fuzzy Hash: 4f078689653d4d9bf39f20ef483ff66fd2d2f271abb3e2e348b5919a0d9c38d9
                                                • Instruction Fuzzy Hash: 5F71F274E00208DFDB04DFE5D5856AEBFB2BF89300F24942AE816A7354EB346985CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4763 2779ba8-2779c33 4765 2779c35-2779c3b 4763->4765 4766 2779c3e-2779c45 4763->4766 4765->4766 4767 2779c47-2779c4d 4766->4767 4768 2779c50-2779c68 4766->4768 4767->4768 4769 2779c6a-2779c76 4768->4769 4770 2779c79-2779d26 CreateProcessAsUserW 4768->4770 4769->4770 4772 2779d2f-2779dae 4770->4772 4773 2779d28-2779d2e 4770->4773 4780 2779dc0-2779dc7 4772->4780 4781 2779db0-2779db6 4772->4781 4773->4772 4782 2779dde 4780->4782 4783 2779dc9-2779dd8 4780->4783 4781->4780 4783->4782
                                                APIs
                                                • CreateProcessAsUserW.KERNELBASE(?,?,?,0000000A,?,?,?,?,?,?,?), ref: 02779D13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: CreateProcessUser
                                                • String ID:
                                                • API String ID: 2217836671-0
                                                • Opcode ID: 1ff6fc612e404246c27ecf05847d18c2d95ea49af9085ecbc8eed049a10ae48b
                                                • Instruction ID: cb4f321f350867966c12369e2e5faafc1468e1f820ec1e385b0bf2d4b5fe7150
                                                • Opcode Fuzzy Hash: 1ff6fc612e404246c27ecf05847d18c2d95ea49af9085ecbc8eed049a10ae48b
                                                • Instruction Fuzzy Hash: AD510771901229DFDF24CF99C840BDEBBB5BF48304F1484AAE909B7250DB71AA85DF90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Q!
                                                • API String ID: 0-1344094416
                                                • Opcode ID: 4b3cea85e8eb0b00f0f76ed2252cb07506553ee6a7638c3ef0046b185027ee17
                                                • Instruction ID: f03e4208d94131ec2ef782e13056f3d8c2d1ccf5a1a1095ec9e4da1ebf87be7f
                                                • Opcode Fuzzy Hash: 4b3cea85e8eb0b00f0f76ed2252cb07506553ee6a7638c3ef0046b185027ee17
                                                • Instruction Fuzzy Hash: A6710074E00208DFDB08DFE5D5856AEBFB2BF89300F24856AE816A7355EB305985CF90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: <
                                                • API String ID: 0-4251816714
                                                • Opcode ID: f32ddb799643009eaefdcc7be8d1f00e7482863e84fc374ece4d3f3b8f6c0ade
                                                • Instruction ID: 181e10fbd5e97bf8ec07e1e44372a71d99cf6772190180f9203b5b6f2be478f7
                                                • Opcode Fuzzy Hash: f32ddb799643009eaefdcc7be8d1f00e7482863e84fc374ece4d3f3b8f6c0ade
                                                • Instruction Fuzzy Hash: 996174B5D00619CFDB58CFAAC9446DDBBF2AF88301F14C5AAD409AB364EB345A85CF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a47f6c5296411685593c7d203a3b30d287afa04f25466b0351976ab33a06d2ea
                                                • Instruction ID: b10011d0d10d3a8bb18dcbfa96e45c3e10cd089c2a16019c6bd53f3f90e1d9ab
                                                • Opcode Fuzzy Hash: a47f6c5296411685593c7d203a3b30d287afa04f25466b0351976ab33a06d2ea
                                                • Instruction Fuzzy Hash: D8B22834A1021ACFCB18FFB8D9997AEBBB1BF89300F4045A9E449A7250DE395D85CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aa0c6c25e2900918b9e3bef4c0674de39cebedaf053eb751366af7461afc9480
                                                • Instruction ID: 554c6bbf9a6636c47956a2f59a08767b170c4d6776af692f45e157a5b0fb2ab4
                                                • Opcode Fuzzy Hash: aa0c6c25e2900918b9e3bef4c0674de39cebedaf053eb751366af7461afc9480
                                                • Instruction Fuzzy Hash: 8A927030644209CFCB14CF68E984AAEBBF2FF88354F159659E455EB2A1DB30ED41CB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123954330.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5ce0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2341912dab4ac788c811ead08ff52b781b5b89673df2f55d667ac083142e1e31
                                                • Instruction ID: 9f1005aacbaca9688c8caa9194212fd27727d9d730d911e5b72624f96b2bbdd4
                                                • Opcode Fuzzy Hash: 2341912dab4ac788c811ead08ff52b781b5b89673df2f55d667ac083142e1e31
                                                • Instruction Fuzzy Hash: A8526F34A003058FCB14DF68C844B99B7B2BFC9314F2586A9D5586F3A2DB71AD86CF81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123954330.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5ce0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a9bd4a2922696acdea5a9896ac259479694eb30243c2f15493f876ec558ec207
                                                • Instruction ID: 4ac9a0fdb268738ac796abc42c0f3b21634531b9e952d8f9457b4ec2b463aa5a
                                                • Opcode Fuzzy Hash: a9bd4a2922696acdea5a9896ac259479694eb30243c2f15493f876ec558ec207
                                                • Instruction Fuzzy Hash: 41526F34A003458FCB14DF68C844B99B7B2FFC9314F2586A9D5586F3A2DB71A986CF81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 34e687652b5b45369c8d722b153c786f7b16cdd4f1029a897a96c22da495baf1
                                                • Instruction ID: 31cb5b32af2c3c944a807effc4900062042e7898f832fe4d7cd00f05b9457afa
                                                • Opcode Fuzzy Hash: 34e687652b5b45369c8d722b153c786f7b16cdd4f1029a897a96c22da495baf1
                                                • Instruction Fuzzy Hash: 68C15CB0D1420ACFEB04CFA5C4915AEFBB6FF89300F14955AD416AB255D7349942CFD4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f6812a13f3496ea66813df5054e29a80bb0d7236191c592859669360e701c5e
                                                • Instruction ID: f670e82cfd9de71067f17ec8b214914fbf303fa1213f4bcfc1528276160af81f
                                                • Opcode Fuzzy Hash: 3f6812a13f3496ea66813df5054e29a80bb0d7236191c592859669360e701c5e
                                                • Instruction Fuzzy Hash: BED10574E04269CFCB64CF65C9847D9FBB6BB89300F10D9EAD40AAB214DB709A85CF40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b29a27e07058090c456c2d9cb042b12cd188b08ab72c31984f93f6608ba2bbb
                                                • Instruction ID: 462cf12aa5a55da9877478c126214423aa56f29b6a673bfad6874768b10c5110
                                                • Opcode Fuzzy Hash: 8b29a27e07058090c456c2d9cb042b12cd188b08ab72c31984f93f6608ba2bbb
                                                • Instruction Fuzzy Hash: 65C139B0D1020ADFEB14CF95C4919AEFBB6FF89301F209659D416AB254D734A942CFE4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eeddb7fb34f9a20d0b8fb3269b57d10c8c503a5887d44288a2b6c3d44b155f52
                                                • Instruction ID: 4f0f01e13b6fe2f470570dd3ed3b15dc6a4f2715d7df229cfadcf0e5d9125f8e
                                                • Opcode Fuzzy Hash: eeddb7fb34f9a20d0b8fb3269b57d10c8c503a5887d44288a2b6c3d44b155f52
                                                • Instruction Fuzzy Hash: 69818034B042198BDB48DFB5A85477E77B7BFC8750B19852AE406E7285CF388C029B91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 495df3f54ce8788f55c15956621077f4b07ebc97519e0e3832e48e204603ef07
                                                • Instruction ID: 712f31a4de6b36597318ad4791fc968201c10211210861c96df0ebaa47c67653
                                                • Opcode Fuzzy Hash: 495df3f54ce8788f55c15956621077f4b07ebc97519e0e3832e48e204603ef07
                                                • Instruction Fuzzy Hash: 3781E2B4E112498FDB08CFA9D994A9EFFB2FF89300F24802AD819AB355D7345905CF91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9fb3b7683e0a5816a1e3ce555e3790eb379159bfb8ebf8b2c1a01614a877420d
                                                • Instruction ID: 30dbcba45445abd6f400b19dbeb7db98a1910c9f40b4d177202104f735e81dab
                                                • Opcode Fuzzy Hash: 9fb3b7683e0a5816a1e3ce555e3790eb379159bfb8ebf8b2c1a01614a877420d
                                                • Instruction Fuzzy Hash: 168119B4E1520A8FDB08CFA5C951AAEFBF6FF89340F24806AD419A7354D7349A41CF94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3f6c11e901750ed24823b504d29854cda66e0eab357d443e2ce042554786db28
                                                • Instruction ID: 98d0973867b9ae2b1c875a678d24dac6aec6cc494bad3425a06f18acc7ced0af
                                                • Opcode Fuzzy Hash: 3f6c11e901750ed24823b504d29854cda66e0eab357d443e2ce042554786db28
                                                • Instruction Fuzzy Hash: 7A71B3B4E102198FDB08CFEAD954AAEFBB6FF89301F10802AD519AB354DB745906CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2918a214711f5154fea0dc04a0432882045c8dcd6c5627f8f94d07c1b8a9c1ba
                                                • Instruction ID: 9ac8d92cd434ba3bce77be46e519f0f93d93875406bcf6da119a52128c24880d
                                                • Opcode Fuzzy Hash: 2918a214711f5154fea0dc04a0432882045c8dcd6c5627f8f94d07c1b8a9c1ba
                                                • Instruction Fuzzy Hash: 8C510CF0E152098FEB08CF96D950AAEFBF6EF89301F24C06AD419A7254D7348A41CF95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c69b8a45ea66a950c4524f750041caa52b9b54f373cdc0d881d53420e709d1cc
                                                • Instruction ID: e47004cb89fb9bfe5edc1436d856f2a6deca23a6be2641f7f8ca8d8addeba5ec
                                                • Opcode Fuzzy Hash: c69b8a45ea66a950c4524f750041caa52b9b54f373cdc0d881d53420e709d1cc
                                                • Instruction Fuzzy Hash: 8A4112B4D1520A9BCF04CFA6D9516AEFBB6BB99300F10982AD521B6214D7784642CFA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 572ae0218dfc15bee3f76370e8e03196b00855718239e3a3a7861c087705cff9
                                                • Instruction ID: 957ae81535833eec6a47969d9a6886c5974fcbbdbfa2a314aa49aeb2a0907a79
                                                • Opcode Fuzzy Hash: 572ae0218dfc15bee3f76370e8e03196b00855718239e3a3a7861c087705cff9
                                                • Instruction Fuzzy Hash: 024146B4D0520A9FCF08CFA6D8516AEBFB2FB99310F10982AD511B7210D7784642CFA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7e779dfe6b4a2bfc5277710a1da88ee8bdc842e56d1cc186e0169f06d784cdaf
                                                • Instruction ID: f71ace7aea3965df7e757f039a2efe35833a9b54322de39f4d95e788fd60b936
                                                • Opcode Fuzzy Hash: 7e779dfe6b4a2bfc5277710a1da88ee8bdc842e56d1cc186e0169f06d784cdaf
                                                • Instruction Fuzzy Hash: 893105B1E006198BEB18CFAAD8553DEFFF6AFC9310F14C06AD409A6264DB740956CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4202 72fa6e8-72fa894 4227 72fa8a8-72fa960 4202->4227 4228 72fa896-72fa8a0 4202->4228 4240 72fa967-72fa96a 4227->4240 4241 72fa962-72fa965 4227->4241 4228->4227 4242 72fa96d-72fa980 4240->4242 4241->4242 4396 72fa983 call 72fa6e8 4242->4396 4397 72fa983 call 72fa6d7 4242->4397 4398 72fa983 call 72fc0d3 4242->4398 4245 72fa989-72fab1e call 72f9930 4270 72fab48-72fabca 4245->4270 4271 72fab20-72fab3a 4245->4271 4279 72fabcc-72fabe6 4270->4279 4280 72fac29-72fac8f 4270->4280 4399 72fab3a call 7300b58 4271->4399 4400 72fab3a call 7300b48 4271->4400 4278 72fab40-72fab47 4283 72fae17-72faed3 4280->4283 4284 72fac95-72fae14 4280->4284 4305 72fb4fd 4283->4305 4306 72faed9 4283->4306 4284->4283 4308 72fb503-72fb50d 4305->4308 4309 72fb20f-72fb22c 4306->4309 4310 72fb1ed-72fb20a 4306->4310 4311 72fb2ac-72fb2d2 4306->4311 4312 72fb1cb-72fb1e8 4306->4312 4313 72fb1a9-72fb1c6 4306->4313 4314 72fb0a7-72fb0bd 4306->4314 4315 72fb187-72fb1a4 4306->4315 4316 72fb085-72fb08b 4306->4316 4317 72fb165-72fb182 4306->4317 4318 72fb143-72fb160 4306->4318 4319 72faf02-72fb080 4306->4319 4320 72fb0c2-72fb0d8 4306->4320 4321 72fb121-72fb13e 4306->4321 4322 72fb281-72fb2a7 4306->4322 4323 72faee0-72faefd 4306->4323 4324 72fb0ff-72fb11c 4306->4324 4325 72fb0dd-72fb0fa 4306->4325 4326 72fb256-72fb27c 4306->4326 4327 72fb231-72fb251 4306->4327 4309->4308 4310->4308 4311->4308 4312->4308 4313->4308 4314->4308 4315->4308 4338 72fb094-72fb0a2 4316->4338 4317->4308 4318->4308 4319->4308 4320->4308 4321->4308 4322->4308 4323->4308 4324->4308 4325->4308 4326->4308 4327->4308 4338->4308 4396->4245 4397->4245 4398->4245 4399->4278 4400->4278
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: 706ae89ccf282aec1bdee1cf576dfebc9477ecc033ec8bc953283fa65a55d4ac
                                                • Instruction ID: ff29b60cf526041514eeaa8637b6a589729563851720ca997c6400389a5a1165
                                                • Opcode Fuzzy Hash: 706ae89ccf282aec1bdee1cf576dfebc9477ecc033ec8bc953283fa65a55d4ac
                                                • Instruction Fuzzy Hash: 5E626C70A14209CFCB08BFB9E99969DBBB2BB49310F40897AE445E7364DF389C45CB51
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: @
                                                • API String ID: 0-2766056989
                                                • Opcode ID: d7c99fa90c097c23e5865a25bd36c96d81ec39cb8b34590760f57a1aa3948003
                                                • Instruction ID: d3e5f60589aa09e49fa8d239f3a1375fa86e61257969cb29903c9a4dd298966c
                                                • Opcode Fuzzy Hash: d7c99fa90c097c23e5865a25bd36c96d81ec39cb8b34590760f57a1aa3948003
                                                • Instruction Fuzzy Hash: DD129EB0E19249CFCB14AF78E95969CBFB1BF4A310F4448AAD445E73A1EB384C45CB61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4706 5a481b0-5a481bf 4707 5a481c1-5a481ce call 5a4699c 4706->4707 4708 5a481eb-5a481ef 4706->4708 4715 5a481e4 4707->4715 4716 5a481d0 4707->4716 4709 5a481f1-5a481fb 4708->4709 4710 5a48203-5a48244 4708->4710 4709->4710 4717 5a48246-5a4824e 4710->4717 4718 5a48251-5a4825f 4710->4718 4715->4708 4761 5a481d6 call 5a48438 4716->4761 4762 5a481d6 call 5a48448 4716->4762 4717->4718 4719 5a48261-5a48266 4718->4719 4720 5a48283-5a48285 4718->4720 4724 5a48271 4719->4724 4725 5a48268-5a4826f call 5a47bcc 4719->4725 4723 5a48288-5a4828f 4720->4723 4721 5a481dc-5a481de 4721->4715 4722 5a48320-5a483e0 4721->4722 4756 5a483e2-5a483e5 4722->4756 4757 5a483e8-5a48413 GetModuleHandleW 4722->4757 4727 5a48291-5a48299 4723->4727 4728 5a4829c-5a482a3 4723->4728 4726 5a48273-5a48281 4724->4726 4725->4726 4726->4723 4727->4728 4730 5a482a5-5a482ad 4728->4730 4731 5a482b0-5a482b9 call 5a47bdc 4728->4731 4730->4731 4737 5a482c6-5a482cb 4731->4737 4738 5a482bb-5a482c3 4731->4738 4739 5a482cd-5a482d4 4737->4739 4740 5a482e9-5a482f6 4737->4740 4738->4737 4739->4740 4742 5a482d6-5a482e6 call 5a47bec call 5a47bfc 4739->4742 4746 5a482f8-5a48316 4740->4746 4747 5a48319-5a4831f 4740->4747 4742->4740 4746->4747 4756->4757 4758 5a48415-5a4841b 4757->4758 4759 5a4841c-5a48430 4757->4759 4758->4759 4761->4721 4762->4721
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 05A48406
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 5beb8c7fea8aca027c00a44b91c9cbdd9c5c1a18839dc4113b4c379fb5c20e56
                                                • Instruction ID: f419b99f51bc825fb6d2326ddd9635a30a7d62e64938aa9c26224a97cc515b9d
                                                • Opcode Fuzzy Hash: 5beb8c7fea8aca027c00a44b91c9cbdd9c5c1a18839dc4113b4c379fb5c20e56
                                                • Instruction Fuzzy Hash: D7715770A00B058FDB24DFAAE544B6AB7F1FF88200F10892ED456D7A50DB78E849CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4785 5a4e9c5-5a4ea36 4786 5a4ea41-5a4ea48 4785->4786 4787 5a4ea38-5a4ea3e 4785->4787 4788 5a4ea53-5a4ea8b 4786->4788 4789 5a4ea4a-5a4ea50 4786->4789 4787->4786 4790 5a4ea93-5a4eaf2 CreateWindowExW 4788->4790 4789->4788 4791 5a4eaf4-5a4eafa 4790->4791 4792 5a4eafb-5a4eb33 4790->4792 4791->4792 4796 5a4eb35-5a4eb38 4792->4796 4797 5a4eb40 4792->4797 4796->4797 4798 5a4eb41 4797->4798 4798->4798
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05A4EAE2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 4b0818a5bec961f9cd7211be97c37a9e6db1a3e6344ab96884d128015740362a
                                                • Instruction ID: cd85ce11dafff9c3de314c3bd690bcf4fae742fe46eb319ad83317a2e6f4481c
                                                • Opcode Fuzzy Hash: 4b0818a5bec961f9cd7211be97c37a9e6db1a3e6344ab96884d128015740362a
                                                • Instruction Fuzzy Hash: 6951DEB1C00359DFDB14CF99D884ADEBBF5BF88310F24862AE819AB210D7759885CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4799 5a4e9d0-5a4ea36 4800 5a4ea41-5a4ea48 4799->4800 4801 5a4ea38-5a4ea3e 4799->4801 4802 5a4ea53-5a4eaf2 CreateWindowExW 4800->4802 4803 5a4ea4a-5a4ea50 4800->4803 4801->4800 4805 5a4eaf4-5a4eafa 4802->4805 4806 5a4eafb-5a4eb33 4802->4806 4803->4802 4805->4806 4810 5a4eb35-5a4eb38 4806->4810 4811 5a4eb40 4806->4811 4810->4811 4812 5a4eb41 4811->4812 4812->4812
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05A4EAE2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 24a2e281a8502685ef85e6f8158abcc2096b2e0aa248e0332b622fd4272e480f
                                                • Instruction ID: c462b00c889808a6a2b10eb0a092a1aee775ade38ab901aaaec64df4603d0472
                                                • Opcode Fuzzy Hash: 24a2e281a8502685ef85e6f8158abcc2096b2e0aa248e0332b622fd4272e480f
                                                • Instruction Fuzzy Hash: 1B41A0B1D10359DFDB14CF9AD884ADEBBF5BF88310F24812AE819AB210D775A845CF91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4813 5a31080-5a310bc 4814 5a310c2-5a310c7 4813->4814 4815 5a3116c-5a3118c 4813->4815 4816 5a3111a-5a31152 CallWindowProcW 4814->4816 4817 5a310c9-5a31100 4814->4817 4821 5a3118f-5a3119c 4815->4821 4818 5a31154-5a3115a 4816->4818 4819 5a3115b-5a3116a 4816->4819 4823 5a31102-5a31108 4817->4823 4824 5a31109-5a31118 4817->4824 4818->4819 4819->4821 4823->4824 4824->4821
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 05A31141
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122655296.0000000005A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A30000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a30000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 1b4f6ab3c0397580a6e78b39fddf7d2907b52939de82ede45afc835e3060f427
                                                • Instruction ID: 474df62ca76734555c62a47442b12c805c4ba2c4d022b29c7bdde0e1129cf714
                                                • Opcode Fuzzy Hash: 1b4f6ab3c0397580a6e78b39fddf7d2907b52939de82ede45afc835e3060f427
                                                • Instruction Fuzzy Hash: 614106B4A00249DFDB14CF99C849EAAFBF5FB88314F24845DE519AB321D375A841CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4827 27749d3-27749d4 4828 27749d6-27749e9 4827->4828 4829 2774a34-2774a3c 4827->4829 4834 27749ec-27749fa 4828->4834 4830 27749c7 4829->4830 4831 2774a3e-2774a3f 4829->4831 4832 277d220-277d28a PostMessageW 4830->4832 4831->4832 4835 277d293-277d2a7 4832->4835 4836 277d28c-277d292 4832->4836 4839 27749fe-2774a00 4834->4839 4840 27749fc 4834->4840 4836->4835 4841 2774a01-2774a03 4839->4841 4842 277498b-277498c 4839->4842 4840->4839 4841->4829 4842->4834 4843 277498e-2774996 4842->4843 4843->4830
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b55b37886b8059975daf1a97239a4f07c7653ac62158620439eead14dcadae9b
                                                • Instruction ID: 090863b9fc4fb26c1134fc31ab0cb142cc30dacf6b21322211286eaad229b6f2
                                                • Opcode Fuzzy Hash: b55b37886b8059975daf1a97239a4f07c7653ac62158620439eead14dcadae9b
                                                • Instruction Fuzzy Hash: B931E2718093899FCF12CF69C8517DBBFF4AF1A214F14809AD484AB252D3389948CFA2
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07309BC3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: f5a6fdf5726118555b7c3df62fe660ef67f54d1c41682b896bca464d8b5358a6
                                                • Instruction ID: 410d263ca4d0e673cbeaf645a7368e7d2e8a7380a247c94aa4675d1fbe9c52fc
                                                • Opcode Fuzzy Hash: f5a6fdf5726118555b7c3df62fe660ef67f54d1c41682b896bca464d8b5358a6
                                                • Instruction Fuzzy Hash: B0318CB580038ACFDB11CFA9D484BDEBFF0EB49320F24845AE458A7242C378A544CFA1
                                                APIs
                                                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0277C258
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: MemoryProcessWrite
                                                • String ID:
                                                • API String ID: 3559483778-0
                                                • Opcode ID: 423a53bf3d2ebca9e44476a558ffa609baafd7f9491e7ff8f7cda387874bf0f7
                                                • Instruction ID: 62a8fbac93fdd79d7deebfd62161ae5da414835e2a770d17f8256c4d4105a21a
                                                • Opcode Fuzzy Hash: 423a53bf3d2ebca9e44476a558ffa609baafd7f9491e7ff8f7cda387874bf0f7
                                                • Instruction Fuzzy Hash: 74212272900349DFDB10CFAAD881BEEBBF5FF48310F14842AE919A7240C7799940CBA4
                                                APIs
                                                • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0277B7FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: 13a35b4e3a7910d8e3669b15c8f04e985bf231f3c99614935a3e3c74248e376b
                                                • Instruction ID: 8873234996ab15bc8720a2dcae62baf21d847b8390dbc98750451712eca0259a
                                                • Opcode Fuzzy Hash: 13a35b4e3a7910d8e3669b15c8f04e985bf231f3c99614935a3e3c74248e376b
                                                • Instruction Fuzzy Hash: 79212771D003099FDB10DFAAC485BEEBBF4EF88314F14842AD519A7241DB789945CFA5
                                                APIs
                                                • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0277C9C6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ContextThreadWow64
                                                • String ID:
                                                • API String ID: 983334009-0
                                                • Opcode ID: c1d330157f5c4dfe697369cac043e784f654cd5373c976909ba54bd7c1789754
                                                • Instruction ID: 85bb02ef6c193075035f29adbf183723b976e6c6121304f076869423b27093a1
                                                • Opcode Fuzzy Hash: c1d330157f5c4dfe697369cac043e784f654cd5373c976909ba54bd7c1789754
                                                • Instruction Fuzzy Hash: 48214771D003098FDB10DFAAC4857EEBBF4EF88214F14842ED459A7240CB78A944CFA5
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05A4A707
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 185931a3a7ed385739532eac5674ee2ef10acac1aef7f39621d28456d820f9d8
                                                • Instruction ID: c164da8a0f6c1aaa246960335d69eb078933d2f4c9a106c0c85834028465b002
                                                • Opcode Fuzzy Hash: 185931a3a7ed385739532eac5674ee2ef10acac1aef7f39621d28456d820f9d8
                                                • Instruction Fuzzy Hash: 1321D5B5900248DFDB10CFAAD884ADEFBF9FB48310F14841AE919A7351D374A944CF65
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05A4A707
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: e9ed866613dbe94d826cc187421f397536b2dd8861be2bbf99cb95f5f7e09dad
                                                • Instruction ID: 0ce76f2bcbf35dbf722a9484bae329da0b8e4888ca5891b1b7ac4ce671b108b3
                                                • Opcode Fuzzy Hash: e9ed866613dbe94d826cc187421f397536b2dd8861be2bbf99cb95f5f7e09dad
                                                • Instruction Fuzzy Hash: FB21E2B5900248DFDB10CFAAD984ADEBBF5FB48310F14841AE918B3311D378A940CF61
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05A48481,00000800,00000000,00000000), ref: 05A48692
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 50be2d254753d2ce0f7520b6de6a7b176b8d4d48f9c058cbd3a4189ac78e3ebe
                                                • Instruction ID: 4d82f1fead9972363d8e70626b7eadc031b7530482eb74b8fd3d014c0074ee07
                                                • Opcode Fuzzy Hash: 50be2d254753d2ce0f7520b6de6a7b176b8d4d48f9c058cbd3a4189ac78e3ebe
                                                • Instruction Fuzzy Hash: B52168B18043898FDB20DFAAD844ADEFBF4AF88210F14805ED459AB211C3789505CFA6
                                                APIs
                                                • VirtualProtectEx.KERNELBASE(?,?,?,?,?), ref: 0277C737
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 2004476632ab8bf70825ebafed32d8b19a77aaae3a0c0d4f6a83b1266f2706c7
                                                • Instruction ID: 5151064ea1658cac80be4bbba6d31c13f26e6429a4b169b2627a9fce343695da
                                                • Opcode Fuzzy Hash: 2004476632ab8bf70825ebafed32d8b19a77aaae3a0c0d4f6a83b1266f2706c7
                                                • Instruction Fuzzy Hash: 7B211571800349DFDB10DFAAC885BEEBBF5EF48320F14842AD519A7240CB799941DFA1
                                                APIs
                                                • DeleteFileW.KERNELBASE(00000000), ref: 05CD9C30
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123891257.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5cd0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: DeleteFile
                                                • String ID:
                                                • API String ID: 4033686569-0
                                                • Opcode ID: f6ce38b451fbffc8d4481b3f6f66ad40f7eae5a1fe3478b4850cb482c4bd0895
                                                • Instruction ID: 844d77a50807a48ea2452cb2f19b6bff71a50f22e040474481e326d0d6c1c17b
                                                • Opcode Fuzzy Hash: f6ce38b451fbffc8d4481b3f6f66ad40f7eae5a1fe3478b4850cb482c4bd0895
                                                • Instruction Fuzzy Hash: 5E2136B5C0065A9BDB14CF9AC445B9EFBF4BB48320F15852AD919B7240D338A940CFA5
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0277284B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 75d4f5ea9cea3ed6405ffb2d533672cb8e669ceb4da57517a851ab4e105b0330
                                                • Instruction ID: 18b097f85987087679b438013250b4c5f78746f63dc886d68a2c00be236403fc
                                                • Opcode Fuzzy Hash: 75d4f5ea9cea3ed6405ffb2d533672cb8e669ceb4da57517a851ab4e105b0330
                                                • Instruction Fuzzy Hash: 9721F4B5900649DFDB10CF9AC585BDEBBF4FB48310F14802AE858A7251D374A644CFA1
                                                APIs
                                                • DeleteFileW.KERNELBASE(00000000), ref: 05CD9C30
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123891257.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5cd0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: DeleteFile
                                                • String ID:
                                                • API String ID: 4033686569-0
                                                • Opcode ID: 6a6d6ea851dd3340423e479c582ef82f67c22792c60dc451fab2f7b4cb623bc1
                                                • Instruction ID: 6af52ae44a926b22c0342fab41a3cbaede3e62946fc2bc7c44d9cc928c5a3856
                                                • Opcode Fuzzy Hash: 6a6d6ea851dd3340423e479c582ef82f67c22792c60dc451fab2f7b4cb623bc1
                                                • Instruction Fuzzy Hash: 6E1144B5C0065A9BDB14CF9AC445B9EFBF4BF48320F14852AD918B7240D338AA40CFA5
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 07309BC3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 27ff00547692ca449356233f9ffdcd71cc0f4b5bc1463706b552f2af85f7bd27
                                                • Instruction ID: 28211ad22723945fc2a373d05f17397692dd2fea7e093d5d50c2fc6c6c1e4c70
                                                • Opcode Fuzzy Hash: 27ff00547692ca449356233f9ffdcd71cc0f4b5bc1463706b552f2af85f7bd27
                                                • Instruction Fuzzy Hash: 4721F6B5900649DFDB10DF9AC885BDEFBF4FB48320F14842AE958A7251D378A944CFA1
                                                APIs
                                                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0277284B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 5e3df1014626d190a47650995c19351de6f2f54a13e2152403d38589b38ffdc8
                                                • Instruction ID: f7d6cf83601ab4bbeef66397f92c709430c6b59112705182fc330b727c632637
                                                • Opcode Fuzzy Hash: 5e3df1014626d190a47650995c19351de6f2f54a13e2152403d38589b38ffdc8
                                                • Instruction Fuzzy Hash: A82114B5900249DFDB10CF9AC485BDEFBF4FB48320F10802AE968A7251D378A944CFA1
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05A48481,00000800,00000000,00000000), ref: 05A48692
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: cc9f476a4ea8118c65b38eed1a12c88176fa49517d9f901027df406dc389eadc
                                                • Instruction ID: 76b334ae90f5465fc42cb37f8afd0902020fd82c878c8f86cc0ff83efe447c18
                                                • Opcode Fuzzy Hash: cc9f476a4ea8118c65b38eed1a12c88176fa49517d9f901027df406dc389eadc
                                                • Instruction Fuzzy Hash: 6A1126B6C04249CFDB10CF9AD484BDEFBF5EB88310F14842AD819A7210C379A945CFA5
                                                APIs
                                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,05A48481,00000800,00000000,00000000), ref: 05A48692
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: c7789324725ab3e9f6f144778e0e9d68f4754c9bb6852cac0a06666dd6fe0f3b
                                                • Instruction ID: 45698c6ad274c14e341059f4d4d5834f93f887dad224be266d088fefab4631b6
                                                • Opcode Fuzzy Hash: c7789324725ab3e9f6f144778e0e9d68f4754c9bb6852cac0a06666dd6fe0f3b
                                                • Instruction Fuzzy Hash: AD1112B68003499FDB10DF9AD844B9EFBF5EB88310F14842AE919A7200C379A945CFA5
                                                APIs
                                                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0277BEBE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: a4abddc399bb888d826e5c0282ae9f19d921c6ad49d5b1672555182a4bd59b82
                                                • Instruction ID: 0819d108c6f23a57df552050fcb624b7d2fcd3de20d13c1e6034526635c2b10c
                                                • Opcode Fuzzy Hash: a4abddc399bb888d826e5c0282ae9f19d921c6ad49d5b1672555182a4bd59b82
                                                • Instruction Fuzzy Hash: 271123729003499FDB10DFAAC845BDFBBF5AF88324F24881AE519A7250C775A940CFA1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: ResumeThread
                                                • String ID:
                                                • API String ID: 947044025-0
                                                • Opcode ID: b1b541525d2890ef3c16d345b04fc78cc68aec2eaa796ab0bf1db33cd0cb1c7f
                                                • Instruction ID: 8df0febe05553c04bf23521b7e3bcdaba6ce8d8058e51c39946fe71685a668c4
                                                • Opcode Fuzzy Hash: b1b541525d2890ef3c16d345b04fc78cc68aec2eaa796ab0bf1db33cd0cb1c7f
                                                • Instruction Fuzzy Hash: 22113671D003488FDB24DFAAD84579FFBF5AB88224F24841AD519A7240CB79A940CFA5
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,?), ref: 0277D27D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: MessagePost
                                                • String ID:
                                                • API String ID: 410705778-0
                                                • Opcode ID: 463c00d2c92b4575e3839744e4fb4cbe01aacc4ef76a7678fe3711a4adf431bc
                                                • Instruction ID: 452d83ff2498fc538fbf12c64f25500a24180bfaa35c19f3bb54d7114ced8530
                                                • Opcode Fuzzy Hash: 463c00d2c92b4575e3839744e4fb4cbe01aacc4ef76a7678fe3711a4adf431bc
                                                • Instruction Fuzzy Hash: C211E0B5800348DFDB20DF9AD545BDEBBF8EB58320F10845AE918A7210C375A944CFA1
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000), ref: 05A48406
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID: HandleModule
                                                • String ID:
                                                • API String ID: 4139908857-0
                                                • Opcode ID: 50af84813268cbb65f58bc8f8fbdf60f9b74c2a19e2306a72a105b347f7994e5
                                                • Instruction ID: 5fdd5bd413890877bcae7fe02e0b1fd38167d662f3bbe4a3233a3d16ee017de6
                                                • Opcode Fuzzy Hash: 50af84813268cbb65f58bc8f8fbdf60f9b74c2a19e2306a72a105b347f7994e5
                                                • Instruction Fuzzy Hash: 0311E0B5C007498FDB10DF9AD844BDEFBF4AB88220F14842AD529B7210C379A545CFA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 659ae38eb6e107345c54fcccc643cb23158f0a6b297cc9a7de77199546e40ec6
                                                • Instruction ID: c4521f67c0939ba7369702fb887b844a417600a673c18e8bd890d5164faa0428
                                                • Opcode Fuzzy Hash: 659ae38eb6e107345c54fcccc643cb23158f0a6b297cc9a7de77199546e40ec6
                                                • Instruction Fuzzy Hash: 82520F34A0031CCFEB559BA8D860BAEBB72FF94300F1080A9D11AAB391DF355E859F51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4754a9fc8ec326d30ac64e324eef5da4c0872ecfd332457a650d4c5648ed62aa
                                                • Instruction ID: bf1cebfb1b40282c968df5f9289093a09692b29b5f5f737383bfb418ea743d75
                                                • Opcode Fuzzy Hash: 4754a9fc8ec326d30ac64e324eef5da4c0872ecfd332457a650d4c5648ed62aa
                                                • Instruction Fuzzy Hash: 8BE12170B18351CFCB05ABB8E85925D7BF2BF8A210F4185BAD485EB3A1DB3C9805C761
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b2630e65d12fd1a8fd78f696b27441372873d5176cf790134e11dd81e1da5ea1
                                                • Instruction ID: 46f463a899fcfc9065fcbce32333969f478e174cb2c3c67bc836848cb956062d
                                                • Opcode Fuzzy Hash: b2630e65d12fd1a8fd78f696b27441372873d5176cf790134e11dd81e1da5ea1
                                                • Instruction Fuzzy Hash: 1DC1DF71B14216CFCB04BFB8E88E22DBBF1BB89210F414979D881E7354DE39A845C791
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 45e3ea3adf8dee58c382069b7b452c326cc3fb200c0fd551d28986606843483f
                                                • Instruction ID: 02afc71a4db3487ec5436f61f17ba643540c7d646142a08c1b162a293a0abd3e
                                                • Opcode Fuzzy Hash: 45e3ea3adf8dee58c382069b7b452c326cc3fb200c0fd551d28986606843483f
                                                • Instruction Fuzzy Hash: FAE13E75A40204CFCB05CFA8D98499DBBF2FF89355B5A8199E455BB362CB30EC41CBA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f4c903604425043fb31090f048fdabd4f73f6be69907f12b693db9b735697c4
                                                • Instruction ID: 017afe3ea5312066f2b8871f772ce175bdf5ff4858683b6ac523f227147d3a90
                                                • Opcode Fuzzy Hash: 0f4c903604425043fb31090f048fdabd4f73f6be69907f12b693db9b735697c4
                                                • Instruction Fuzzy Hash: ECC19170B14205CFCB08BFB9E89956DBBF2BB8A214F418879E445E7360DE39A805CB50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ec8a3c1ad71934b832e803de364d355df3ee1ab2e8650c34ee28302f879032d9
                                                • Instruction ID: 49d5a1c4005bc78ac0c8e98547c6258fdb7b42c5fa6f89fb1b80a64c240597b8
                                                • Opcode Fuzzy Hash: ec8a3c1ad71934b832e803de364d355df3ee1ab2e8650c34ee28302f879032d9
                                                • Instruction Fuzzy Hash: 8EB171303841018FDB299B79E99477D3796EF95784F1950AAE102DF3B2EB29CCC29741
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1bbe54da5779acf36925bcffcf01b02418c6dff781f7804ad04367f13d1caee0
                                                • Instruction ID: c079a74c938913801932b77c1b4971fe39b2a81d65deab8a93ceedf3731f3773
                                                • Opcode Fuzzy Hash: 1bbe54da5779acf36925bcffcf01b02418c6dff781f7804ad04367f13d1caee0
                                                • Instruction Fuzzy Hash: DBB1CF70B14215CFCB04BBB8E8996AD7BF2FF8A214F418579D485EB3A0DB399806C751
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31052a84c96533a7fcfc7177d7c45ed935c2b424e8ff2eea8510d4f6b197c8d3
                                                • Instruction ID: 0c5250c8e1acb44130209cd7341e2c56f9b8ec68334f119eb8d1766ebf1bf96d
                                                • Opcode Fuzzy Hash: 31052a84c96533a7fcfc7177d7c45ed935c2b424e8ff2eea8510d4f6b197c8d3
                                                • Instruction Fuzzy Hash: DFB1BE70B14215CFCB04BBB8E89D66D7BF2BF8A214B418979D445EB390DB39A805C761
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8b6dd2cb91bd38783589fc9d9c321e32fd6b25ac1a0fd9148d916c3dffbefb62
                                                • Instruction ID: ecf94510b37b53d5ddd3a6e3b0a8c592f3959c2d3b9674c4143cf750a194b918
                                                • Opcode Fuzzy Hash: 8b6dd2cb91bd38783589fc9d9c321e32fd6b25ac1a0fd9148d916c3dffbefb62
                                                • Instruction Fuzzy Hash: 94A1D171B14212CFCB04BFB8E89926DBBF1EB89610F4448BAD481D7390DE39A845C791
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f64319ef65fc319a98604f1bb56bceb9adda2a39377e6b90fe1bd707432e9ece
                                                • Instruction ID: 7aab3c4d78d1debd50b76c36df9de3618e9671e5e647aeeb7a04e2828f6cb688
                                                • Opcode Fuzzy Hash: f64319ef65fc319a98604f1bb56bceb9adda2a39377e6b90fe1bd707432e9ece
                                                • Instruction Fuzzy Hash: 98A1D1307402089FDB15AFA4E858B6E7BA6FBC8394F148429E506EB395CF70DD41DB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b0b065919596e478c1950541d3f47bb72806054cdc0a39a6952e8f11b2203b95
                                                • Instruction ID: 35405b62d80215775fc25f27b10b539ff82cf1c9c93753913cd07753ee039eab
                                                • Opcode Fuzzy Hash: b0b065919596e478c1950541d3f47bb72806054cdc0a39a6952e8f11b2203b95
                                                • Instruction Fuzzy Hash: 4691C071B14616CFCB04BFB8E89D26DBBF1EB89210F444979D881D7390DE39A849C7A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a0414121e6a0a965c2fc46df44ecb4c47beba49ad1c4fafaf924d92468e8e211
                                                • Instruction ID: 516c0ef94657d237c85e309c5b714343990d62c4a87af3ff759cdb3cb1fdbb3b
                                                • Opcode Fuzzy Hash: a0414121e6a0a965c2fc46df44ecb4c47beba49ad1c4fafaf924d92468e8e211
                                                • Instruction Fuzzy Hash: EB91B370B2420ACFC704FBB9E99966EB7F2BF89610F408979D441A7354EB399C44C7A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 436a2120e4ee8282bf46eec44b0ab5179128cae6eaa9132e4ff6fcd6c10222ad
                                                • Instruction ID: 742871f0c254d1d5c7d9de7b5a0d33584086b44f655275270b6462424742d046
                                                • Opcode Fuzzy Hash: 436a2120e4ee8282bf46eec44b0ab5179128cae6eaa9132e4ff6fcd6c10222ad
                                                • Instruction Fuzzy Hash: C291A430A40209CFCB14DF68E984B9DBBB1FF84354F1581A9E855AB3A2CB31ED41CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f14eaba4912e2ad070a121372b7d07ef4c4c40baa1460a7b31af36dbf776a93f
                                                • Instruction ID: 5fc109e1a791c41f0941a252e5a1caac6485bc0aeafdb3ef358e8f161b94be83
                                                • Opcode Fuzzy Hash: f14eaba4912e2ad070a121372b7d07ef4c4c40baa1460a7b31af36dbf776a93f
                                                • Instruction Fuzzy Hash: E5718F313842108FDB149B39E454B69B7A6AF84794B1950BAE805EB3B2DF35CCC1D750
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6c1950a47e032603fba844cbd5241fcf98cf28e598bdde7184af474723e02758
                                                • Instruction ID: 5db9626cf73dfe83fd53fede68e0b46843f4bb319a3264e12bf661c7c9ef0e7b
                                                • Opcode Fuzzy Hash: 6c1950a47e032603fba844cbd5241fcf98cf28e598bdde7184af474723e02758
                                                • Instruction Fuzzy Hash: 7171D330B14206CFC704FBB9E99A66EBBF2BB85610F41457AD444E7354DE389C48C3A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 910be014f93c8e339f65f16d81ff956cad75cd76ecf3557d85f09f10e6c09c3b
                                                • Instruction ID: 2167e55daa72caa240aa97bc74d53a5cbdfba2fbf232cb8f37227e1ec958cfb5
                                                • Opcode Fuzzy Hash: 910be014f93c8e339f65f16d81ff956cad75cd76ecf3557d85f09f10e6c09c3b
                                                • Instruction Fuzzy Hash: BB6102303542048FDB199B79E85473E7BA2AFC8398F24952EE442DB3A1DF74DC41A790
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 280645be78e7e42d6d7da42c867697550a4f3bb1f64027da9bd13b57f942e9ec
                                                • Instruction ID: dbb9dcca4fe00f2cdf75ea0e5aa3ec1bf0693f4b51dda7e7b873d94a05c52cac
                                                • Opcode Fuzzy Hash: 280645be78e7e42d6d7da42c867697550a4f3bb1f64027da9bd13b57f942e9ec
                                                • Instruction Fuzzy Hash: C35103303843044FD7289A7DAC54B7A77A7AFC5750F2981A9E196EB3E5CE30DC0183A5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1add83e48815b0edaded0e54ca6f6117eb8463117dec2830059b60b31ee2e798
                                                • Instruction ID: 8ea7cd01ae53e25873884371d28cbe3cc8956b0765b74aa58a72f6dc16b27594
                                                • Opcode Fuzzy Hash: 1add83e48815b0edaded0e54ca6f6117eb8463117dec2830059b60b31ee2e798
                                                • Instruction Fuzzy Hash: DE51B531B441018FD714DF39E99896A7BE5EF8579432E50BAE41AEB262DB30DC01CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ef566152b8723f2bc7fad907581ae8a27cd53769aba2c12f41b9e69de0a93843
                                                • Instruction ID: 8c83463a69029f9efb5ca5c21b32ca001762d939dfa9ca66c5e8c5020e860f7f
                                                • Opcode Fuzzy Hash: ef566152b8723f2bc7fad907581ae8a27cd53769aba2c12f41b9e69de0a93843
                                                • Instruction Fuzzy Hash: 19617E34A90A05DFCB14CF69E8889A9FBB2FF89344B259169D442FB361D731EC41CB61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c14cc7f5a7561be9797598d45f2d896be80cae07fe8812d79e19be445818fb8a
                                                • Instruction ID: cdfd74d1ab8a15676f92c270f7a744bfa432247c5c315809e08f0c7dd469b066
                                                • Opcode Fuzzy Hash: c14cc7f5a7561be9797598d45f2d896be80cae07fe8812d79e19be445818fb8a
                                                • Instruction Fuzzy Hash: 0351D3317442488FDB29AB756C6427E3AE76FC1780318546AE407EB3E2DF28CC86A751
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d381b0016e840165860acb0b4f18e0edb4ed31d14e751598726436a28ff11a80
                                                • Instruction ID: f383a87b358fd91eae510c99e719465350598fcdd262c7c3267e3306932ba1e0
                                                • Opcode Fuzzy Hash: d381b0016e840165860acb0b4f18e0edb4ed31d14e751598726436a28ff11a80
                                                • Instruction Fuzzy Hash: 2A51F2717842148FDB159F64E854BAE7BE2FF85348F088469E805BB3A2DB75CC01DB92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1815234f6926f7a775a999ce9b42f3e93f285f37895c61642ff882738e60a5cb
                                                • Instruction ID: 834b5cff2ceca3041bfa91a075dd170fdd4eb1b3a6606746d3d74aeccaa0ee51
                                                • Opcode Fuzzy Hash: 1815234f6926f7a775a999ce9b42f3e93f285f37895c61642ff882738e60a5cb
                                                • Instruction Fuzzy Hash: 8341BD357042048FDB189BA8E954AAE7BB6BFC9750F24416AE506E73A1CE309C028B91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c83892323c2a524982894ed3329ce0ac4e7adeee0d11e6454a6610857f6114f7
                                                • Instruction ID: 2eda835eb17fa910da0d7713a38e6b1cf463fd8030b04d0de915b0acb1480911
                                                • Opcode Fuzzy Hash: c83892323c2a524982894ed3329ce0ac4e7adeee0d11e6454a6610857f6114f7
                                                • Instruction Fuzzy Hash: 62510734A402048FCB44DF69D498AADBBF2BF8D354F2580A9E855EB3A2CB759C41CF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 53f7a69ee1aaac45440bceb5c3d25018b73389c696147df6954237eca96dc201
                                                • Instruction ID: a6f2fd0c855d1665ea11c112a7e10b2f9e9c2d2b2863e624920a0259fd2d90bb
                                                • Opcode Fuzzy Hash: 53f7a69ee1aaac45440bceb5c3d25018b73389c696147df6954237eca96dc201
                                                • Instruction Fuzzy Hash: 1241AE35B06213AFDB215BB57C0836EBAD56FC2350B25847AD445E7292DF39CD46C780
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e8c1b2ce34bb87e2f8e65e38c43ac81916aa4c29646d2d5868f83000365cca41
                                                • Instruction ID: 5c907d9faa4b0cf1cea9611e29ae9e5807f813279c79854cccca8baf6677a76c
                                                • Opcode Fuzzy Hash: e8c1b2ce34bb87e2f8e65e38c43ac81916aa4c29646d2d5868f83000365cca41
                                                • Instruction Fuzzy Hash: EC412436B406058FCB149BB8E8546AE77E2BFC9744F15856AE406EB3A1EF30CC01DB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e17efe73f83c5c2531573cabe9bdb0f1a392d6029c7851fc5b85459ab5d71a4c
                                                • Instruction ID: a750d8c561b84bb92774c45ef67b285daafb8f186e6b5c7bc831e30ed0bfa3a2
                                                • Opcode Fuzzy Hash: e17efe73f83c5c2531573cabe9bdb0f1a392d6029c7851fc5b85459ab5d71a4c
                                                • Instruction Fuzzy Hash: 72417E74A442058FCB14DF68E888AAE7BB1BF48754F18006AE516EB3B1C730DD40DFA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 886b4d32c7cdae8a78611b0666b8e11984ffe2abb0a02b9e6d13ee5ce0691317
                                                • Instruction ID: 6a232f2b9c3083b19e37acedf44addd0fe563468a64cbc0451120dd4838b8ef8
                                                • Opcode Fuzzy Hash: 886b4d32c7cdae8a78611b0666b8e11984ffe2abb0a02b9e6d13ee5ce0691317
                                                • Instruction Fuzzy Hash: 9741F5317482589FCB159F68EC5466E3BE2EF85394B458069F80ADB3A2CB34DC41DBA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 77710973267988db6c6f3edf02ea15371283fc8e709469fef122455f343546a8
                                                • Instruction ID: 935fc6355ccca41ea689b48354f59d414816e1928df0c11b61285d6106a6d524
                                                • Opcode Fuzzy Hash: 77710973267988db6c6f3edf02ea15371283fc8e709469fef122455f343546a8
                                                • Instruction Fuzzy Hash: 3E31D630718211CFCB08BBB9E8A9A6E7BF6BFCA614B11446AE445DB352DE398C05C351
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f5e1be7539ae2aac1625c2cef1d67f2df977407716051c385860069acecd5f97
                                                • Instruction ID: 52536b39e1560aa52b1233768eecbe1896f6724aee01951cca66e5d3133f39a9
                                                • Opcode Fuzzy Hash: f5e1be7539ae2aac1625c2cef1d67f2df977407716051c385860069acecd5f97
                                                • Instruction Fuzzy Hash: E931C371B843118FDB149B78A814A3A3BE6BF8A750B1594B9E506EF3E1DE71CC01C791
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 91c713e5ba6289f26533ad17819bffe3415f3883d1dcd7c89b766013a622081a
                                                • Instruction ID: 3bfeab586081c8a7056d2200c1777c4562c407118e4a67338c9bc1bb50743a12
                                                • Opcode Fuzzy Hash: 91c713e5ba6289f26533ad17819bffe3415f3883d1dcd7c89b766013a622081a
                                                • Instruction Fuzzy Hash: 16214730B442408BDB151779A8A077E3793AFC5788F1C903AD402EB3A1EA65CC82EB42
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c55a22c8b926d7838a2f718691b475e75573e427a280c8597b116166feecd399
                                                • Instruction ID: 5e3ad73b7b00276ab3dfe9da05c3b621ea2a484125a4b49de955255e1d7fce92
                                                • Opcode Fuzzy Hash: c55a22c8b926d7838a2f718691b475e75573e427a280c8597b116166feecd399
                                                • Instruction Fuzzy Hash: 003162317046099FCF05AFA8E85466E7BA2FB88354F50C029F9059B3A5CB35DD51FB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9b0af860a26b2b312cc4b389513390447597d6cd78e8328b965166f561d69d40
                                                • Instruction ID: 15e49c624eb001ae0e0b502205b0ea99b5707fee5226d531189b6892bfea7d43
                                                • Opcode Fuzzy Hash: 9b0af860a26b2b312cc4b389513390447597d6cd78e8328b965166f561d69d40
                                                • Instruction Fuzzy Hash: 3D21BF30714115CFCB08BBBDE899A2E7BEABFC9614B40486AE445DB351CE3A9C058391
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 25aa6f23c46ed6ee5b55cdeada101a7950dff70b19bb3bfa0e7f028165a8828e
                                                • Instruction ID: e435c997f963bdfd8700d82e3c8702bdc2005ee068fbc1e7c0567f3454f684ad
                                                • Opcode Fuzzy Hash: 25aa6f23c46ed6ee5b55cdeada101a7950dff70b19bb3bfa0e7f028165a8828e
                                                • Instruction Fuzzy Hash: 8221A231B481458FCB14DFA5B984ABB7BE9AB85788B2D9437E451FB241DB30CC40DB62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5f2cf3892bd371df7a562c73ffb8a1f4f71a6934eba9cc296504f3df2b36cd3d
                                                • Instruction ID: d6c85c84bc2d8051aff9f1a91db0875787bed9b4cb43fdb852526898257e22c8
                                                • Opcode Fuzzy Hash: 5f2cf3892bd371df7a562c73ffb8a1f4f71a6934eba9cc296504f3df2b36cd3d
                                                • Instruction Fuzzy Hash: B42125317546118FC7159B78D86492EBBA2FFC63947158179DC46EB3A5CE31DC02CB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5995c58a0acaaf4af8c671734d670a200324713e32e3613b46117c50a103e85b
                                                • Instruction ID: 413b76ac2cd8e2ce68edcd25bf9159652f77758155249dadd87b7f3f1e1c6df5
                                                • Opcode Fuzzy Hash: 5995c58a0acaaf4af8c671734d670a200324713e32e3613b46117c50a103e85b
                                                • Instruction Fuzzy Hash: 9021B031718211CFC704BBB8EC9966F7BE5FB89224F80497AD449D3390DA399805C3A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4338a6f85eaacd2b6207c194499f22eb0f07c27ac8b16e5a8f18292db05c135
                                                • Instruction ID: b84a30c779a490c2128e7df16bfd8c6f5be0ca9ea8ede8fae5c2aab30c2b7f95
                                                • Opcode Fuzzy Hash: e4338a6f85eaacd2b6207c194499f22eb0f07c27ac8b16e5a8f18292db05c135
                                                • Instruction Fuzzy Hash: 4B218E7A7405108FC7149B2DE884A2AB7E6AFC8B64B19407AE805EF372DF71DC41CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111400735.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_99d000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9f62645828c6ac103cc16f0a04931cdbad91f7270c733c47da54c7c5a2d71247
                                                • Instruction ID: 1fbbca088657d01cf696b25640faaf13751fd33e14aac74777cce01e7595fb40
                                                • Opcode Fuzzy Hash: 9f62645828c6ac103cc16f0a04931cdbad91f7270c733c47da54c7c5a2d71247
                                                • Instruction Fuzzy Hash: F2213472504304EFDF14DF18D9C1B2ABFA5FB98319F24C569E8090B246C33AD856CBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f22f58f507fa99dc7813a0915b43f2cf7ff7c2997f8767ab53927bfaeb339b98
                                                • Instruction ID: 8f54af59cd3271627c7c1c8515b313850dcd62df5fcfa5bb50f3d9d8fe75bb99
                                                • Opcode Fuzzy Hash: f22f58f507fa99dc7813a0915b43f2cf7ff7c2997f8767ab53927bfaeb339b98
                                                • Instruction Fuzzy Hash: 95119D31B14215CBC704BBF9EC9966F77AAFB89224F80893AE409D3354DE39981583A0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111461641.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9ad000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: db15c0e6116d1ce2da704969bc636ef2cc28e548ee43df795c4d48ca86b1c2e2
                                                • Instruction ID: 2712e1a7df6c75b0b008ce81cd0edeb124150dc52e5a6f0c6af3f3c8df715742
                                                • Opcode Fuzzy Hash: db15c0e6116d1ce2da704969bc636ef2cc28e548ee43df795c4d48ca86b1c2e2
                                                • Instruction Fuzzy Hash: CD213771504304DFDB14DF24D9C0B26BB65FB85314F20C96DD80A4B646C33AD807CAA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111461641.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9ad000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 28582ff7895609351d9efabacdc079fadeb17fdc6b582aaf5c3c7ee4089ae214
                                                • Instruction ID: 0cdb05c14788b61bcbb850cde70df489c56f7dfd5cdc56566eb0a1a60631e47a
                                                • Opcode Fuzzy Hash: 28582ff7895609351d9efabacdc079fadeb17fdc6b582aaf5c3c7ee4089ae214
                                                • Instruction Fuzzy Hash: 47212971504304EFDB05DF54D9C0B25BB65FB85318F24C96DEC0A4B652C33AD846CBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 008f218828f8083bd04a969f7a2d7fd83c4fd95cc225a980453eda5ea72d4641
                                                • Instruction ID: af99188f373c07bdc943f2f3e58c863fd70f47e4fca1dfd5d61e3bab3ea653e9
                                                • Opcode Fuzzy Hash: 008f218828f8083bd04a969f7a2d7fd83c4fd95cc225a980453eda5ea72d4641
                                                • Instruction Fuzzy Hash: 2311C6313043295FE328DABF6860B7B22CB7FC8B94F354479A486DB394DE65CC4192A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82ed57b514619983b644e0269d135f47c36b10e5ba4c3238254b01846263c167
                                                • Instruction ID: 5f661f5de0257501928048c10140e34b4889d0190cc9584ad1979b65021a7c2a
                                                • Opcode Fuzzy Hash: 82ed57b514619983b644e0269d135f47c36b10e5ba4c3238254b01846263c167
                                                • Instruction Fuzzy Hash: AC11B475B001088FDB589BBDAC1826E76A7BBC83A1B144139E406DB3E0DE358D0187D0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 56c6663bb7701e3f70186889d3ef70ae26aa0ea016117e5e72680de3e91d93f4
                                                • Instruction ID: 40c7eb16c96b99fb0d449bcf9ded7223425aecf14d68e1e9e6954591b6b95d64
                                                • Opcode Fuzzy Hash: 56c6663bb7701e3f70186889d3ef70ae26aa0ea016117e5e72680de3e91d93f4
                                                • Instruction Fuzzy Hash: 8E117DB6F481044FCB148BBD6C152AE7AA7BBC53A0B58113AD055DB3E5EE318D06D7A0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bb5c3cc3a227a535d39cc8828a2b7f1567c52324a1c3d8b2f18a0c4c2ec317c6
                                                • Instruction ID: a185f03d5b6d8c1edbfbb28a416cb620c47297a3fecba281a8f99062105af60b
                                                • Opcode Fuzzy Hash: bb5c3cc3a227a535d39cc8828a2b7f1567c52324a1c3d8b2f18a0c4c2ec317c6
                                                • Instruction Fuzzy Hash: 4021D532749648DFCB019F68E85476E3BA1FF85358F448069F805DB2AACB34DD14EBA1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e4b7398563bdfbd09f216534f94b8291b9ecc3e135a157b761506906899c1750
                                                • Instruction ID: dcd63ec14cfaabb87a1c53cca62462b8aa70a3773adc3ced6139d2719afa4e28
                                                • Opcode Fuzzy Hash: e4b7398563bdfbd09f216534f94b8291b9ecc3e135a157b761506906899c1750
                                                • Instruction Fuzzy Hash: 8B21723AB051089FCB148FA5DD88BDEBBB6BF8C350F144169E516A72A0CA719C11CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d170ccc387af65a0689ee36de6c5c071b05dbb9aa39785dbc9bf52f0ec41af27
                                                • Instruction ID: 64ce752fb37bfa25f7f1a9b6b4721f2c85966b48eb585fbcc79f005d7bb31619
                                                • Opcode Fuzzy Hash: d170ccc387af65a0689ee36de6c5c071b05dbb9aa39785dbc9bf52f0ec41af27
                                                • Instruction Fuzzy Hash: B411BE317406159FD729DA69E844FAAB3A6BF85708F008639E109DB360DF34EC05CBE0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 17895757a6f178ae75a2fe42e052642bbda2cebfc8fa0432ab745560e32cdf8a
                                                • Instruction ID: 64f56033a700c19b05b046034c0a431311eb4814748a7b2b724c963f14f11ade
                                                • Opcode Fuzzy Hash: 17895757a6f178ae75a2fe42e052642bbda2cebfc8fa0432ab745560e32cdf8a
                                                • Instruction Fuzzy Hash: 3E11CE71B24215CFCB04BBF8EC9A26EB7E1FB89224F804A7AD445D3350DE3D98598391
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7c9cbe5b96a7b29c2ecdbbee8e39000e82765367421672fae39e4b10c88403a5
                                                • Instruction ID: cef453fd5cdffe5cffe947722833d6975d542b753be2a52dcc5dbad65a32f203
                                                • Opcode Fuzzy Hash: 7c9cbe5b96a7b29c2ecdbbee8e39000e82765367421672fae39e4b10c88403a5
                                                • Instruction Fuzzy Hash: 9F21AC319042089FCB20CF54D948BAABFF1EB48359F04C66EE4AAAB651D7749D44CFA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111461641.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9ad000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a297d9648d5616edf592652d7f7dca654faf2c9257ca9ff2c258d7690e00612
                                                • Instruction ID: 8d2205bcb0014dd2f4f2165ec54acd189158010e266247e740b9c0799ddab4fe
                                                • Opcode Fuzzy Hash: 0a297d9648d5616edf592652d7f7dca654faf2c9257ca9ff2c258d7690e00612
                                                • Instruction Fuzzy Hash: 5821A175509380DFDB12CF20D994715BF71EB46314F28C5DAD8498F697C33A980ACBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8d7e9da83df538f4e642b0962275ab6a4e400ffb33771ec51f3eb2d6d83458fe
                                                • Instruction ID: fc809609a60a02a74aab92db719bdbe361fc27e72e0fe5a61491e2fca0c300e7
                                                • Opcode Fuzzy Hash: 8d7e9da83df538f4e642b0962275ab6a4e400ffb33771ec51f3eb2d6d83458fe
                                                • Instruction Fuzzy Hash: 9811E231A492498FCB119F68E8946AA3FA1EF45394F085039FC05EB252CB35CD54DFE2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111400735.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_99d000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                • Instruction ID: 268af2475f3ffb48d7fefcd675fdd987c791ef253c775ab41235202a514ac623
                                                • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                • Instruction Fuzzy Hash: 0311D376504240DFCF15CF14D9C5B1ABF71FB98314F24C5A9D8090B656C33AD85ACBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b33294796ccb64fa33c87f1116a9374643367b4e6d90d054e1f433bdb2e5893d
                                                • Instruction ID: afe691186b4461198b1b9c1226008227a535d594d6cc8875a6ab5dee9caa1c79
                                                • Opcode Fuzzy Hash: b33294796ccb64fa33c87f1116a9374643367b4e6d90d054e1f433bdb2e5893d
                                                • Instruction Fuzzy Hash: BF11C231A401099FCB519F68E884AAA7BA5FF443A4F045039FD05BB251DB32DD60EFE1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111461641.00000000009AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 009AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_9ad000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                • Instruction ID: 70e052cf074abddaf927c0dd891dc43dec4f359951deafaf17ce3012162af1b1
                                                • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                • Instruction Fuzzy Hash: 22118B75904280DFDB15CF10D5C4B15FBA1FB85314F24C6A9DC4A4BAA6C33AD84ACBA2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 634d5753afe8d4d2d536358c8ad6078c526d1308fe038fcd4f1668f9cb2d6f72
                                                • Instruction ID: 9288ed979ed75270dd01f3d06e0bd4dc6bccd82c8ee1338db460e6c0e9fbc6c9
                                                • Opcode Fuzzy Hash: 634d5753afe8d4d2d536358c8ad6078c526d1308fe038fcd4f1668f9cb2d6f72
                                                • Instruction Fuzzy Hash: F301B176E40229AFCB10ABF9F8141AEBBA8FF84751B014126D805F7261EB34DD51CBD1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 067c106c1d56d0d89713fd7965ec76e7063503cb2d47ad77cc5c6943e314e2cb
                                                • Instruction ID: d0569c59ec8a65c29e8ba38dbcdff10c185d42f47b61ddc761fa2685471ba610
                                                • Opcode Fuzzy Hash: 067c106c1d56d0d89713fd7965ec76e7063503cb2d47ad77cc5c6943e314e2cb
                                                • Instruction Fuzzy Hash: AC018B3040E3D68FC7038B749C659E67F71EE4320434946DBC092CF5A3EA39080AC762
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111400735.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_99d000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c4bf5693ef1f07c09a5c0410f11ff4b7d8d5bfbd159bef26954ca074528922e4
                                                • Instruction ID: 0824acf2f503d28b5edfa3f326680fa314c4f649fd58839506091a7d6fa27a79
                                                • Opcode Fuzzy Hash: c4bf5693ef1f07c09a5c0410f11ff4b7d8d5bfbd159bef26954ca074528922e4
                                                • Instruction Fuzzy Hash: 5F01A271506344ABEB204B6EDDC4B67BBDCFF85760F18C45AED090A283C3789844CAB2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111400735.000000000099D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0099D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_99d000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1175c3c1628e8926c8db393875adfef88488da85a1b4ed64f17fa554a73c932
                                                • Instruction ID: ee0dfc201ffda1f0c9796c0b6a9f6d4052dadc0fefef660740951e68a1e8aa7e
                                                • Opcode Fuzzy Hash: e1175c3c1628e8926c8db393875adfef88488da85a1b4ed64f17fa554a73c932
                                                • Instruction Fuzzy Hash: B1F06D71405344AFEB208E1AD9C4B62FFECEB95774F18C55AED084E283C2799C44CAB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125397684.00000000072F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 072F0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_72f0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d69cded4e6d6909febc84941457e3cb800a98c2f4915b41ae365baef91b1c908
                                                • Instruction ID: e352f731f41175888ee0abedc6f343f0902c9399d377d44a41f4758c12a8ab68
                                                • Opcode Fuzzy Hash: d69cded4e6d6909febc84941457e3cb800a98c2f4915b41ae365baef91b1c908
                                                • Instruction Fuzzy Hash: F7F09AB150E3869FD7229BB0AC285143F35AF5222931D01EED186CA0F3DB79E406CB22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a5ccd95d8c40d6234dede19ba2e5c3ea97078d68d765f50ad4e233a23309f987
                                                • Instruction ID: a83273c83a13cbe4d2b3fe0b49ac92c1e14190098c081f98c2c555b4f556416e
                                                • Opcode Fuzzy Hash: a5ccd95d8c40d6234dede19ba2e5c3ea97078d68d765f50ad4e233a23309f987
                                                • Instruction Fuzzy Hash: 4CD05E7398D1A02ED321515A78489BF5F98C6D13B8F2506BFF49AD2142D5424C8142A5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                • Instruction ID: 8c9df776e32ec80882357d3b54db432f6c69896325dab1fd038a9a8f31ae90f3
                                                • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                • Instruction Fuzzy Hash: 45C0123354C1242A9224104EBC409A7664CC2C13F8A210137F51CD320094425C8101E4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d4f15b69d62dcd624301fdff07e89e5c8c4befe52f1fe27ff245e9c0d8457890
                                                • Instruction ID: a14ca8b7af4c7f95d2de7300e556b96653664a6d35573bfeeb6f5e4af795fc4f
                                                • Opcode Fuzzy Hash: d4f15b69d62dcd624301fdff07e89e5c8c4befe52f1fe27ff245e9c0d8457890
                                                • Instruction Fuzzy Hash: B6E0C23800D3C94FDB03A7F6ACD95893F71AAC22043088697D4058B067CA781846CB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c2ebcf59a7da19404d358bef2fc0cfd66e9608a55046f07237bde2dad2179040
                                                • Instruction ID: 7c7dc57348fc7414119bac7d260c3b099d7a4e3272750838334095253768eacb
                                                • Opcode Fuzzy Hash: c2ebcf59a7da19404d358bef2fc0cfd66e9608a55046f07237bde2dad2179040
                                                • Instruction Fuzzy Hash: EFC0123000830D8FDA05F7F9F8C559A336AB6C46147449920A8090A12AEF74394586D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2111902032.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_e60000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4fe104a865f242a8bec3ae2273d2157280b951069220505be30eb521f526f49e
                                                • Instruction ID: 1be7ee2ce0ab7e9177aa68a54e58e84bc49ec508df603047a891eda6a721e97a
                                                • Opcode Fuzzy Hash: 4fe104a865f242a8bec3ae2273d2157280b951069220505be30eb521f526f49e
                                                • Instruction Fuzzy Hash: 04B0123330410C8BC300AF94F4084CA3310E7C02327208133E2058005447329427AB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `
                                                • API String ID: 0-4168407445
                                                • Opcode ID: fc8eb5d393961a5694ba67cfd13a9936ef010c7d6aafe1b8d866664b47e66938
                                                • Instruction ID: 292c11c427c76d188c25d45a131006d2a7eae295c99ff6ccb70462fcfd98d602
                                                • Opcode Fuzzy Hash: fc8eb5d393961a5694ba67cfd13a9936ef010c7d6aafe1b8d866664b47e66938
                                                • Instruction Fuzzy Hash: 75A15C32A012198FCF05DFB4C9549AEB7B3FFC4310B25856AE816AB261EB75E945CF40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: L~
                                                • API String ID: 0-3876828424
                                                • Opcode ID: 8f35c8d0fb2a4b592a5fe26ca5f9f2f9082b1d55c4b10a826690d4b52c504013
                                                • Instruction ID: 7630ee49e59f3304a66e1a878abe700bcf030a7bff1f64109592ac87ba5a2c56
                                                • Opcode Fuzzy Hash: 8f35c8d0fb2a4b592a5fe26ca5f9f2f9082b1d55c4b10a826690d4b52c504013
                                                • Instruction Fuzzy Hash: 629134B4E21219CFCB04CFA9C58499EFBF6FF89310F249419D009AB660D734AA02CF95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: L~
                                                • API String ID: 0-3876828424
                                                • Opcode ID: c636265b0e7c0c83aec65a7be4ad7382fe37d53c0acde5db44edb63dda5788ee
                                                • Instruction ID: e24ec04b122510cb6cf7e3562e4bd8a3e247deb34bdd75f7d6aa7788708e5a09
                                                • Opcode Fuzzy Hash: c636265b0e7c0c83aec65a7be4ad7382fe37d53c0acde5db44edb63dda5788ee
                                                • Instruction Fuzzy Hash: 1F9137B4E25219CFCB04CF99C58499EFBF6FF89210F24841AD009AB764D730AA02CF94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 89d51df7a7870ad58fc26ea5a0f451487764eafe0219abaec254af219ae83a04
                                                • Instruction ID: ea09a1d7611b742a9d4cf3f16cf1c4e3c9c9ae944188948bfa8d6ddd3a53b495
                                                • Opcode Fuzzy Hash: 89d51df7a7870ad58fc26ea5a0f451487764eafe0219abaec254af219ae83a04
                                                • Instruction Fuzzy Hash: E732E270A043458FCB09EFB9C8A965DBFF2FF8A204F15856AD045DB262DF399805CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 881c34dceeb6a21d3bf90a2300bfbe4b73b8e427aadab8bb92c78073b315d1b3
                                                • Instruction ID: 631e7996084003696b1028918d5fb6d364d02610cc201974aabf39beeee087de
                                                • Opcode Fuzzy Hash: 881c34dceeb6a21d3bf90a2300bfbe4b73b8e427aadab8bb92c78073b315d1b3
                                                • Instruction Fuzzy Hash: A022C171B10215CFCB08EFB9D89959EBBF2FF89304F51862AE005AB255DF399845CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 062eeb1ea9dd0e710e29f9767ce4fa782b48775c71c9a44d3972ca2e7b96f282
                                                • Instruction ID: a2db06b4f0c14e55fe60351ab8467119c1a6ffa360f10ffd6d4c880a3aa6d555
                                                • Opcode Fuzzy Hash: 062eeb1ea9dd0e710e29f9767ce4fa782b48775c71c9a44d3972ca2e7b96f282
                                                • Instruction Fuzzy Hash: 1DF19B307007448BEF2AEB79C954B6EB7E6AFC9704F5484ADD1468B2A1DF35E802CB51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123954330.0000000005CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5ce0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 29d4a87d3785d907e26f3a413063b44ab1010804b4fe59fa3c3a831bf7046d53
                                                • Instruction ID: 871d2e78dd3af8c47f62019870977105ca2acdf253352894d6ad0ed635613a65
                                                • Opcode Fuzzy Hash: 29d4a87d3785d907e26f3a413063b44ab1010804b4fe59fa3c3a831bf7046d53
                                                • Instruction Fuzzy Hash: FAA1A570B002149FEB18E7B9885477F62EBAFC9600F648579E00ADB784CF789D428BD1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: cad0400a6db4b450a47e3dc43b43b10846b951e3474e58be1b6de5cadea22de4
                                                • Instruction ID: 9ae36450cabaff79ab732aa82cb332c3927310ce381d371d4429efeee4aa26ed
                                                • Opcode Fuzzy Hash: cad0400a6db4b450a47e3dc43b43b10846b951e3474e58be1b6de5cadea22de4
                                                • Instruction Fuzzy Hash: E0129EF04107468EE7289F66ED4D1893BB1EB85318B58422BD2613A2F5D7B9118FCFC6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4467c340159dcee0cc45c74590ea7160a3c10763541c658f7f24c979b1025685
                                                • Instruction ID: 88bbc84e09d21ab56874f609423ffc9d47e876ecfafebd1a2c23df8a38fb8423
                                                • Opcode Fuzzy Hash: 4467c340159dcee0cc45c74590ea7160a3c10763541c658f7f24c979b1025685
                                                • Instruction Fuzzy Hash: 41D1C234A00605CFDB08DF69C698EA9B7F1BF8D705F2580A8E406AB761DB31AD41CF61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123891257.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5cd0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 16df990c7fe4aad5a923f29fd57b7fb1d8b9b4f49eab8d87ceb2a22994c8037d
                                                • Instruction ID: c5c4bdba01389e02ea1687a4dc7d5a54dda625800ca3c9f2b67d26988be89a79
                                                • Opcode Fuzzy Hash: 16df990c7fe4aad5a923f29fd57b7fb1d8b9b4f49eab8d87ceb2a22994c8037d
                                                • Instruction Fuzzy Hash: EBD1D635C2075ACACB10EBA8D9916ADB771FFD5304F508B9AE0493B211EF706AC4CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2123891257.0000000005CD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CD0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5cd0000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 798f6a7dbc8f61788846c6a75b1990228e45c187a2dcd89e3ec3470e18be857d
                                                • Instruction ID: f1bfc380dda45c41a971c92030b06f46ac5eb4b98545b5caaf6bae7e06664567
                                                • Opcode Fuzzy Hash: 798f6a7dbc8f61788846c6a75b1990228e45c187a2dcd89e3ec3470e18be857d
                                                • Instruction Fuzzy Hash: 22D1D635C2075ACACB10EBA8D9916ADB771FFD5304F508B9AE0493B211EF706AC4CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4c2535680d34261a5480404e1bade509b753edf7f9106d97946f708504d976fe
                                                • Instruction ID: f41c9822efbdd8ad0cfb4f624bc8a7e3523a19e21cb2f7557a3ce920e147263c
                                                • Opcode Fuzzy Hash: 4c2535680d34261a5480404e1bade509b753edf7f9106d97946f708504d976fe
                                                • Instruction Fuzzy Hash: C6A11670E15218CFDF08CFA9D985AADFBB6FB89300F14992AD50ABB254D7349901CF54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ac4b2dfb6d31c8a1925bf4c807bc3ffb5a716351cc78765389305a72015a8ec
                                                • Instruction ID: 24e1156335d3c182a4e7f1ff9eec55fe1b2c0764b61c7562652016d2fd54abc3
                                                • Opcode Fuzzy Hash: 4ac4b2dfb6d31c8a1925bf4c807bc3ffb5a716351cc78765389305a72015a8ec
                                                • Instruction Fuzzy Hash: 9BA134B0E05218CFDF08CFA9D945AADFBB2FB89300F14992AD40ABB254DB349941CF54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2122700750.0000000005A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A40000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_5a40000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eb5f9f67bbe22ba7f5372aeb5e23749123b5447b200bf4440ec4ab98c03f42bd
                                                • Instruction ID: 3377f84ab378ad927c5be351eb7dd157d54864c6494083b2253a70ed4a44363e
                                                • Opcode Fuzzy Hash: eb5f9f67bbe22ba7f5372aeb5e23749123b5447b200bf4440ec4ab98c03f42bd
                                                • Instruction Fuzzy Hash: EFC1C3B08107458EE728DFA6ED491997BB1FF85314B18422BD1613B2E4D7B9108FCF86
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c3adf16a9285d866cd194317e707f4578d348974dac44d0288ad8a0dd12c17c6
                                                • Instruction ID: 92f7aa79d094eb28a288ea88302d639e20d11c7dbd02c83fec831f572efbb844
                                                • Opcode Fuzzy Hash: c3adf16a9285d866cd194317e707f4578d348974dac44d0288ad8a0dd12c17c6
                                                • Instruction Fuzzy Hash: 657149B4E19219CFDB08DFA9C5805DEFBF6FF8A210F24942AD409B7354D3309A418BA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2bd36d6296c5447f69239a37d7f84e3cb8db215db611fa45e0b9273a0306392c
                                                • Instruction ID: 752a3aeeeca0f6d691c382b067d0e1acbd77eb65307760f9246a5d8e70f38552
                                                • Opcode Fuzzy Hash: 2bd36d6296c5447f69239a37d7f84e3cb8db215db611fa45e0b9273a0306392c
                                                • Instruction Fuzzy Hash: EF7128B4E19219CFDB04DFA9C5805DEFBF6FF8A210F24982AD419B7354D3309A418BA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1306cd4ca6750c3ef50bd9be3173c21d46b59e7b6384389fcb03fec9df55a767
                                                • Instruction ID: f635204624cb249a4eb1657befc0ee29f2753d4b17d88e4fa1bc879a72b3d46e
                                                • Opcode Fuzzy Hash: 1306cd4ca6750c3ef50bd9be3173c21d46b59e7b6384389fcb03fec9df55a767
                                                • Instruction Fuzzy Hash: D77102F4E5421ACFDB04DFA9D5909AEFFB5FF89210F18885AD419A7250C330A982CF95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 41ca7697daee42c410bc04d01c34d306ab0cf07ccd0535a664a6d8fbf149ceba
                                                • Instruction ID: a171c054d0b53f949d80fb4212961c9dc9762cbfa3b5ee103ed14b2bc9d948fa
                                                • Opcode Fuzzy Hash: 41ca7697daee42c410bc04d01c34d306ab0cf07ccd0535a664a6d8fbf149ceba
                                                • Instruction Fuzzy Hash: 886115F4E5424A8FDB04DFA9C5909AEFFB1FF49310F18889AD419A7251C334A982CF95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4727a86f492bc01c3b4865371617b35632fcb1cdbe0a5dcffa513212dbf5ff57
                                                • Instruction ID: ba2a072d432e7581733a3ed49d4133a2724d98d6e66c2255cf48ea729f30c9a8
                                                • Opcode Fuzzy Hash: 4727a86f492bc01c3b4865371617b35632fcb1cdbe0a5dcffa513212dbf5ff57
                                                • Instruction Fuzzy Hash: 1E6147B4E14209DFEB14DFA9D5915EEFBB5BF49300F14C86AD458AB280D3349A42CF94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fe3554b74ee124adfea827a27148e8dc56b4d6d4392079e5d82225254bafbbb6
                                                • Instruction ID: 16cf4e3d65ea67839b27f2668bdfee5084e6dc3e3b50cf5decfab608c925c928
                                                • Opcode Fuzzy Hash: fe3554b74ee124adfea827a27148e8dc56b4d6d4392079e5d82225254bafbbb6
                                                • Instruction Fuzzy Hash: B9516CB1E057588FEB19CF678D4528AFFF3AFC9200F18C1EA8549AA265EB3409458F11
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c57df157f924a791904bd3eca8dbab8d84600750f21e555f4f2a37884c351e79
                                                • Instruction ID: 706e32e61e0e6d6eac86541a53337e2c0caffdc653a49893d765751061d6e0e0
                                                • Opcode Fuzzy Hash: c57df157f924a791904bd3eca8dbab8d84600750f21e555f4f2a37884c351e79
                                                • Instruction Fuzzy Hash: C341F8B5E012198FEB68CF6AC95079EFBF3BFC9200F14C1AAD409A7254D7304A458F91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ce5f23cda50f929b97a247ac7ffd2a992556bc8fb19965c048e29d23cfea2738
                                                • Instruction ID: 4855d2fec3cea9230c1a28f240b2618a2bb22ee5dd9ea55f8d3676bf22390089
                                                • Opcode Fuzzy Hash: ce5f23cda50f929b97a247ac7ffd2a992556bc8fb19965c048e29d23cfea2738
                                                • Instruction Fuzzy Hash: 604148B0E152098FDB44CF99C9505EEFBF2BF8A210F14A66AC419B7354D3309A42CFA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: defbc9fb5a9eaa0543f4cec1ee8ad4d7279066104519e1815c7d59ddf835ac10
                                                • Instruction ID: d77f2ef17c78a02e8e4970c1136d37d334b2723f50cc507d33a36a60b27235a4
                                                • Opcode Fuzzy Hash: defbc9fb5a9eaa0543f4cec1ee8ad4d7279066104519e1815c7d59ddf835ac10
                                                • Instruction Fuzzy Hash: 3B4109B1E1020A9FEB48DFEAC5515AEFBF6BF89300F14D46AC419A7254D33496418F94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6fadd9b3b4eef7752b5791eec64973b457b7611475d9e7d4611871ed4c5eaf16
                                                • Instruction ID: 86cb11191b2a406ae542c74a60288b65621ca70dde68daec7cfec7d304773e41
                                                • Opcode Fuzzy Hash: 6fadd9b3b4eef7752b5791eec64973b457b7611475d9e7d4611871ed4c5eaf16
                                                • Instruction Fuzzy Hash: 5C4118B1E1060A8FEF48DFAAC5515AEFBF2BF89310F24C46AC419A7254D3389641CF94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b46c52bacf757ef718164a1ea1d5008993e9100f635c9fcbd1e83795af5d144d
                                                • Instruction ID: 62aa1a8c938b2df6aadaba17cea95d2652eed691e9e7c5ef2a50df925bb04ad0
                                                • Opcode Fuzzy Hash: b46c52bacf757ef718164a1ea1d5008993e9100f635c9fcbd1e83795af5d144d
                                                • Instruction Fuzzy Hash: 26415CB1E116588BEB68CF6B8D4479EFBF7BFC9300F14C1BA850CA6215EB3009858E51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 15449c6b4503895c4e7445edfef5922bae568026837ef60fbd75e68ce29d3635
                                                • Instruction ID: bd0d9eae8f172779278d7ace46417f52c4ff2d59707fc2477561f7e627792fa9
                                                • Opcode Fuzzy Hash: 15449c6b4503895c4e7445edfef5922bae568026837ef60fbd75e68ce29d3635
                                                • Instruction Fuzzy Hash: D84106B4E05219CFDF58CFA9D945AAEFBB2FB89310F14982AD106B7254E7349901CF18
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2125451980.0000000007300000.00000040.00000800.00020000.00000000.sdmp, Offset: 07300000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_7300000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31589a78b289a93ba9bf5fc4af6cb2b9b4f53583a6864ca4df15fab4ddba4a8d
                                                • Instruction ID: 69558c0799c085c79094d429f514cca6f3f2708b8e03c1f4afba6235ce7f0b83
                                                • Opcode Fuzzy Hash: 31589a78b289a93ba9bf5fc4af6cb2b9b4f53583a6864ca4df15fab4ddba4a8d
                                                • Instruction Fuzzy Hash: D631DDB1E056188FEB18CFABD95079EFBF7AFC9200F14C0AAD558A6254DB340A458F51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 90f246c96a6d81f1b596f4eee7ae8cb39badb4b62e98b1447509a1c71b1584a8
                                                • Instruction ID: 81879757aeb256598304dbb6b82f27af31de9caa598ebecd2693ed8cd8962223
                                                • Opcode Fuzzy Hash: 90f246c96a6d81f1b596f4eee7ae8cb39badb4b62e98b1447509a1c71b1584a8
                                                • Instruction Fuzzy Hash: 402158B1E102198BDF08CFAAD8406EEFBF7AFC9210F14C17AD418B7254DB304A018B91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 284f76bd2f985fff4180b1c2b162912d70ca42f5a8103f107ca46d764bd63dd2
                                                • Instruction ID: eb2fcb265d32c70755fbc1b4e81fce818f059d0890f26e8331b7541a6d4b2636
                                                • Opcode Fuzzy Hash: 284f76bd2f985fff4180b1c2b162912d70ca42f5a8103f107ca46d764bd63dd2
                                                • Instruction Fuzzy Hash: 49214DB1E116198FEB08CFAAC94169EFBF3AFC9210F14C17AD418B7264EB344A458F51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7856b12700792df78b45104f2e7e1f3825cdaa2a61cd13f1dca67244d26208d3
                                                • Instruction ID: 7460368941a4db508118e551873f0bd1b87eb01bf75fdf749a1b0514630f6465
                                                • Opcode Fuzzy Hash: 7856b12700792df78b45104f2e7e1f3825cdaa2a61cd13f1dca67244d26208d3
                                                • Instruction Fuzzy Hash: A11126B1E116198BEB08CFABD94469EFBF7BBC8210F14C07AD518A7214DB305A118F62
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6275c0a58b70641edddcfb05aa50dfd559f5e94b03f605badf5b708da1191a0
                                                • Instruction ID: 65d35fda06e75e8c5997968ab8873c57224102d45f6e3827843d35569e6162c7
                                                • Opcode Fuzzy Hash: c6275c0a58b70641edddcfb05aa50dfd559f5e94b03f605badf5b708da1191a0
                                                • Instruction Fuzzy Hash: 77112971E116199BDB18CFABD9406EEFBF7ABC9210F14C07AD418B7214DB305A058B54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1ac5783d8be7d3ecc6c8fe02fe8494b22947da52d7b762d2188c20537d812d9f
                                                • Instruction ID: 694e553cb6dbec202d32b15c575fa32c6176f4f3b7d3464f0d4da5629e0d4bea
                                                • Opcode Fuzzy Hash: 1ac5783d8be7d3ecc6c8fe02fe8494b22947da52d7b762d2188c20537d812d9f
                                                • Instruction Fuzzy Hash: 15112671E116199BDB18CFABD9416AEFBF7EFC8210F14C07AD418A7214DB305A158F61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 38c00f1b4adf9078978952a747be94d4b6786d13cd82bbea3f6881fd2df110c3
                                                • Instruction ID: e24e3b14e41aadcd07f804d05768b95af3e1fefe1241e55f2243d22c261403c0
                                                • Opcode Fuzzy Hash: 38c00f1b4adf9078978952a747be94d4b6786d13cd82bbea3f6881fd2df110c3
                                                • Instruction Fuzzy Hash: 71111471E116188BDB48CFABD9406AEFBFBAFC9210F14C03AD508B7218DB305A458F91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 675c6998f8372bd1b3198e804ac1472df1fb3d42c908ed278c04d2d4555ac41a
                                                • Instruction ID: f5dde9a6f42093466807f608375809042f2995dc255c33deb61fa23f117102c5
                                                • Opcode Fuzzy Hash: 675c6998f8372bd1b3198e804ac1472df1fb3d42c908ed278c04d2d4555ac41a
                                                • Instruction Fuzzy Hash: B2216DB1E116198BDB48CF6AC94069EFBF7AFC9200F14C47AD408B7258D7304A46CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c4488ac1aa699fc4aa4f408a4ed5eccf1ca27338ccc12ca7422b661e5034a6c4
                                                • Instruction ID: 0135630cf455cdf8340ae5b47c00c83e76c0c713db090adeff1e5e02f554186f
                                                • Opcode Fuzzy Hash: c4488ac1aa699fc4aa4f408a4ed5eccf1ca27338ccc12ca7422b661e5034a6c4
                                                • Instruction Fuzzy Hash: BB216A71E112499FDB08CFABD94129EBBF3AFC9300F14C0BAD808E7214EA344A418F61
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d979d4d36882bfe79ecb76cef0230d58aa2d2dd8d735e965bf6d78235d794f56
                                                • Instruction ID: ac7bcb71aa4a6ce8bbc994616cb7846603fe7938ecf957a338d23e22999b48b6
                                                • Opcode Fuzzy Hash: d979d4d36882bfe79ecb76cef0230d58aa2d2dd8d735e965bf6d78235d794f56
                                                • Instruction Fuzzy Hash: F11137B1E116198BDB48CFAAC9416AEFBF7AFC8210F14C47AD508B7258DB304A46CF51
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2112415454.0000000002770000.00000040.00000800.00020000.00000000.sdmp, Offset: 02770000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_2770000_LisectAVT_2403002A_35.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 97c79ec435f73e07a796f8033d5dfeee5ded0232d74c4b37adf1699af5072f92
                                                • Instruction ID: 591847dcdc024a4f03035bccbca60451c6b32c65a75dfdd178930ee195f43976
                                                • Opcode Fuzzy Hash: 97c79ec435f73e07a796f8033d5dfeee5ded0232d74c4b37adf1699af5072f92
                                                • Instruction Fuzzy Hash: 221119B1E116198BDB1CCFAAD9416AEFBF3AFC9200F14C07AD818B7214EB304A458B54

                                                Execution Graph

                                                Execution Coverage:12.5%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:21
                                                Total number of Limit Nodes:4
                                                execution_graph 25203 54d0848 25204 54d084e 25203->25204 25205 54d091b 25204->25205 25207 54d1342 25204->25207 25209 54d134b 25207->25209 25208 54d1444 25208->25204 25209->25208 25211 54d7049 25209->25211 25213 54d7053 25211->25213 25212 54d7109 25212->25209 25213->25212 25216 641ce99 25213->25216 25222 641cea8 25213->25222 25217 641cebd 25216->25217 25218 641d0ce 25217->25218 25219 641d4f8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25217->25219 25220 641d4b8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25217->25220 25221 641d4ea GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25217->25221 25218->25212 25219->25217 25220->25217 25221->25217 25223 641cebd 25222->25223 25224 641d0ce 25223->25224 25225 641d4f8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25223->25225 25226 641d4b8 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25223->25226 25227 641d4ea GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 25223->25227 25224->25212 25225->25223 25226->25223 25227->25223
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a79402c93a2d56c7d3c7275c87a52e3ffe183a312176f37eec1bfac0d9d7261e
                                                • Instruction ID: 3801b8e0b638fb3d0d24253d16fc621fd1741b3f09ad3494d15d675d7a1d94b8
                                                • Opcode Fuzzy Hash: a79402c93a2d56c7d3c7275c87a52e3ffe183a312176f37eec1bfac0d9d7261e
                                                • Instruction Fuzzy Hash: 5763DB31D107198ADB11EB68C994AE9F7B1FF99300F11D6DAE45877221EB70AAC4CF81
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eef3da2b0b92e50b132a9c8676a609d9a2e0aa36ae0d3ce7975e277e99517e0f
                                                • Instruction ID: a726a9d5080f47f4fe1fc59ffd995ae51d9753f046df0b2a7cd87dea03b6a932
                                                • Opcode Fuzzy Hash: eef3da2b0b92e50b132a9c8676a609d9a2e0aa36ae0d3ce7975e277e99517e0f
                                                • Instruction Fuzzy Hash: F6332E31D106198EDB11EF68C890AEDF7B1FF99300F15C69AD449AB211EB30AAD5CB91
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5783ce4f5e162bb33f931f54874f0060dcd7060954878c79a6ffa9447788d901
                                                • Instruction ID: 89683e8c4ceaad4d3f135845f0d4f0705cfb230f80a362fd627c3195ee3c7c70
                                                • Opcode Fuzzy Hash: 5783ce4f5e162bb33f931f54874f0060dcd7060954878c79a6ffa9447788d901
                                                • Instruction Fuzzy Hash: 53323D35A002059FDB14DF68D494BAEBBB2FF89710F1485AAE905EB391DB35DC41CBA0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3551 54d4a58-54d4abe 3553 54d4b08-54d4b0a 3551->3553 3554 54d4ac0-54d4acb 3551->3554 3556 54d4b0c-54d4b25 3553->3556 3554->3553 3555 54d4acd-54d4ad9 3554->3555 3557 54d4afc-54d4b06 3555->3557 3558 54d4adb-54d4ae5 3555->3558 3562 54d4b27-54d4b33 3556->3562 3563 54d4b71-54d4b73 3556->3563 3557->3556 3560 54d4ae9-54d4af8 3558->3560 3561 54d4ae7 3558->3561 3560->3560 3564 54d4afa 3560->3564 3561->3560 3562->3563 3565 54d4b35-54d4b41 3562->3565 3566 54d4b75-54d4b8d 3563->3566 3564->3557 3567 54d4b64-54d4b6f 3565->3567 3568 54d4b43-54d4b4d 3565->3568 3573 54d4b8f-54d4b9a 3566->3573 3574 54d4bd7-54d4bd9 3566->3574 3567->3566 3569 54d4b4f 3568->3569 3570 54d4b51-54d4b60 3568->3570 3569->3570 3570->3570 3572 54d4b62 3570->3572 3572->3567 3573->3574 3576 54d4b9c-54d4ba8 3573->3576 3575 54d4bdb-54d4bf3 3574->3575 3583 54d4c3d-54d4c3f 3575->3583 3584 54d4bf5-54d4c00 3575->3584 3577 54d4bcb-54d4bd5 3576->3577 3578 54d4baa-54d4bb4 3576->3578 3577->3575 3580 54d4bb8-54d4bc7 3578->3580 3581 54d4bb6 3578->3581 3580->3580 3582 54d4bc9 3580->3582 3581->3580 3582->3577 3585 54d4c41-54d4cb4 3583->3585 3584->3583 3586 54d4c02-54d4c0e 3584->3586 3595 54d4cba-54d4cc8 3585->3595 3587 54d4c31-54d4c3b 3586->3587 3588 54d4c10-54d4c1a 3586->3588 3587->3585 3589 54d4c1c 3588->3589 3590 54d4c1e-54d4c2d 3588->3590 3589->3590 3590->3590 3592 54d4c2f 3590->3592 3592->3587 3596 54d4cca-54d4cd0 3595->3596 3597 54d4cd1-54d4d31 3595->3597 3596->3597 3604 54d4d41-54d4d45 3597->3604 3605 54d4d33-54d4d37 3597->3605 3606 54d4d55-54d4d59 3604->3606 3607 54d4d47-54d4d4b 3604->3607 3605->3604 3608 54d4d39 3605->3608 3610 54d4d69-54d4d6d 3606->3610 3611 54d4d5b-54d4d5f 3606->3611 3607->3606 3609 54d4d4d 3607->3609 3608->3604 3609->3606 3613 54d4d7d-54d4d81 3610->3613 3614 54d4d6f-54d4d73 3610->3614 3611->3610 3612 54d4d61 3611->3612 3612->3610 3616 54d4d91-54d4d95 3613->3616 3617 54d4d83-54d4d87 3613->3617 3614->3613 3615 54d4d75 3614->3615 3615->3613 3618 54d4da5 3616->3618 3619 54d4d97-54d4d9b 3616->3619 3617->3616 3620 54d4d89-54d4d8c call 54d0ab8 3617->3620 3624 54d4da6 3618->3624 3619->3618 3622 54d4d9d-54d4da0 call 54d0ab8 3619->3622 3620->3616 3622->3618 3624->3624
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 511915b397d870b44372642c121eadb60f5a524caf738c0a39a7911db910300f
                                                • Instruction ID: a34dbe5aad7b74446de6bff1539e4adabc1993013ef9f5f120c32eccbe9abcd7
                                                • Opcode Fuzzy Hash: 511915b397d870b44372642c121eadb60f5a524caf738c0a39a7911db910300f
                                                • Instruction Fuzzy Hash: 8BB14B71E002098FDF10CFA9C9957EEFBF2BB88714F14812AD415AB354EBB59845CB91
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 32ccf5733ab5eb0e162b448cd3b8133073bcbaa9461308cc6cb132eecc7c5458
                                                • Instruction ID: fad6af16b6ce566c84d4aadce0b8fa830f1e7d1b0864c963ff1732898493f3e0
                                                • Opcode Fuzzy Hash: 32ccf5733ab5eb0e162b448cd3b8133073bcbaa9461308cc6cb132eecc7c5458
                                                • Instruction Fuzzy Hash: 19913A70E002099FDF10CFA9D9957EEFBF2BB88314F14852AE415A7394EB749845CBA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1074 641e0b8-641e0c3 1075 641e0c5-641e0ec call 641d49c 1074->1075 1076 641e0ed-641e103 1074->1076 1080 641e104-641e10c call 641d4a8 1076->1080 1083 641e112-641e150 1080->1083 1084 641e10e-641e111 1080->1084 1083->1080 1089 641e152-641e171 1083->1089 1091 641e173-641e176 1089->1091 1092 641e177-641e204 GlobalMemoryStatusEx 1089->1092 1095 641e206-641e20c 1092->1095 1096 641e20d-641e235 1092->1096 1095->1096
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2665148959.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_6410000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 202a8ceb9edeec364422dbeb89310d25116d8eddca4154711500174b9ff67458
                                                • Instruction ID: 5d81b8734e97ee6fe0f4eab12562a3f380bafa5925f246c774a7317511f65b5f
                                                • Opcode Fuzzy Hash: 202a8ceb9edeec364422dbeb89310d25116d8eddca4154711500174b9ff67458
                                                • Instruction Fuzzy Hash: E841F372E043958FCB15CFBAD8046EEBFF1AF89210F14856BD804AB251DB749845CBE1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1099 641d4a8-641e204 GlobalMemoryStatusEx 1102 641e206-641e20c 1099->1102 1103 641e20d-641e235 1099->1103 1102->1103
                                                APIs
                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0641E10A), ref: 0641E1F7
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2665148959.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_6410000_RegAsm.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 485486b31a6d10861c3d8318b32d60188febe484f74e3744f5f5a5f2691f0e45
                                                • Instruction ID: a5f7df7506afec28fe2123cf973d1781d08459d66ea2baae6bee3c658b921de5
                                                • Opcode Fuzzy Hash: 485486b31a6d10861c3d8318b32d60188febe484f74e3744f5f5a5f2691f0e45
                                                • Instruction Fuzzy Hash: 1C1130B1C006599BDB10CF9AC844B9EFBF4AB48220F14816AE818BB240D378A944CFE5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1106 641e189-641e1ce 1107 641e1d6-641e204 GlobalMemoryStatusEx 1106->1107 1108 641e206-641e20c 1107->1108 1109 641e20d-641e235 1107->1109 1108->1109
                                                APIs
                                                • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0641E10A), ref: 0641E1F7
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2665148959.0000000006410000.00000040.00000800.00020000.00000000.sdmp, Offset: 06410000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_6410000_RegAsm.jbxd
                                                Similarity
                                                • API ID: GlobalMemoryStatus
                                                • String ID:
                                                • API String ID: 1890195054-0
                                                • Opcode ID: 567998e22672fbf07d36cf139eadbdf5bc03b354d68ef26fba7622df7b08189c
                                                • Instruction ID: f8f36635c702d130415cd3fe57b8bc4e04117d9c3c523202669ae8bd50be0fa9
                                                • Opcode Fuzzy Hash: 567998e22672fbf07d36cf139eadbdf5bc03b354d68ef26fba7622df7b08189c
                                                • Instruction Fuzzy Hash: DF111AB1C0065A9BDB10CF9AD944BDEFBF4AF48324F14815AD814B7240D378A944CFA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2661 54d7990-54d79a7 2662 54d79a9-54d79ac 2661->2662 2663 54d79ae-54d79d4 2662->2663 2664 54d79d9-54d79dc 2662->2664 2663->2664 2665 54d79de-54d7a04 2664->2665 2666 54d7a09-54d7a0c 2664->2666 2665->2666 2667 54d7a0e-54d7a34 2666->2667 2668 54d7a39-54d7a3c 2666->2668 2667->2668 2670 54d7a3e-54d7a64 2668->2670 2671 54d7a69-54d7a6c 2668->2671 2670->2671 2673 54d7a6e-54d7a94 2671->2673 2674 54d7a99-54d7a9c 2671->2674 2673->2674 2677 54d7a9e-54d7ac4 2674->2677 2678 54d7ac9-54d7acc 2674->2678 2677->2678 2681 54d7ace-54d7af4 2678->2681 2682 54d7af9-54d7afc 2678->2682 2681->2682 2687 54d7afe-54d7b24 2682->2687 2688 54d7b29-54d7b2c 2682->2688 2687->2688 2691 54d7b2e-54d7b54 2688->2691 2692 54d7b59-54d7b5c 2688->2692 2691->2692 2697 54d7b5e-54d7b84 2692->2697 2698 54d7b89-54d7b8c 2692->2698 2697->2698 2701 54d7b8e-54d7bb4 2698->2701 2702 54d7bb9-54d7bbc 2698->2702 2701->2702 2707 54d7bbe-54d7be4 2702->2707 2708 54d7be9-54d7bec 2702->2708 2707->2708 2711 54d7bee-54d7c14 2708->2711 2712 54d7c19-54d7c1c 2708->2712 2711->2712 2717 54d7c1e-54d7c32 2712->2717 2718 54d7c37-54d7c3a 2712->2718 2717->2718 2721 54d7c3c-54d7c62 2718->2721 2722 54d7c67-54d7c6a 2718->2722 2721->2722 2727 54d7c6c-54d7c92 2722->2727 2728 54d7c97-54d7c9a 2722->2728 2727->2728 2731 54d7c9c-54d7cc2 2728->2731 2732 54d7cc7-54d7cca 2728->2732 2731->2732 2737 54d7ccc-54d7cf2 2732->2737 2738 54d7cf7-54d7cfa 2732->2738 2737->2738 2741 54d7cfc-54d7d12 2738->2741 2742 54d7d17-54d7d1a 2738->2742 2741->2742 2746 54d7d1c-54d7d42 2742->2746 2747 54d7d47-54d7d4a 2742->2747 2746->2747 2753 54d7d4c-54d7d72 2747->2753 2754 54d7d77-54d7d7a 2747->2754 2753->2754 2755 54d7d7c-54d7da2 2754->2755 2756 54d7da7-54d7daa 2754->2756 2755->2756 2763 54d7dac-54d7dd2 2756->2763 2764 54d7dd7-54d7dda 2756->2764 2763->2764 2765 54d7ddc-54d7e02 2764->2765 2766 54d7e07-54d7e0a 2764->2766 2765->2766 2772 54d7e0c-54d7e32 2766->2772 2773 54d7e37-54d7e3a 2766->2773 2772->2773 2774 54d7e3c-54d7e62 2773->2774 2775 54d7e67-54d7e6a 2773->2775 2774->2775 2782 54d7e6c-54d7e92 2775->2782 2783 54d7e97-54d7e9a 2775->2783 2782->2783 2784 54d7e9c-54d7ec2 2783->2784 2785 54d7ec7-54d7eca 2783->2785 2784->2785 2792 54d7ecc-54d7ef2 2785->2792 2793 54d7ef7-54d7efa 2785->2793 2792->2793 2794 54d7efc-54d7f22 2793->2794 2795 54d7f27-54d7f2a 2793->2795 2794->2795 2802 54d7f2c-54d7f52 2795->2802 2803 54d7f57-54d7f5a 2795->2803 2802->2803 2804 54d7f5c-54d7f82 2803->2804 2805 54d7f87-54d7f8a 2803->2805 2804->2805 2812 54d7f8c-54d7fb2 2805->2812 2813 54d7fb7-54d7fba 2805->2813 2812->2813 2814 54d7fbc-54d7fe2 2813->2814 2815 54d7fe7-54d7fea 2813->2815 2814->2815 2822 54d7fec-54d7fee 2815->2822 2823 54d7ffb-54d7ffe 2815->2823 2875 54d7ff0 call 54d91d8 2822->2875 2876 54d7ff0 call 54d91e8 2822->2876 2877 54d7ff0 call 54d928b 2822->2877 2878 54d7ff0 call 54d92d7 2822->2878 2824 54d800b-54d800e 2823->2824 2825 54d8000 2823->2825 2832 54d803b-54d803e 2824->2832 2833 54d8010-54d8036 2824->2833 2834 54d8006 2825->2834 2829 54d7ff6 2829->2823 2837 54d806b-54d806e 2832->2837 2838 54d8040-54d8066 2832->2838 2833->2832 2834->2824 2840 54d809b-54d809e 2837->2840 2841 54d8070-54d8096 2837->2841 2838->2837 2845 54d80cb-54d80ce 2840->2845 2846 54d80a0-54d80c6 2840->2846 2841->2840 2847 54d80fb-54d80fe 2845->2847 2848 54d80d0-54d80f6 2845->2848 2846->2845 2853 54d812b-54d812e 2847->2853 2854 54d8100-54d8126 2847->2854 2848->2847 2855 54d815b-54d815d 2853->2855 2856 54d8130-54d8156 2853->2856 2854->2853 2863 54d815f 2855->2863 2864 54d8164-54d8167 2855->2864 2856->2855 2863->2864 2864->2662 2865 54d816d-54d8173 2864->2865 2875->2829 2876->2829 2877->2829 2878->2829
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dd11ed13d09ec7b08ed917ab3ec14e92adb7fffe1a8176b1f8278dfa6cf0823f
                                                • Instruction ID: baf55fdeee4e0741df83ba430702833c5da20c777fa60e992c3bb24c388a614e
                                                • Opcode Fuzzy Hash: dd11ed13d09ec7b08ed917ab3ec14e92adb7fffe1a8176b1f8278dfa6cf0823f
                                                • Instruction Fuzzy Hash: 8F125F307102068BDB25DB7CE5A4AAE76E6FFC9204B50997EE006CB350DF39DC469B91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3625 54d4a4c-54d4abe 3627 54d4b08-54d4b0a 3625->3627 3628 54d4ac0-54d4acb 3625->3628 3630 54d4b0c-54d4b25 3627->3630 3628->3627 3629 54d4acd-54d4ad9 3628->3629 3631 54d4afc-54d4b06 3629->3631 3632 54d4adb-54d4ae5 3629->3632 3636 54d4b27-54d4b33 3630->3636 3637 54d4b71-54d4b73 3630->3637 3631->3630 3634 54d4ae9-54d4af8 3632->3634 3635 54d4ae7 3632->3635 3634->3634 3638 54d4afa 3634->3638 3635->3634 3636->3637 3639 54d4b35-54d4b41 3636->3639 3640 54d4b75-54d4b8d 3637->3640 3638->3631 3641 54d4b64-54d4b6f 3639->3641 3642 54d4b43-54d4b4d 3639->3642 3647 54d4b8f-54d4b9a 3640->3647 3648 54d4bd7-54d4bd9 3640->3648 3641->3640 3643 54d4b4f 3642->3643 3644 54d4b51-54d4b60 3642->3644 3643->3644 3644->3644 3646 54d4b62 3644->3646 3646->3641 3647->3648 3650 54d4b9c-54d4ba8 3647->3650 3649 54d4bdb-54d4bf3 3648->3649 3657 54d4c3d-54d4c3f 3649->3657 3658 54d4bf5-54d4c00 3649->3658 3651 54d4bcb-54d4bd5 3650->3651 3652 54d4baa-54d4bb4 3650->3652 3651->3649 3654 54d4bb8-54d4bc7 3652->3654 3655 54d4bb6 3652->3655 3654->3654 3656 54d4bc9 3654->3656 3655->3654 3656->3651 3659 54d4c41-54d4c77 3657->3659 3658->3657 3660 54d4c02-54d4c0e 3658->3660 3668 54d4c7f-54d4cb4 3659->3668 3661 54d4c31-54d4c3b 3660->3661 3662 54d4c10-54d4c1a 3660->3662 3661->3659 3663 54d4c1c 3662->3663 3664 54d4c1e-54d4c2d 3662->3664 3663->3664 3664->3664 3666 54d4c2f 3664->3666 3666->3661 3669 54d4cba-54d4cc8 3668->3669 3670 54d4cca-54d4cd0 3669->3670 3671 54d4cd1-54d4d31 3669->3671 3670->3671 3678 54d4d41-54d4d45 3671->3678 3679 54d4d33-54d4d37 3671->3679 3680 54d4d55-54d4d59 3678->3680 3681 54d4d47-54d4d4b 3678->3681 3679->3678 3682 54d4d39 3679->3682 3684 54d4d69-54d4d6d 3680->3684 3685 54d4d5b-54d4d5f 3680->3685 3681->3680 3683 54d4d4d 3681->3683 3682->3678 3683->3680 3687 54d4d7d-54d4d81 3684->3687 3688 54d4d6f-54d4d73 3684->3688 3685->3684 3686 54d4d61 3685->3686 3686->3684 3690 54d4d91-54d4d95 3687->3690 3691 54d4d83-54d4d87 3687->3691 3688->3687 3689 54d4d75 3688->3689 3689->3687 3692 54d4da5 3690->3692 3693 54d4d97-54d4d9b 3690->3693 3691->3690 3694 54d4d89-54d4d8c call 54d0ab8 3691->3694 3698 54d4da6 3692->3698 3693->3692 3696 54d4d9d-54d4da0 call 54d0ab8 3693->3696 3694->3690 3696->3692 3698->3698
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc446587a863daef569b4cce5eaeb0e777d9dc07ec344d6cd955e55f8be82a48
                                                • Instruction ID: c4b684d8b5cfe6c7eb515fd1a6cb68cde51b7fbbb60ea8802a8782ceb1fee7d1
                                                • Opcode Fuzzy Hash: fc446587a863daef569b4cce5eaeb0e777d9dc07ec344d6cd955e55f8be82a48
                                                • Instruction Fuzzy Hash: E4B13871E002098FDF10CFA8C9957EEFBF2BB48714F14812AD815AB354EBB59845CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7b21371821932bb383b4589a3134323fe8b892693ea718f5729bd4e00b3fed04
                                                • Instruction ID: 32ad45181003e526251d3cd401f64dac783d78b4a26eda505ec8f7ef852d413d
                                                • Opcode Fuzzy Hash: 7b21371821932bb383b4589a3134323fe8b892693ea718f5729bd4e00b3fed04
                                                • Instruction Fuzzy Hash: E5911A34A00205DFDB15DF68D594AADBBF2FF88710F14856AE806E7395DB35AC42CB60
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e297ed187f1611412873afafcae970162567cbce8dafba0e83827b8131914ecf
                                                • Instruction ID: 75c2a2788622becb6e9080f3dfd54e869654315cc0ea8b3cc520a881b33c6d77
                                                • Opcode Fuzzy Hash: e297ed187f1611412873afafcae970162567cbce8dafba0e83827b8131914ecf
                                                • Instruction Fuzzy Hash: B4911670E002099FDF10CFA9D9957DEFBF2BB48314F14852AE415AB394EB749845CBA2
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14618cdda2c1d5904ed034f4721664607792d22186eb5003a76f409d0b8fea49
                                                • Instruction ID: 00cc4c9a9a5971133d1210ada604dcc84134a7aeaa69c1a2bb083437b088ad18
                                                • Opcode Fuzzy Hash: 14618cdda2c1d5904ed034f4721664607792d22186eb5003a76f409d0b8fea49
                                                • Instruction Fuzzy Hash: 75814870E00249DFDF10CFA9D995BDEFBB1BF88314F14816AE415A7294EBB49841CB61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e6b530dab87e482c20c96042b6e85edfa4313bb47a622bdd1b3808df00511fe4
                                                • Instruction ID: e0a4d871b6e57f513a2074cad95a40d939910f12dcc37266cae2fd94f96fde09
                                                • Opcode Fuzzy Hash: e6b530dab87e482c20c96042b6e85edfa4313bb47a622bdd1b3808df00511fe4
                                                • Instruction Fuzzy Hash: A8714870E002499BDF14CFA9D8957DEFBF2BF88314F14816AE415A7354EBB49841CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 234e31cd0e88f10f5ae8a5ad6626ef0a437d95791a5c7d44d2015c06291173cf
                                                • Instruction ID: 456b2328d4a9cf121d376735f05dc9d4c314cbeeb239db15f883feb294fd4586
                                                • Opcode Fuzzy Hash: 234e31cd0e88f10f5ae8a5ad6626ef0a437d95791a5c7d44d2015c06291173cf
                                                • Instruction Fuzzy Hash: 0441C370A002099FDB15DBA4C860BAEFBF2FF85350F15856BE415EB380EB75D8428B61
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a64511faa098296e5c356a1388f4f22b0138d71de0ae4328a56dc035cf9540ef
                                                • Instruction ID: b7fab925e507acb34bdac9d2792c424b1dcb377e4d3c3695853ff5dd4caec487
                                                • Opcode Fuzzy Hash: a64511faa098296e5c356a1388f4f22b0138d71de0ae4328a56dc035cf9540ef
                                                • Instruction Fuzzy Hash: EF5115B0E002288FDB14CFA9D899BDEFBB1BF48314F15815AD819AB350D7749844CF64
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2228d203d969ed45a0afdd37accb4b73387a036e68542a00f4e0868dcbe8840c
                                                • Instruction ID: 22d8ee58ad6c14e105ebc4e66ad51e0a9d9b00e4991ca0c74ab36c17e902ec29
                                                • Opcode Fuzzy Hash: 2228d203d969ed45a0afdd37accb4b73387a036e68542a00f4e0868dcbe8840c
                                                • Instruction Fuzzy Hash: 19510570E002288FDB14CFA9D858BDEFBB1BF48314F15816AD819AB351D774A844CBA5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9855eb2cc765c9916f49ade5fffdd75974738ac0db0dfee76d1459b7d4146a90
                                                • Instruction ID: 80356bc2d56dd33128920846f0310c68fb8f439c534043a04409a23963368515
                                                • Opcode Fuzzy Hash: 9855eb2cc765c9916f49ade5fffdd75974738ac0db0dfee76d1459b7d4146a90
                                                • Instruction Fuzzy Hash: 6D51FA71201345CFDB16EF6CF885A863BAAFB9570470461B9D1006B266EB7C6D09CF82
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 375d5a69a14112c70c9dcacca1e5f50937cf03d8583920012d190e644086b477
                                                • Instruction ID: 7c9861c5c2b4a092b1f1d4ce3fb9d0a36629d281b8e599515729923b0daa2961
                                                • Opcode Fuzzy Hash: 375d5a69a14112c70c9dcacca1e5f50937cf03d8583920012d190e644086b477
                                                • Instruction Fuzzy Hash: 5B413B31A002058FDB24DF69D458BEEB7F1EF88214F1144AAE406EB3A5DB799D05CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 240b05ea6a97772dfb9f8840cfca23b9c38a22fc8a7565f433ad01aaebfd76a0
                                                • Instruction ID: f401e8d73abd1a28fdb1e3665bd3190381605317a14150947cac92aea56a8517
                                                • Opcode Fuzzy Hash: 240b05ea6a97772dfb9f8840cfca23b9c38a22fc8a7565f433ad01aaebfd76a0
                                                • Instruction Fuzzy Hash: 4631C4317002069FDB699F74D564AEE7BA3BB85610B1485AAD407DB380DF39DC46C790
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0fe570ec6aaac710ea6bbf84251688bd99db20f6b0b1e62bed1e3e0daf45e432
                                                • Instruction ID: fde0075e3a7620fb36ca585aa391cc110bfdb85f37a48df28c9b5a80c6ea1514
                                                • Opcode Fuzzy Hash: 0fe570ec6aaac710ea6bbf84251688bd99db20f6b0b1e62bed1e3e0daf45e432
                                                • Instruction Fuzzy Hash: F231D2307002069BDB699F78D564AEF77A3BB89610B24846AD407DB380EE35CC4687A0
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 014e78050c7b9a75886013fa55bccd3ac07397ff87fbaa3e0eea4b5ece19b43d
                                                • Instruction ID: a402d929fef0b5709fe5e935da80c200529aae8c87c291bb05bf3ffa2d283d59
                                                • Opcode Fuzzy Hash: 014e78050c7b9a75886013fa55bccd3ac07397ff87fbaa3e0eea4b5ece19b43d
                                                • Instruction Fuzzy Hash: 04315E70E106099BDB24CFA5C464BEEFBB2FF45354F15856AE402EB384EB71A846CB50
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a81308753a430c6ee3b365ad3ee7288108b8ab3823f84daed08fda382478b30b
                                                • Instruction ID: 9c8d9ac9a3657a03b56fad61cf66cde11f2b722705818dc5573ce4ab18f0b9eb
                                                • Opcode Fuzzy Hash: a81308753a430c6ee3b365ad3ee7288108b8ab3823f84daed08fda382478b30b
                                                • Instruction Fuzzy Hash: 5341CA71211345CFCB1AEF6CF9849863BAAFB9570470462BDD1006B266EB7C6D09CF82
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 935175773e7d7391037faaaa7c5472ea0d275a860d4b5a62ff753a62ddc5b6d0
                                                • Instruction ID: d9b4daa64dded092ee200962d200c83ed6132dbac9b56e6a83adbc83e95cd85d
                                                • Opcode Fuzzy Hash: 935175773e7d7391037faaaa7c5472ea0d275a860d4b5a62ff753a62ddc5b6d0
                                                • Instruction Fuzzy Hash: 61314D34E106069BCB18CF68D4A4A9EBBF6FF89300F54856AE846E7351DF71E846CB50
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b795eefdc61928c3f91239e3f45d7d5dd8483f2f50556cfed62c2d85e17fbb6d
                                                • Instruction ID: ce9891ed69e6b05a16426688a9e626be8f1377407ad4b0934cfefed11c37ba94
                                                • Opcode Fuzzy Hash: b795eefdc61928c3f91239e3f45d7d5dd8483f2f50556cfed62c2d85e17fbb6d
                                                • Instruction Fuzzy Hash: 9741F2B4D00349DFDB10CFA9C994BDEBBF5BF48314F24802AE409AB250DB759946CB91
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6f91d95dc59c8adfa97bc592221ce6109763edcd8f49ec1602f0d062f5ac45a
                                                • Instruction ID: 2e630883282ef80171649083e8651cb4f1414cb9737eb372ee29e2371c723226
                                                • Opcode Fuzzy Hash: d6f91d95dc59c8adfa97bc592221ce6109763edcd8f49ec1602f0d062f5ac45a
                                                • Instruction Fuzzy Hash: 69318530A0020A9BDB18CF55D494BEFFBB6FF89700F14865AE805E7380DB719842CBA0
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 23ea30900ec41f8f40b3c95fbacf0007a19e4756d44b702fe302844807a290f2
                                                • Instruction ID: 76ae648b95ab284ca56f7291bd9267a495a4fd8bfb98f2f0197878fce3090342
                                                • Opcode Fuzzy Hash: 23ea30900ec41f8f40b3c95fbacf0007a19e4756d44b702fe302844807a290f2
                                                • Instruction Fuzzy Hash: 44314134E102059BCB14CF64D4A4ADEFBB2FF89300F14856AE806E7351DB71AC46CB50
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e5dfba750259789d0db521eb1a774fa1516544a3ff6d49031f309d3c6bf90e43
                                                • Instruction ID: a388dd8e7557c5c58733e274664176b0302dd985fceaf015ced680bf0f249337
                                                • Opcode Fuzzy Hash: e5dfba750259789d0db521eb1a774fa1516544a3ff6d49031f309d3c6bf90e43
                                                • Instruction Fuzzy Hash: BE41E174D00349DFDB10CFA9C994ADEBBF5FF48314F14802AE819AB250DB75A945CB90
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 95183fa66c5127d5a535622cc105ccae05f3cefdd0502d689ecea580f2806082
                                                • Instruction ID: aab571e9c15f5964d9c889e66484ef932d1f72d45a6898c8322128150501e421
                                                • Opcode Fuzzy Hash: 95183fa66c5127d5a535622cc105ccae05f3cefdd0502d689ecea580f2806082
                                                • Instruction Fuzzy Hash: C1310C30B002158BDB15EF65C5646EEB7B6BF49245F5004AED802AB790EF3ADC45CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2363fb9127cb6cf53bb174144941f4c61750e1d2eba46c4cecbb1b04ecbb3611
                                                • Instruction ID: a2e092c3b4847131410fa586ae94f9fc16faadf6c802498d20925cd9b9005902
                                                • Opcode Fuzzy Hash: 2363fb9127cb6cf53bb174144941f4c61750e1d2eba46c4cecbb1b04ecbb3611
                                                • Instruction Fuzzy Hash: F2310E307002158BDB15EF64C5646EEB3B6AF89245F5004BED802AB754DF3ADC45CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4da6afa6b6800c37ad2a28ca8a732d0119c7bbf25d550f25b30c4fc1e635cedf
                                                • Instruction ID: 6b2a0835b1de8a1d6bf0e1e84f52e87445f8717d10e7b1ad7712fdb0b1d2378f
                                                • Opcode Fuzzy Hash: 4da6afa6b6800c37ad2a28ca8a732d0119c7bbf25d550f25b30c4fc1e635cedf
                                                • Instruction Fuzzy Hash: B5313A34700214DFDB09ABB8E464B6E77A7FFC9704B6440A9E4069B3A4CF3A9C46DB51
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b6977d41d33ec534f9ca5fba526e72cbac543d20ec78bf196cbc492be280da97
                                                • Instruction ID: 62eefacf568eb53bef66fa4670846832b1998f7bc850e0075fa0180bf23c4259
                                                • Opcode Fuzzy Hash: b6977d41d33ec534f9ca5fba526e72cbac543d20ec78bf196cbc492be280da97
                                                • Instruction Fuzzy Hash: 39213B636082515FD3169778D8257EA7FB6EB83224B1542EBD094CB3D2DA19C84683A2
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14aefc1a2f853c642920af02adb49f0222918358ff248aa052333fd8ba9ce47d
                                                • Instruction ID: 745cace37ce279415b7e12f7adfe44c7cedbe08009c448a656ca915c5c086050
                                                • Opcode Fuzzy Hash: 14aefc1a2f853c642920af02adb49f0222918358ff248aa052333fd8ba9ce47d
                                                • Instruction Fuzzy Hash: 58216530E1020A9BDB15CF64D494ADEF7B6FF89700F14C66AE805EB381DB719841CBA0
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e197693d98a5b0f19f4f60591f0c04bb6488d340cd06902da45fc055a73be338
                                                • Instruction ID: ebd7732508fd632566c4669eb2408bb6c801ec97d5cf3ed4a717cba8fd1eec0a
                                                • Opcode Fuzzy Hash: e197693d98a5b0f19f4f60591f0c04bb6488d340cd06902da45fc055a73be338
                                                • Instruction Fuzzy Hash: B321C1306102018BEB11BB78E894BEBB35AF784240F1079B2E806C7361EB3DDC04CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f28d4ba5a76fa8d62f14f6852b52e9f63661bbc88a66c765353c3954c779084a
                                                • Instruction ID: 9ac180b287441d9251bca9c796b463e01b443303071653ee30d742759a0acd75
                                                • Opcode Fuzzy Hash: f28d4ba5a76fa8d62f14f6852b52e9f63661bbc88a66c765353c3954c779084a
                                                • Instruction Fuzzy Hash: 4C214175E002059BDB19CFA4C454AEEF7B2BF85310F14895AE815F7350EB719846CB50
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2659041744.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_151d000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14866dc6273348f25d34f95b89a556d4ee8f0cb5f9031195439cc755c49db182
                                                • Instruction ID: e3ec72d8e9d005db1a49456076864b8b9c320208849ba1e0598cd04e153ea38f
                                                • Opcode Fuzzy Hash: 14866dc6273348f25d34f95b89a556d4ee8f0cb5f9031195439cc755c49db182
                                                • Instruction Fuzzy Hash: 8421D375504244EFEB16DF64D988B26BBA1FB84314F24C96DD8094F24AD33AD847CA62
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f9164b6a960b29b3338e2e28a37f74a1772088613a8cdb5e464a2673cb41a151
                                                • Instruction ID: 91b828729745766855918d460241b6f58e526dc8d3dcaa204284b291f4c8d0ae
                                                • Opcode Fuzzy Hash: f9164b6a960b29b3338e2e28a37f74a1772088613a8cdb5e464a2673cb41a151
                                                • Instruction Fuzzy Hash: E6212E307002048FDB25DB74C968AEEB7F6AF49205F5015BED806AB3A1DB369D41CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9e9b2b15a38223f150cac7671bbce226ec87cb48335168be06b4714c3887d4a6
                                                • Instruction ID: 23739c28f0951df0b1e1f8348d2b720a9d9b6b0e437628de8ac69aee9f112b32
                                                • Opcode Fuzzy Hash: 9e9b2b15a38223f150cac7671bbce226ec87cb48335168be06b4714c3887d4a6
                                                • Instruction Fuzzy Hash: 97219670A102418BFB355728E4A5BBAB656F706320F5024ABEC07C7781DF38D885C762
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 145f8721925ff41bc22eca4bab4f4d422d753f72ac811b8bb9df0a2d7967f6b7
                                                • Instruction ID: fd9c2297c05633d16a1bf242ab9c9a2ab41da508f2e67109352a9228ad2deedb
                                                • Opcode Fuzzy Hash: 145f8721925ff41bc22eca4bab4f4d422d753f72ac811b8bb9df0a2d7967f6b7
                                                • Instruction Fuzzy Hash: 19214535E002099BDB18CFA5C4649EEF7B6BF89310F148A5AE815F7341DB719945CB60
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4ac35eafe485b60e72e7759288eae0cd2dcced6a69d0d3ed89803e4bfa8711a
                                                • Instruction ID: 76d131a46f22dafb3670f02969c5eb0e7014707b1f67f2035630a381919ebc35
                                                • Opcode Fuzzy Hash: b4ac35eafe485b60e72e7759288eae0cd2dcced6a69d0d3ed89803e4bfa8711a
                                                • Instruction Fuzzy Hash: 8E21FC30B002048FDB24EB69D5646EEB7F6AF89245F5014BED806EB390DB359D45CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be5812837c425404daa732801036c198c0eaedb824a3f74b2a2cac96f6a27f88
                                                • Instruction ID: 8e53979eda3c33d7494f245a62a7305ee5bbc0902cc3680a44a31612ffc724fc
                                                • Opcode Fuzzy Hash: be5812837c425404daa732801036c198c0eaedb824a3f74b2a2cac96f6a27f88
                                                • Instruction Fuzzy Hash: 802162306002058BDB51AB78E894BABB35AF785650F1069B6E806DB351EB3DDC44CBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8043b148c7ea81a50afdc70672a4c10c908ae3b1f40476e938e395dfda5d6207
                                                • Instruction ID: b945cdae23cc019d7b678cabbcd78f9a14d156fb94cf441cf975d226524f6938
                                                • Opcode Fuzzy Hash: 8043b148c7ea81a50afdc70672a4c10c908ae3b1f40476e938e395dfda5d6207
                                                • Instruction Fuzzy Hash: 4D213B317002048FDB64DF78C568AAEB7F1FF89204B1004A9E402EB3A4DB759C04DBA1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2659041744.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_151d000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 12bc154c7b8074d16a3dc11779da50116bf0e20b6eed4c604b5789d62de3ff66
                                                • Instruction ID: d69b38a16d9f1b3f83be764a181e681f57bd56dc36e00ddad35ee7a9961c7b3a
                                                • Opcode Fuzzy Hash: 12bc154c7b8074d16a3dc11779da50116bf0e20b6eed4c604b5789d62de3ff66
                                                • Instruction Fuzzy Hash: 15218B755093809FDB03CF24D994B15BF71FB46214F28C5EAD8498F6A7C33A984ACB62
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1a11eccc60d8c3e7cd1924cff3b0159e72fb0e1511dc95d28e6646778c77e5a4
                                                • Instruction ID: a7bb051709cacaf83fa48ec548da5fefad9d0a50b2e6e4bc3a5561142ecd03de
                                                • Opcode Fuzzy Hash: 1a11eccc60d8c3e7cd1924cff3b0159e72fb0e1511dc95d28e6646778c77e5a4
                                                • Instruction Fuzzy Hash: 23110676F002019BCF009F759809A9F7BF9FB48660F14157AEA06E7300EE39C90187A1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 37b8a4ed8de912934f79eb969258631d0066d55f57bdfc70c414a16d01f687f8
                                                • Instruction ID: 016e109de0ee875f25df6038930a63750842cd40daccc1d444ef37f471a64fdd
                                                • Opcode Fuzzy Hash: 37b8a4ed8de912934f79eb969258631d0066d55f57bdfc70c414a16d01f687f8
                                                • Instruction Fuzzy Hash: F5115830B003098BEF149B79D568BBBB396FB85264F1085BBE40ADF341EA65CC454BE1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b7d069744dd3554191479cb8e99ae15ec20ca60165a0705ff9a4ddc605c8275d
                                                • Instruction ID: ac76bd46d6aa4aeca66ef23876f695611e5b43b9b57942b53b4644b2bb70e822
                                                • Opcode Fuzzy Hash: b7d069744dd3554191479cb8e99ae15ec20ca60165a0705ff9a4ddc605c8275d
                                                • Instruction Fuzzy Hash: 381198306043058BEB145775D928BBB7756F741254F1048BBE40ADB341F965C8454BE1
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 696d6ddfb0caf556d02022e9730aee44348a859c81ee6cdb2610da46c1ec35c3
                                                • Instruction ID: b6846f91b1995dda5ed1b78d7f6f2b59d6f9814cb42f15a5f37c12ef4e076fd1
                                                • Opcode Fuzzy Hash: 696d6ddfb0caf556d02022e9730aee44348a859c81ee6cdb2610da46c1ec35c3
                                                • Instruction Fuzzy Hash: 64119171A002159FCB20EB79C8685EEFAE5EB48220F2404BED809E7305EA35C942C7A5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9a2979b1b7e563a3b7f20b0b2d581115701d37ed362452f5f430babb18ac3fdf
                                                • Instruction ID: e88fb0c85e0d7292dd9340e851507c1101767ce4c86c773058d15757ea730d37
                                                • Opcode Fuzzy Hash: 9a2979b1b7e563a3b7f20b0b2d581115701d37ed362452f5f430babb18ac3fdf
                                                • Instruction Fuzzy Hash: F8015E71A002159FCF11EFB985685EEFAE5EB48250F2404BED809E7305E635C942C7A5
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b821f0ac52ed36f79bd0dc00b959678d9f4486f522f20741b98f5992549b52a5
                                                • Instruction ID: 27b261c63d053a7c8f9a1fc1b157649adaa95ef0154ef25e9447b34453fd367a
                                                • Opcode Fuzzy Hash: b821f0ac52ed36f79bd0dc00b959678d9f4486f522f20741b98f5992549b52a5
                                                • Instruction Fuzzy Hash: 1101A73060034A9FCB05EBB8F9505DD37B5FF81200B0446F8C4415B292DF396E429781
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 58ee7930f0c5601e16f9de50d56fe0ea17e5f73b94efa6c5c0ac656536d5fb1a
                                                • Instruction ID: e30610e16632d534d40a77fe579da8c9da16da5c4774df5a79d41b5ecd0ca6ea
                                                • Opcode Fuzzy Hash: 58ee7930f0c5601e16f9de50d56fe0ea17e5f73b94efa6c5c0ac656536d5fb1a
                                                • Instruction Fuzzy Hash: 88F01930A00209DFDB05FFB8F9909DE77B9EB84200F5096B8C405A7251EE352E459B91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000006.00000002.2663300822.00000000054D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_6_2_54d0000_RegAsm.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: m^$m^$m^$m^
                                                • API String ID: 0-92939119
                                                • Opcode ID: 3c6c3786413e846197bb44c0bd05db94c627d44a4c217bf7360f36be4b260e25
                                                • Instruction ID: 6dfbd72301d2accde0a85f6c66b63b7a84d51eb34c865c3d13e162b72daae7f3
                                                • Opcode Fuzzy Hash: 3c6c3786413e846197bb44c0bd05db94c627d44a4c217bf7360f36be4b260e25
                                                • Instruction Fuzzy Hash: 5E41A74245E7E51FE30366BCAC717D62F649F9266AF0900D3D884CE193E64C488E82BB