Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002A_20.exe

Overview

General Information

Sample name:LisectAVT_2403002A_20.exe
Analysis ID:1482427
MD5:c4d3655d5c8b473292c064ea6392e59e
SHA1:7dff8774fabb5e6ef3a9a695d89e8c369d2cd6f4
SHA256:b3a927c1fdd44c0c8f0c819cb62ca6e0fa8362b9fb7d5baa10cd5348e4a20bde
Tags:exe
Infos:

Detection

Mars Stealer, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Mars stealer
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • LisectAVT_2403002A_20.exe (PID: 5264 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002A_20.exe" MD5: C4D3655D5C8B473292C064EA6392E59E)
    • WerFault.exe (PID: 3872 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 456 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://185.172.128.26/f993692117a3fda2.php"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x1318:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
      00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.3.LisectAVT_2403002A_20.exe.2290000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            0.3.LisectAVT_2403002A_20.exe.2290000.0.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
              0.2.LisectAVT_2403002A_20.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                0.2.LisectAVT_2403002A_20.exe.400000.0.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                  0.2.LisectAVT_2403002A_20.exe.2260e67.1.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                    Click to see the 7 entries
                    No Sigma rule has matched
                    No Snort rule has matched
                    Timestamp:2024-07-25T22:52:34.932648+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49720
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:2024-07-25T22:51:57.594251+0200
                    SID:2022930
                    Source Port:443
                    Destination Port:49718
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: LisectAVT_2403002A_20.exeAvira: detected
                    Source: http://185.172.128.26/f993692117a3fda2.phpAvira URL Cloud: Label: malware
                    Source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": "http://185.172.128.26/f993692117a3fda2.php"}
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: CtIvEWInDoW
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: AgEBOxw
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ""
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: jjnnllllddbbffbbxxxxxx~~rrvvttttLLJJNNJJ@@@@@@FFZZ^^\\\\TTRRVVRR
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: pppppppppppp|||| ,,,,4444<<<<88888888
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: <<::>>::00000066**..,,,,$$""&&""
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: llllttttdddd||||||||ddddttttllllLLLLTTTTDDDD\\\\\\\\DDDDTTTTLLLL,,,,4444$$$$<<<<<<<<$$$$4444,,,,llllttttdddd||||||||ddddttttllllLLLLTTTTDDDD\\\\\\\\DDDDTTTTLLLL
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: hhhhhhhh(((((((?66::>>::66**..**-/-SUWUS]_]SUWUSmomsuwuDDDDLLLLDDDD||||DDDDLLL{}}{egekmomkege[]_][%'226622>79;9?9;97
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: lllltttt||||tt~~ppppbb^^""&&""..""&&""LLLL4444<<<<4444LL>>::FFJJNNJJFFZZ^^((((XXXXXXXXhhhhhhjjnnjjvvzz~~zz||||
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 4444<<>>888822..$$$$dd^^ZZffjjnnPPPPppppppJJFFzz~~zz||||DDDDLLvvrrNNRRVVhhhhXXXXXXbb
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tttt||||||||ttttddddllllllllddddTTTT\\\\\\\\TTTTDDDDLLLLLLLLDDDD
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 6-/-+575;=?= ;575+-/-+
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: <<<<4444
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ((((((((888888=?=26622..Y[Y_Y[Ygikioikigy{yyLLLDDDD||||DDDDLLLLDDsqwqsqoQSQWQSQ_QSQWQSf
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: xxxxxxxhhhhhhhh0000000000000$$$<<<<$$$$,,,,$$$$
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~tuvwxy~~txyz{|}~t
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ?9EFGHIJK
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: O66::deZ[\=?=c>>::66p+)/]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_`abcdeZ[\]^_acagacRRVVRRnnrrvvOMKEGEACAGAC'rrvvrrNNRRVV4omkegev-#%61
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ijklmnopqrs!"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: %'#$%&'()**..**012345679;9ttrstuvwxyjm
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: .26:6::>2>>226:&&**.".."ikSQacaoacJM
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: []_][EGEKMIKOARU
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: /#%33
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~~~tuvwxyz|}
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tuvwx9;9?}@AB
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: JKLMNOXYZ[`abcde<<444<44nopqrsZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXYZ[\]^WXXRRVVRZVVLLDDDvzz$%&'()pppppxhh234567bbf-/%+-uvwxyk5
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: abcdefghijklmnopqrs!"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: (((((((()*+-/-+575;=?=;575pqrsuwus}lg
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 26622>>226Y[Y_WQSQ_QBE
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: WIZ]stuvRxzC123]5[/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~tuvwxyz{|}
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tuvwxyz~z{|tuvwxyz
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ?9EFGHIJK
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: OPQRSZ_`abc>>::66jklmn5+-/-_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_Z[\]^_\\TTTTKIOIKI!xxxxxx()*+,wusmom34567bbf-/-stuvw""72
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: hiqrnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsmnopqrsomkuwu{fbb~~bby{ygiki!"NJJVVZZ*+ACA_ACA34XXXHHHqrko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: *.6:26622>>2:>>::&&**.&**.egekmoWUikx{
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: WY[Y_Y[YWIZ]stuvWWIK+/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ,m
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: t6+q1
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Zxyz
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: cvapbuqvabs{wb
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: uuawftrr
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: s
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tuvwtuvtuv|}tuvw
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 3-QRSTUVW
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: abcdefghijklmnopqrs!"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: "&&""..""&&"">>""&&"".."ikIKSUWUS]_]SUFA
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 567D9+/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Nl32dll
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: %s\%V\%s
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~tuvwxyz{|}
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tuvwxyz{|}tuvz{|}tuvwx
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: i000000deqrjklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijklmnopqrsijkllllttttcagacaacag~rrvLLLTTTT()CAGACA_ACAG56^RRVwx
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: *..*%&'((((((((8888888789:qsqwqsqqs`c
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: :>>::&&**._ACAGACAOARU
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: }567y9n/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: &+8,?E
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: +-n 1,"U4-ic$
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 91ra137F&es
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: r.*
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Y+MerJ5ZFml
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: _
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: I*VE4k
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~tuvwx~~tuvwxz{|tuvwx
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: |=AB@AB
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: G..226622>>22lmnoZ?o**..^_`abcdefghijklmnoZ[\]^_`abcdefghijklmnoZ[\]^_`abcdefghijklmnoZ[\]^_`abcdefghijklmnoZ[\]^_`abcdefghijklmnoZ[\]^_`abcdefghijklmnoXXXXXXhhhhhhhhxxxxxxxxCA}}{EGEKMOMKEGE[]_][5llddd/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: qrs!"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: &**..**&&::9;9<<<444/ffjjnTTT\\MH
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: [EGEKM^Ywxyzb2/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: OPQRSTUVWXYZ[\]^_`abcefgs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: $#!'!#&**..-/-+50000075;=?qsqwqttt||jm
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 4445753=?=:>>::&&#!'!#!/((cegecdddll}x
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: >2WY[Y_Y[PPPAD
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: CEGJEKMONSV
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 456789+/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: '--- '
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~tuvwxyz{|}
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~tuvwxyz{|}
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: xyz|}z{z{|}x
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !"#$%&'()*+,-./0123456789:pqrstuvwxyko
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: @@@@DT#7!WI]G\SO6'I@43@@st@@C@@@CD!"GHrKL/BOPdcmaeinhP!01efm;--0G<&2TSRuvG-20`uk`ry89+/
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Ip!-n`E=
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: B24Yw0
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 2
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ;
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~MJTu`Y
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: @W4t$krM
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: dle
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 6|`s
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: VQPUUkkTK
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: {}snzhNS\
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 6z
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Z(3Y
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: WN1CBQ
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: K{{jh
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tU
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: a@"O@|*
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: r}~mLT,/?Z
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 7*yN
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tn
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: oA|
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: a
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: xZ~Mi
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 4V<!;bjw3%V.?3p
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: npllX#
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: |a
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: z7-i)G
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: y
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: LXX?v{qazkspaw
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: sLCO%DOaHJE&
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: d;y<>MTQK-\
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: nnbyrvjm{nmjrr
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ?
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ";H6)4
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: fHFQp
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: HeapFree
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: rb{dwy
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 2a}
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !=`O
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: pd|rfbYU
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 8{dygt:}{W7N
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: [\-
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 7.(fU5c%RclK
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: {s0R5OgcWOD
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: gC~rog`vvoC
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: pv
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: }Hv
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: GetLocaleInfoA
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: j}b`dxjkd
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: l*dx%y
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: do;Pe;D>
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: eQw<$|3
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: WueFEGc
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: U{Vhvtim\v
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: S#S3
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: cVJA!r4zU
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: <d(*
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: io$q
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: } {rbRGY
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: leA
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ^{qwh_
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: w|e
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: `|o
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: d{dpa9GA3|}FVD4
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: s@`iPjJ(3 epx9ML
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 78OW5jyNoFC
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: !)1
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 4\col^ivHYr
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: nh1"
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: tq}8Tyvpqe~N
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: -yJ+$pzq`-ho+
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: wd
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: _uvaf
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ntProcessId
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: r
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 4632FD
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: .Usi
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: t
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: wininet.dr
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: shlwapi.dvz
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: shell32.d
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: &jZB3
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: .dll
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: t5N zFuD
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: asfwrdf^gzP4
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ]^(;cLAn;>
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: q0`
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: wcoejdh
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: l
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: mF0
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: .rdM8A1
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: BxHp*gwTnwqs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: S
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ayDy
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: }Tuh1
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: m
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: P #9"ccIgfue@k35-&
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 1hee
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: P^;nu!D$%+
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ggoizb`p
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Mor
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: eoS^Rs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: VZBzQq{0QFa
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: w{
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: wTFL;rg?ab
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 5ko{88F
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: vjE
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor:
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: eJLN3gy`
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 1obz}#lC
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Vec
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ?)6:f{ $IWB;euL
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: #zvjmuCkS2}wq
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Rrq3
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: uX
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: djiCusEv
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: jJ'
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: zxt
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: `5#nwlw5`
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ?Yn
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: n
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ihsbu
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ?*t}z.O
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: column_text
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: }{_Pzj
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: rr7ZmP
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~7*9?%g5
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: J4FXuHFP6
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ih\w
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: `}~o{
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: lob
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: aimkcZfk
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: e8ytWu3]259
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ~sSZapEw
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 6
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: up7[5F8@B7;'e
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: xm|nxymr~`~ojs|}~
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: gbzzpeqdx{qfe
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: :$voz]afv6$x
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: dns
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: RTSB49
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: T'&
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: logintg
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 04bsB
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: nvH(
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: Wk
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: CtIvEWInDoW
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: AgEBOxw
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ijklmnopqrs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: /#%33@@@
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: abcdefghijklmnopqrs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: @@@@<@@@
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: abcdefghijklmnopqrs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: "&&""..""&&"">>""&&"".."ikSQWQSQ_QBEklmn^pqrBtuvFxyzL123H5679+/|
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: %s\%V/yVs
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: %s\*.
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: }567y9n/S
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ntTekeny
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ging
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: PassMord0
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: J@@@`z`@J@@@J@@@
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: OPQRSTUVWXY
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: 456753+/---- '
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: '--- '
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: K{{jhX
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: npllX#
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: HeapFree
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: GetLocaleInfoA
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: ntProcessId
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: .Usi
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: wininet.dll
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: shlwapi.dll
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: shell32.dll
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: .dll
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: column_text
                    Source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpackString decryptor: login:

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeUnpacked PE file: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack
                    Source: LisectAVT_2403002A_20.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: http://185.172.128.26/f993692117a3fda2.php
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: String function: 004043B0 appears 316 times
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 456
                    Source: LisectAVT_2403002A_20.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/0
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_008A4346 CreateToolhelp32Snapshot,Module32First,0_2_008A4346
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5264
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\4c9d13fc-3620-46a0-aed7-b76d5115d46bJump to behavior
                    Source: LisectAVT_2403002A_20.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\LisectAVT_2403002A_20.exe "C:\Users\user\Desktop\LisectAVT_2403002A_20.exe"
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 456
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeUnpacked PE file: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeUnpacked PE file: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00415ED0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00415ED0
                    Source: LisectAVT_2403002A_20.exeStatic PE information: real checksum: 0x3c08f should be: 0x3c093
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_004176C5 push ecx; ret 0_2_004176D8
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_008AC443 pushad ; retf C3E8h0_2_008AC46B
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_0227792C push ecx; ret 0_2_0227793F
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00415ED0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00415ED0
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI coverage: 5.0 %
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00401120 GetSystemInfo,ExitProcess,0_2_00401120
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: LisectAVT_2403002A_20.exe, 00000000.00000002.2193378244.000000000088E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24360
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24363
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24375
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24382
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24501
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24210
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeAPI call chain: ExitProcess graph end nodegraph_0-24383
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00417B4E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417B4E
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00415ED0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00415ED0
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00415DC0 mov eax, dword ptr fs:[00000030h]0_2_00415DC0
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_008A3C23 push dword ptr fs:[00000030h]0_2_008A3C23
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_02276027 mov eax, dword ptr fs:[00000030h]0_2_02276027
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_0226092B mov eax, dword ptr fs:[00000030h]0_2_0226092B
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_02260D90 mov eax, dword ptr fs:[00000030h]0_2_02260D90
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00419DC7 SetUnhandledExceptionFilter,0_2_00419DC7
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_00417B4E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00417B4E
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_004173DD memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004173DD
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_02277644 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_02277644
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_0227A02E SetUnhandledExceptionFilter,0_2_0227A02E
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_02277DB5 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02277DB5
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_004135E0 GetSystemTime,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_004135E0
                    Source: C:\Users\user\Desktop\LisectAVT_2403002A_20.exeCode function: 0_2_004143C0 GetUserNameA,0_2_004143C0
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.LisectAVT_2403002A_20.exe.2290000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.LisectAVT_2403002A_20.exe.2260e67.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    Process Injection
                    1
                    Process Injection
                    OS Credential Dumping1
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Application Layer Protocol
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Deobfuscate/Decode Files or Information
                    LSASS Memory21
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                    Obfuscated Files or Information
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Software Packing
                    NTDS1
                    Account Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    System Owner/User Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials3
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    LisectAVT_2403002A_20.exe100%AviraTR/Kryptik.zlbti
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    http://185.172.128.26/f993692117a3fda2.php100%Avira URL Cloudmalware
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://185.172.128.26/f993692117a3fda2.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://upx.sf.netAmcache.hve.4.drfalse
                    • URL Reputation: safe
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1482427
                    Start date and time:2024-07-25 22:50:48 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 22s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:9
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:LisectAVT_2403002A_20.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@2/5@0/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 94%
                    • Number of executed functions: 16
                    • Number of non-executed functions: 42
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.42.73.29
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                    • VT rate limit hit for: LisectAVT_2403002A_20.exe
                    TimeTypeDescription
                    16:51:54API Interceptor1x Sleep call for process: WerFault.exe modified
                    No context
                    No context
                    No context
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.7840849924563663
                    Encrypted:false
                    SSDEEP:96:MSCyNXtWsLyhqeLI7qLfHQXIDcQjc6EObQcENcw3UjU+HbHg/8BRTf3o8Fa9SAjk:/CaW2o0094ObQXkjJdzuiFMZ24IO8T
                    MD5:5D384B343327C7772448E4BBCB41298B
                    SHA1:57D85F0F09D92386040EA13F16685537227D8A83
                    SHA-256:11EF7D50F960CD0F50E4FAEADD2AB65646FCBF2746A19674469E8762618AAD7B
                    SHA-512:EE479956F5D667ED0AC798BEE1F553ACD8DA9046B68706D337928FCF1DFCA2C2F62521D702507D2A0BF362F550E8CC833D75E849B6063017C5434436E13D6495
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.4.1.4.2.9.7.4.0.6.4.6.9.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.4.1.4.2.9.7.7.5.0.2.2.2.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.8.9.7.c.6.1.-.9.c.b.0.-.4.a.6.e.-.8.6.6.9.-.7.2.3.f.8.d.3.3.7.7.3.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.0.4.7.5.e.b.8.-.f.9.f.0.-.4.2.3.1.-.b.0.9.e.-.6.f.d.d.c.0.d.b.5.1.2.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.i.s.e.c.t.A.V.T._.2.4.0.3.0.0.2.A._.2.0...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.9.0.-.0.0.0.1.-.0.0.1.4.-.2.d.0.6.-.a.b.7.0.d.4.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.7.8.5.7.3.c.6.3.c.1.e.2.d.8.1.3.f.7.e.1.a.9.c.f.c.0.d.2.8.4.7.0.0.0.0.f.f.f.f.!.0.0.0.0.7.d.f.f.8.7.7.4.f.a.b.b.5.e.6.e.f.3.a.9.a.6.9.5.d.8.9.e.8.c.3.6.9.d.2.c.d.6.f.4.!.L.i.s.e.c.t.A.V.T._.2.4.0.3.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Thu Jul 25 20:51:37 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):23918
                    Entropy (8bit):2.57764770464237
                    Encrypted:false
                    SSDEEP:96:5k8ql1anLj6Uta61BGHPXExt+Qa0Tnelk/i7pvK+pQ7kB/bIQ291Loqx3QN7WIkp:BofPXG+QRLel8Op9NIV0q5QNPGb5GfO
                    MD5:E96E6E773E41F4B74D491F3B76D6C97C
                    SHA1:4CED873B4D50D7E435E31F996F56D960A469A102
                    SHA-256:D5B770C95BF2BA317E7EAFBCEDC0C345E11E9B4667F26E668CC9BD380A5192AB
                    SHA-512:002B7C45C11F97DB38C7BFE7B866D83E428709C2C008A2CC69196C10E8FBA575132956F0B0AE53F7AA20296EAF49D2489B3CABEFE10C499CDAB3F4B25A680134
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... .........f............4...............<.......................T.......8...........T...........0...>K......................................................................................................eJ......P.......GenuineIntel............T.............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8398
                    Entropy (8bit):3.6961642400319263
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJPjJ6gkoSk56YEIY1SU9NLmgmfqyObb9GpDP89bMJsfOEm:R6lXJ7J6gkjQ6YEnSU9NLmgmfqyObFMD
                    MD5:2BE9C08E0AABB659A53CFE369929840A
                    SHA1:A31065BA750CE5162DA307E455901B3E2D8FB0A2
                    SHA-256:E1F808B3A664114AE03928A421A1029DF3A079893136781558F5C48DE863C244
                    SHA-512:49C1A045BE7E3BA1061099EA6E3E0C2AE7C3E521C82C64CB9B160AE23EC36F314D59798E87D56D21283C09AA2C3DA50C32FB653E0A3AFB775F89FD09A01A0EC9
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.2.6.4.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4656
                    Entropy (8bit):4.497643293491694
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zs2NJg77aI9ZjuWpW8VYFYm8M4JEQZFD+q8sACZI5kd:uIjfCI7TjP7VBJ3TZI5kd
                    MD5:17858A64A0C9D9F565CEFA9B9FABF4EF
                    SHA1:82F2C297937486108EC5D8411071A2DFBE1D4930
                    SHA-256:7A81044824BFA241D29B2F6B4C3A7AC146A40F5DC523463146DA881AA8FAA417
                    SHA-512:A27FF9854F992D3E8D1A6D3551831A3AE2256F597D4D28BEC306B0AEC798AFE7774886F0280B53A2260A53564224AF63790254D7BD849D67AC12BFEB25494009
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="426954" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.421573146259613
                    Encrypted:false
                    SSDEEP:6144:zSvfpi6ceLP/9skLmb0OToWSPHaJG8nAgeMZMMhA2fX4WABlEnNp0uhiTw:+vloToW+EZMM6DFyX03w
                    MD5:1425F1464586D29FF355A95D44BA3500
                    SHA1:C64FF9488FD7C1896990823F6F4C4E741B9F0B18
                    SHA-256:A9F985348EBFB9F9A6768E7CFB598E45F5C3A09445A60CB5DF7143B47237826C
                    SHA-512:CE6E050CF215BAAB833A47B67FA869B52E89B8BD69E6C696D280D2EB8CA41A4D3E8D7D020270B3D18A4FBC8C4B9E37115BED3A5C3590342868F9486FD013D131
                    Malicious:false
                    Reputation:low
                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmN..q................................................................................................................................................................................................................................................................................................................................................<..E........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.5086172286110155
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:LisectAVT_2403002A_20.exe
                    File size:234'500 bytes
                    MD5:c4d3655d5c8b473292c064ea6392e59e
                    SHA1:7dff8774fabb5e6ef3a9a695d89e8c369d2cd6f4
                    SHA256:b3a927c1fdd44c0c8f0c819cb62ca6e0fa8362b9fb7d5baa10cd5348e4a20bde
                    SHA512:56ba118a982a9d18a386931f1ce5d13339acee83fb81900b6cc48f845311b05bf756d58f969c1a61f307ba12a02d9bc5370bb7cf8c0c910a7fa6347f4a8d9148
                    SSDEEP:3072:Hy/JcAzMcvZv2wjNHMk/54RNA5CvIjwRvOYSIxYL7fJSNyoBYTbLOoCAT7ht:HEcuMKv2wjRMNPA56x1T7IJSNfCZT7h
                    TLSH:B934DFA032E0C03AD1B71A3148A5DBB14A7ABD726B7941CB7394273E1F716D14ABE353
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B..\#.[\#.[\#.[3U.[D#.[3U [(#.[3U![{#.[U[.[W#.[\#.[7#.[3U%[]#.[3U.[]#.[3U.[]#.[Rich\#.[........................PE..L......d...
                    Icon Hash:1369454d69170717
                    Entrypoint:0x401eb1
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x64020296 [Fri Mar 3 14:22:14 2023 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:321f5991d9ca05f3c2dbb14c7f0cb744
                    Instruction
                    call 00007F2EF0BFF857h
                    jmp 00007F2EF0BFBA3Eh
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    sub esp, 20h
                    mov eax, dword ptr [ebp+08h]
                    push esi
                    push edi
                    push 00000008h
                    pop ecx
                    mov esi, 00411248h
                    lea edi, dword ptr [ebp-20h]
                    rep movsd
                    mov dword ptr [ebp-08h], eax
                    mov eax, dword ptr [ebp+0Ch]
                    pop edi
                    mov dword ptr [ebp-04h], eax
                    pop esi
                    test eax, eax
                    je 00007F2EF0BFBBBEh
                    test byte ptr [eax], 00000008h
                    je 00007F2EF0BFBBB9h
                    mov dword ptr [ebp-0Ch], 01994000h
                    lea eax, dword ptr [ebp-0Ch]
                    push eax
                    push dword ptr [ebp-10h]
                    push dword ptr [ebp-1Ch]
                    push dword ptr [ebp-20h]
                    call dword ptr [004110B8h]
                    leave
                    retn 0008h
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    sub esp, 00000328h
                    mov dword ptr [00433308h], eax
                    mov dword ptr [00433304h], ecx
                    mov dword ptr [00433300h], edx
                    mov dword ptr [004332FCh], ebx
                    mov dword ptr [004332F8h], esi
                    mov dword ptr [004332F4h], edi
                    mov word ptr [00433320h], ss
                    mov word ptr [00433314h], cs
                    mov word ptr [004332F0h], ds
                    mov word ptr [004332ECh], es
                    mov word ptr [004332E8h], fs
                    mov word ptr [004332E4h], gs
                    pushfd
                    pop dword ptr [00433318h]
                    mov eax, dword ptr [ebp+00h]
                    mov dword ptr [0043330Ch], eax
                    mov eax, dword ptr [ebp+04h]
                    mov dword ptr [00433310h], eax
                    lea eax, dword ptr [ebp+08h]
                    Programming Language:
                    • [ASM] VS2010 build 30319
                    • [ C ] VS2010 build 30319
                    • [C++] VS2010 build 30319
                    • [IMP] VS2008 SP1 build 30729
                    • [RES] VS2010 build 30319
                    • [LNK] VS2010 build 30319
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2f8540x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1360000x7d30.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x110000x194.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xf2a80xf400d711baf54806408b2c6ce710cb4b50a4False0.5982165727459017data6.650652502380705IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x110000x1f18e0x1f200672def33384f88932df3cfc9edd3bf53False0.6968969628514057zlib compressed data6.547948233891078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x310000x1042e40x2c0022a92f280a592cbd563bc61d437c9d19False0.1581143465909091data1.8774694742495086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x1360000x104d300x7e0095bbc6ed352c5fd42397e62355d7ead0False0.5481770833333334data5.532829005955218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_CURSOR0x13cca80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                    RT_ICON0x1364300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SpanishPeru0.43310234541577824
                    RT_ICON0x1372d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SpanishPeru0.5712996389891697
                    RT_ICON0x137b800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SpanishPeru0.6434331797235023
                    RT_ICON0x1382480x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SpanishPeru0.7095375722543352
                    RT_ICON0x1387b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SpanishPeru0.5577800829875519
                    RT_ICON0x13ad580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SpanishPeru0.5893527204502814
                    RT_ICON0x13be000x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SpanishPeru0.6721311475409836
                    RT_ICON0x13c7880x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SpanishPeru0.7039007092198581
                    RT_DIALOG0x13cfe00x98data0.7631578947368421
                    RT_STRING0x13d0780x192data0.4925373134328358
                    RT_STRING0x13d2100x5f8data0.4352094240837696
                    RT_STRING0x13d8080xbedata0.5894736842105263
                    RT_STRING0x13d8c80x464data0.4626334519572954
                    RT_ACCELERATOR0x13cc680x40data0.859375
                    RT_GROUP_CURSOR0x13cdd80x14data1.15
                    RT_GROUP_ICON0x13cbf00x76dataSpanishPeru0.6610169491525424
                    RT_VERSION0x13cdf00x1f0MS Windows COFF PowerPC object file0.5745967741935484
                    DLLImport
                    KERNEL32.dllGetNumaProcessorNode, DebugActiveProcessStop, GetConsoleAliasExesLengthA, SetUnhandledExceptionFilter, InterlockedIncrement, WaitForSingleObject, SetComputerNameW, ConnectNamedPipe, GetModuleHandleW, GetTickCount, LoadLibraryW, GetLocaleInfoW, GetFileAttributesA, HeapCreate, lstrcpynW, GetAtomNameW, FindNextVolumeMountPointW, SetConsoleTitleA, GetConsoleOutputCP, TryEnterCriticalSection, GetLongPathNameW, GetThreadLocale, GetProcAddress, HeapSize, CreateHardLinkW, FindAtomA, GlobalFindAtomW, SetSystemTime, GetModuleFileNameA, SetConsoleTitleW, HeapSetInformation, GetCurrentDirectoryA, SetCalendarInfoA, FindAtomW, CloseHandle, GetLastError, CreateFileA, CreateFileW, ReadFile, FlushFileBuffers, HeapReAlloc, HeapAlloc, GetCommandLineA, GetStartupInfoW, RaiseException, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, IsDebuggerPresent, DecodePointer, EncodePointer, HeapFree, IsProcessorFeaturePresent, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, EnterCriticalSection, LeaveCriticalSection, FreeEnvironmentStringsW, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, GetCurrentThreadId, InterlockedDecrement, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, Sleep, RtlUnwind, MultiByteToWideChar, SetStdHandle, WriteConsoleW, LCMapStringW, GetStringTypeW
                    USER32.dllCopyRect, GetMonitorInfoW, LoadIconW
                    ADVAPI32.dllRegCreateKeyW
                    ole32.dllCoTaskMemFree
                    WINHTTP.dllWinHttpOpen
                    Language of compilation systemCountry where language is spokenMap
                    SpanishPeru
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:16:51:36
                    Start date:25/07/2024
                    Path:C:\Users\user\Desktop\LisectAVT_2403002A_20.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\LisectAVT_2403002A_20.exe"
                    Imagebase:0x400000
                    File size:234'500 bytes
                    MD5 hash:C4D3655D5C8B473292C064EA6392E59E
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000003.2017654737.0000000002290000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    Reputation:low
                    Has exited:true

                    Target ID:4
                    Start time:16:51:37
                    Start date:25/07/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 456
                    Imagebase:0x7a0000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:2.9%
                      Dynamic/Decrypted Code Coverage:12.5%
                      Signature Coverage:9.7%
                      Total number of Nodes:393
                      Total number of Limit Nodes:13
                      execution_graph 24689 226fd25 ExitProcess strtok_s strtok_s 24204 401150 24211 414400 24204->24211 24206 40115e 24207 40118c 24206->24207 24215 4143c0 24206->24215 24209 401177 24209->24207 24210 401184 ExitProcess 24209->24210 24212 414413 GetComputerNameA 24211->24212 24214 414436 24212->24214 24214->24206 24216 4143d3 GetUserNameA 24215->24216 24216->24209 24691 226ff3f 20 API calls 24600 226003c 24601 2260049 24600->24601 24613 2260e0f SetErrorMode SetErrorMode 24601->24613 24606 2260265 24607 22602ce VirtualProtect 24606->24607 24609 226030b 24607->24609 24608 2260439 VirtualFree 24612 22604be LoadLibraryA 24608->24612 24609->24608 24611 22608c7 24612->24611 24614 2260223 24613->24614 24615 2260d90 24614->24615 24616 2260dad 24615->24616 24617 2260dbb GetPEB 24616->24617 24618 2260238 VirtualAlloc 24616->24618 24617->24618 24618->24606 24642 2260001 8 API calls 24619 8a3ba6 24620 8a3bb5 24619->24620 24623 8a4346 24620->24623 24628 8a4361 24623->24628 24624 8a436a CreateToolhelp32Snapshot 24625 8a4386 Module32First 24624->24625 24624->24628 24626 8a4395 24625->24626 24629 8a3bbe 24625->24629 24630 8a4005 24626->24630 24628->24624 24628->24625 24631 8a4030 24630->24631 24632 8a4079 24631->24632 24633 8a4041 VirtualAlloc 24631->24633 24632->24632 24633->24632 24692 418d6e 104 API calls __setmbcp 24693 2273917 293 API calls 24695 2269517 VirtualAlloc VirtualAlloc VirtualFree malloc 24645 408274 RaiseException task __CxxThrowException@8 24697 414b79 lstrlen lstrlen 24699 227911c 42 API calls 2 library calls 24646 22739d8 251 API calls 24702 417900 5 API calls 2 library calls 24703 2278c83 51 API calls 2 library calls 24704 226eb77 30 API calls 24705 226f913 strtok_s lstrlen lstrlen codecvt 24649 2278c7b 6 API calls 2 library calls 24651 408e20 71 API calls std::exception::exception 24653 2271613 7 API calls 24708 2279340 41 API calls __calloc_crt 24710 419dc7 SetUnhandledExceptionFilter 24711 4171ca 68 API calls 2 library calls 24659 4190d9 69 API calls __calloc_crt 24661 226e687 36 API calls 24662 4176e0 6 API calls 3 library calls 24714 4063e3 LoadLibraryA GetProcAddress 24669 2278c7c 54 API calls 3 library calls 24672 226ecf7 31 API calls 24673 408a93 5 API calls allocator 24676 226f49b strtok_s 24677 2268cfa malloc RaiseException allocator 24721 226f5fb strtok_s strtok_s 24722 40ef9f 64 API calls 24723 2266dc7 40 API calls 2 library calls 24680 22736ca ExitProcess 24681 226f49b strtok_s lstrlen 24218 4136b0 24254 402130 24218->24254 24222 4136c0 24357 401190 24222->24357 24233 4143c0 GetUserNameA 24234 4136f0 24233->24234 24235 414400 GetComputerNameA 24234->24235 24236 413703 24235->24236 24384 416fb0 24236->24384 24238 413724 24239 416fb0 lstrlen 24238->24239 24240 41372b 24239->24240 24241 416fb0 lstrlen 24240->24241 24242 413732 24241->24242 24243 416fb0 lstrlen 24242->24243 24244 413739 24243->24244 24245 416fb0 lstrlen 24244->24245 24246 413740 24245->24246 24248 413782 OpenEventA 24246->24248 24251 413799 24246->24251 24250 4137b5 CloseHandle Sleep 24248->24250 24248->24251 24250->24246 24388 4135e0 GetSystemTime 24251->24388 24253 4137d6 CloseHandle ExitProcess 24467 4043b0 LocalAlloc 24254->24467 24257 4043b0 2 API calls 24258 40215d 24257->24258 24259 4043b0 2 API calls 24258->24259 24260 402176 24259->24260 24261 4043b0 2 API calls 24260->24261 24262 40218f 24261->24262 24263 4043b0 2 API calls 24262->24263 24264 4021a8 24263->24264 24265 4043b0 2 API calls 24264->24265 24266 4021c1 24265->24266 24267 4043b0 2 API calls 24266->24267 24268 4021da 24267->24268 24269 4043b0 2 API calls 24268->24269 24270 4021f3 24269->24270 24271 4043b0 2 API calls 24270->24271 24272 40220c 24271->24272 24273 4043b0 2 API calls 24272->24273 24274 402225 24273->24274 24275 4043b0 2 API calls 24274->24275 24276 40223e 24275->24276 24277 4043b0 2 API calls 24276->24277 24278 402257 24277->24278 24279 4043b0 2 API calls 24278->24279 24280 402270 24279->24280 24281 4043b0 2 API calls 24280->24281 24282 402289 24281->24282 24283 4043b0 2 API calls 24282->24283 24284 4022a2 24283->24284 24285 4043b0 2 API calls 24284->24285 24286 4022bb 24285->24286 24287 4043b0 2 API calls 24286->24287 24288 4022d4 24287->24288 24289 4043b0 2 API calls 24288->24289 24290 4022ed 24289->24290 24291 4043b0 2 API calls 24290->24291 24292 402306 24291->24292 24293 4043b0 2 API calls 24292->24293 24294 40231f 24293->24294 24295 4043b0 2 API calls 24294->24295 24296 402338 24295->24296 24297 4043b0 2 API calls 24296->24297 24298 402351 24297->24298 24299 4043b0 2 API calls 24298->24299 24300 40236a 24299->24300 24301 4043b0 2 API calls 24300->24301 24302 402383 24301->24302 24303 4043b0 2 API calls 24302->24303 24304 40239c 24303->24304 24305 4043b0 2 API calls 24304->24305 24306 4023b5 24305->24306 24307 4043b0 2 API calls 24306->24307 24308 4023ce 24307->24308 24309 4043b0 2 API calls 24308->24309 24310 4023e7 24309->24310 24311 4043b0 2 API calls 24310->24311 24312 402400 24311->24312 24313 4043b0 2 API calls 24312->24313 24314 402419 24313->24314 24315 4043b0 2 API calls 24314->24315 24316 402432 24315->24316 24317 4043b0 2 API calls 24316->24317 24318 40244b 24317->24318 24319 4043b0 2 API calls 24318->24319 24320 402464 24319->24320 24321 4043b0 2 API calls 24320->24321 24322 40247d 24321->24322 24323 4043b0 2 API calls 24322->24323 24324 402496 24323->24324 24325 4043b0 2 API calls 24324->24325 24326 4024af 24325->24326 24327 4043b0 2 API calls 24326->24327 24328 4024c8 24327->24328 24329 4043b0 2 API calls 24328->24329 24330 4024e1 24329->24330 24331 4043b0 2 API calls 24330->24331 24332 4024fa 24331->24332 24333 4043b0 2 API calls 24332->24333 24334 402513 24333->24334 24335 4043b0 2 API calls 24334->24335 24336 40252c 24335->24336 24337 4043b0 2 API calls 24336->24337 24338 402545 24337->24338 24339 4043b0 2 API calls 24338->24339 24340 40255e 24339->24340 24341 415ed0 24340->24341 24471 415dc0 GetPEB 24341->24471 24343 415ed8 24344 416103 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 24343->24344 24345 415eea 24343->24345 24346 416164 GetProcAddress 24344->24346 24347 41617d 24344->24347 24350 415efc 21 API calls 24345->24350 24346->24347 24348 4161b6 24347->24348 24349 416186 GetProcAddress GetProcAddress 24347->24349 24351 4161d8 24348->24351 24352 4161bf GetProcAddress 24348->24352 24349->24348 24350->24344 24353 4161e1 GetProcAddress 24351->24353 24354 4161f9 24351->24354 24352->24351 24353->24354 24355 416231 24354->24355 24356 416202 GetProcAddress GetProcAddress 24354->24356 24355->24222 24356->24355 24358 4011a8 24357->24358 24359 4011d7 24358->24359 24360 4011cf ExitProcess 24358->24360 24361 401120 GetSystemInfo 24359->24361 24362 401144 24361->24362 24363 40113c ExitProcess 24361->24363 24364 4010d0 24362->24364 24365 4010f1 VirtualAllocExNuma 24364->24365 24366 401101 ExitProcess 24365->24366 24367 401109 24365->24367 24472 401060 VirtualAlloc 24367->24472 24370 4011e0 24476 415090 24370->24476 24373 401209 __aulldiv 24374 40125a 24373->24374 24375 401252 ExitProcess 24373->24375 24376 413430 24374->24376 24377 41343a 24376->24377 24378 413493 GetUserDefaultLangID 24377->24378 24379 413481 ExitProcess 24377->24379 24380 413463 ExitProcess 24377->24380 24381 413477 ExitProcess 24377->24381 24382 41348b ExitProcess 24377->24382 24383 41346d ExitProcess 24377->24383 24378->24233 24382->24378 24478 416d10 24384->24478 24386 416fc1 lstrlen 24387 416fe0 24386->24387 24387->24238 24479 4134e0 24388->24479 24390 41364e 24391 41366a SystemTimeToFileTime SystemTimeToFileTime 24390->24391 24392 4136a0 24391->24392 24393 41368e 24391->24393 24395 412bb0 24392->24395 24393->24392 24394 413698 ExitProcess 24393->24394 24396 412bbd 24395->24396 24493 416e20 lstrlen 24396->24493 24398 412be0 24494 416e20 lstrlen 24398->24494 24400 412bed 24495 416e20 lstrlen 24400->24495 24402 412bfa 24496 416e20 lstrlen 24402->24496 24404 412c07 24497 402590 HeapCreate LocalAlloc strlen 24404->24497 24406 412cc1 24498 416240 110 API calls 24406->24498 24408 412cc6 24499 416e20 lstrlen 24408->24499 24410 412cd5 24411 416fb0 lstrlen 24410->24411 24412 412ceb 24411->24412 24413 416fb0 lstrlen 24412->24413 24414 412d2a 24413->24414 24415 416fb0 lstrlen 24414->24415 24416 412d5a 24415->24416 24500 404540 7 API calls moneypunct 24416->24500 24418 412da8 24501 40fae0 ExitProcess strtok_s strtok_s lstrlen 24418->24501 24420 412db0 24502 405610 24420->24502 24422 412de7 24560 40f3b0 strtok_s strtok_s lstrlen 24422->24560 24424 412def 24425 405610 13 API calls 24424->24425 24426 412e27 24425->24426 24561 40f200 strtok_s strtok_s lstrlen 24426->24561 24428 412e2f 24562 40fd10 22 API calls 24428->24562 24430 412e45 24563 40ef80 69 API calls 24430->24563 24432 412ed5 24433 405610 13 API calls 24432->24433 24434 412f0c 24433->24434 24564 40f4d0 strtok_s strtok_s lstrlen 24434->24564 24436 412f14 24565 401d70 19 API calls 24436->24565 24438 412f4d 24439 405610 13 API calls 24438->24439 24440 412f85 24439->24440 24566 40f630 strtok_s strtok_s lstrlen lstrlen moneypunct 24440->24566 24442 412f8d 24567 411ab0 21 API calls 24442->24567 24444 412fc6 24446 412ff8 24444->24446 24568 411d80 17 API calls moneypunct 24444->24568 24447 413014 24446->24447 24570 4123f0 24 API calls moneypunct 24446->24570 24451 413030 24447->24451 24571 4127e0 16 API calls moneypunct 24447->24571 24448 412fe2 24569 412b30 107 API calls 24448->24569 24453 41304c 24451->24453 24572 412980 16 API calls moneypunct 24451->24572 24454 413068 24453->24454 24573 4070e0 95 API calls moneypunct 24453->24573 24458 413084 24454->24458 24574 412a80 16 API calls moneypunct 24454->24574 24460 4130a2 24458->24460 24575 415710 17 API calls moneypunct 24458->24575 24461 405610 13 API calls 24460->24461 24462 4130cc 24461->24462 24576 411350 8 API calls 24462->24576 24464 4130d4 24466 4130e2 24464->24466 24577 4132f0 ExitProcess lstrlen moneypunct 24464->24577 24466->24253 24468 4043db 24467->24468 24469 4043ec strlen 24468->24469 24470 402144 24468->24470 24469->24468 24470->24257 24471->24343 24473 401082 moneypunct 24472->24473 24474 4010bd 24473->24474 24475 4010a2 VirtualFree 24473->24475 24474->24370 24475->24474 24477 4011f3 GlobalMemoryStatusEx 24476->24477 24477->24373 24478->24386 24480 4134f3 24479->24480 24481 416fb0 lstrlen 24480->24481 24482 413505 24481->24482 24483 416fb0 lstrlen 24482->24483 24484 413527 24483->24484 24485 416fb0 lstrlen 24484->24485 24486 41354a 24485->24486 24487 416fb0 lstrlen 24486->24487 24488 41356c 24487->24488 24489 416fb0 lstrlen 24488->24489 24490 41358f 24489->24490 24491 416fb0 lstrlen 24490->24491 24492 4135b3 24491->24492 24492->24390 24493->24398 24494->24400 24495->24402 24496->24404 24497->24406 24498->24408 24499->24410 24500->24418 24501->24420 24503 405629 24502->24503 24578 404470 24503->24578 24505 405635 24507 405c17 24505->24507 24588 415260 24505->24588 24515 405cc0 moneypunct 24507->24515 24596 416e20 lstrlen 24507->24596 24508 4056ec 24512 416fb0 lstrlen 24508->24512 24510 405caa 24511 416fb0 lstrlen 24510->24511 24511->24515 24513 405732 24512->24513 24514 416fb0 lstrlen 24513->24514 24516 40575a 24514->24516 24515->24422 24517 416fb0 lstrlen 24516->24517 24518 4057a9 24517->24518 24519 416fb0 lstrlen 24518->24519 24520 4057d1 24519->24520 24521 416fb0 lstrlen 24520->24521 24522 405806 24521->24522 24522->24507 24523 416fb0 lstrlen 24522->24523 24524 4058cf 24523->24524 24525 416fb0 lstrlen 24524->24525 24526 40591e 24525->24526 24527 416fb0 lstrlen 24526->24527 24528 405948 24527->24528 24529 416fb0 lstrlen 24528->24529 24530 405971 24529->24530 24531 416fb0 lstrlen 24530->24531 24532 405999 24531->24532 24533 416fb0 lstrlen 24532->24533 24534 4059e8 24533->24534 24535 416fb0 lstrlen 24534->24535 24536 405a10 24535->24536 24537 416fb0 lstrlen 24536->24537 24538 405a5f 24537->24538 24539 416fb0 lstrlen 24538->24539 24540 405a89 24539->24540 24541 416fb0 lstrlen 24540->24541 24542 405ab2 24541->24542 24543 416fb0 lstrlen 24542->24543 24544 405ada 24543->24544 24545 405b1d lstrlen 24544->24545 24592 4170d0 24545->24592 24547 405b2e lstrlen 24548 405b46 24547->24548 24549 405b5b lstrlen 24548->24549 24593 4170d0 24549->24593 24551 405b6b memcpy 24594 4170d0 24551->24594 24553 405b84 lstrlen 24554 405b94 24553->24554 24555 405b9d lstrlen memcpy 24554->24555 24595 4170d0 24555->24595 24557 405bc7 lstrlen 24559 405bd7 24557->24559 24558 416fb0 lstrlen 24558->24559 24559->24507 24559->24558 24560->24424 24561->24428 24562->24430 24563->24432 24564->24436 24565->24438 24566->24442 24567->24444 24568->24448 24569->24446 24570->24447 24571->24451 24572->24453 24573->24454 24574->24458 24575->24460 24576->24464 24579 404486 24578->24579 24597 414ff0 malloc 24579->24597 24581 4044af 24598 414ff0 malloc 24581->24598 24583 4044c5 24599 414ff0 malloc 24583->24599 24585 4044db 24586 4044f5 lstrlen 24585->24586 24587 404505 24586->24587 24587->24505 24589 415274 24588->24589 24590 415282 GetSystemTime 24589->24590 24591 415299 24590->24591 24591->24508 24592->24547 24593->24551 24594->24553 24595->24557 24596->24510 24597->24581 24598->24583 24599->24585 24725 4181b0 RtlUnwind 24726 2278fd5 46 API calls __setmbcp 24727 413771 334 API calls 24683 418eb5 70 API calls 2 library calls 24685 408ab7 memcpy RaiseException codecvt __CxxThrowException@8

                      Control-flow Graph

                      APIs
                      • GetProcAddress.KERNEL32(?,008A1830), ref: 00415F11
                      • GetProcAddress.KERNEL32(?,008A1980), ref: 00415F2A
                      • GetProcAddress.KERNEL32(?,008A1758), ref: 00415F42
                      • GetProcAddress.KERNEL32(?,008A18D8), ref: 00415F5A
                      • GetProcAddress.KERNEL32(?,008A1890), ref: 00415F73
                      • GetProcAddress.KERNEL32(?,00898500), ref: 00415F8B
                      • GetProcAddress.KERNEL32(?,00897610), ref: 00415FA3
                      • GetProcAddress.KERNEL32(?,00897650), ref: 00415FBC
                      • GetProcAddress.KERNEL32(?,008A1848), ref: 00415FD4
                      • GetProcAddress.KERNEL32(?,008A1860), ref: 00415FEC
                      • GetProcAddress.KERNEL32(?,008A1878), ref: 00416005
                      • GetProcAddress.KERNEL32(?,008A1710), ref: 0041601D
                      • GetProcAddress.KERNEL32(?,008976D0), ref: 00416035
                      • GetProcAddress.KERNEL32(?,008A1998), ref: 0041604E
                      • GetProcAddress.KERNEL32(?,008A18A8), ref: 00416066
                      • GetProcAddress.KERNEL32(?,008974D0), ref: 0041607E
                      • GetProcAddress.KERNEL32(?,008A18F0), ref: 00416097
                      • GetProcAddress.KERNEL32(?,008A1908), ref: 004160AF
                      • GetProcAddress.KERNEL32(?,00897410), ref: 004160C7
                      • GetProcAddress.KERNEL32(?,008A1920), ref: 004160E0
                      • GetProcAddress.KERNEL32(?,008976F0), ref: 004160F8
                      • LoadLibraryA.KERNEL32(008A1938,?,004136C0), ref: 0041610A
                      • LoadLibraryA.KERNEL32(008A1950,?,004136C0), ref: 0041611B
                      • LoadLibraryA.KERNEL32(008A1968,?,004136C0), ref: 0041612D
                      • LoadLibraryA.KERNELBASE(008A16B0,?,004136C0), ref: 0041613F
                      • LoadLibraryA.KERNEL32(008A16C8,?,004136C0), ref: 00416150
                      • GetProcAddress.KERNEL32(75070000,008A1728), ref: 00416172
                      • GetProcAddress.KERNEL32(75FD0000,008A1740), ref: 00416193
                      • GetProcAddress.KERNEL32(75FD0000,008A19C8), ref: 004161AB
                      • GetProcAddress.KERNEL32(?,008A1A28), ref: 004161CD
                      • GetProcAddress.KERNEL32(74E50000,008973F0), ref: 004161EE
                      • GetProcAddress.KERNEL32(76E80000,00898510), ref: 0041620F
                      • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00416226
                      Strings
                      • NtQueryInformationProcess, xrefs: 0041621A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID: NtQueryInformationProcess
                      • API String ID: 2238633743-2781105232
                      • Opcode ID: 4bf4faa6d80337b6a8c58e308678245154ae8b5c2676724c8d6fcdc68551e2bc
                      • Instruction ID: 1024ce913f91588aaf476b7e35ab3ad31cc185c195c2877b0ef9f81f7e935ec9
                      • Opcode Fuzzy Hash: 4bf4faa6d80337b6a8c58e308678245154ae8b5c2676724c8d6fcdc68551e2bc
                      • Instruction Fuzzy Hash: 4CA16FB5910E10AFC374DFA8FE88A1637BBBBCC3117116519A60AC72A0DF759482CF95

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 408 4135e0-41368c GetSystemTime call 4134e0 call 4170d0 call 416e00 SystemTimeToFileTime * 2 416 4136a0-4136a3 408->416 417 41368e 408->417 418 413690-413696 417->418 419 413698-41369a ExitProcess 417->419 418->416 418->419
                      APIs
                      • GetSystemTime.KERNEL32(0041D8AC,?,?,004137D1,00000000,?,00898530,?,0041D8AC,?,00000000,?), ref: 0041362C
                      • SystemTimeToFileTime.KERNEL32(0041D8AC,00000000,?,?,?,?,?,?,?,?,?,?,?,00898530,?,0041D8AC), ref: 00413672
                      • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00898530,?,0041D8AC), ref: 00413680
                      • ExitProcess.KERNEL32 ref: 0041369A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$System$File$ExitProcess
                      • String ID:
                      • API String ID: 56602140-0
                      • Opcode ID: 1317ddf1f9c1afdd93909f223843f69075992d328c88535c6b58c76ddc48183c
                      • Instruction ID: a268315634fda69ed0a537ef202e87298384d27024bdd5aae2ec85167a5c17e0
                      • Opcode Fuzzy Hash: 1317ddf1f9c1afdd93909f223843f69075992d328c88535c6b58c76ddc48183c
                      • Instruction Fuzzy Hash: 6421BA75D14209ABCB14EFE4D945AEEB7BABF4C305F04852EE50AE3250EB345644CB68

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 436 8a4346-8a435f 437 8a4361-8a4363 436->437 438 8a436a-8a4376 CreateToolhelp32Snapshot 437->438 439 8a4365 437->439 440 8a4378-8a437e 438->440 441 8a4386-8a4393 Module32First 438->441 439->438 440->441 447 8a4380-8a4384 440->447 442 8a439c-8a43a4 441->442 443 8a4395-8a4396 call 8a4005 441->443 448 8a439b 443->448 447->437 447->441 448->442
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008A436E
                      • Module32First.KERNEL32(00000000,00000224), ref: 008A438E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 008A3000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_8a3000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateFirstModule32SnapshotToolhelp32
                      • String ID:
                      • API String ID: 3833638111-0
                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                      • Instruction ID: db42fd02b738cd0701d6bed4671acce1660fdf86cd4eb87f53b7994de0db66d5
                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                      • Instruction Fuzzy Hash: 9FF06231100715ABEF207AF9988DE6BB6ECFFCA725F101528F646D19C0DBB0E8454661

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 455 401120-40113a GetSystemInfo 456 401144-401147 455->456 457 40113c-40113e ExitProcess 455->457
                      APIs
                      • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,004136D7,0041D6E3), ref: 0040112A
                      • ExitProcess.KERNEL32 ref: 0040113E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitInfoProcessSystem
                      • String ID:
                      • API String ID: 752954902-0
                      • Opcode ID: 0c78e0eb242a3f19764e03ad46aab426447ce2b04c76b8959ffb9729e3075d63
                      • Instruction ID: 30efb513975bfe185fa80fb3a8f84b393628ccfbb0aa9170a1b214bc368b0093
                      • Opcode Fuzzy Hash: 0c78e0eb242a3f19764e03ad46aab426447ce2b04c76b8959ffb9729e3075d63
                      • Instruction Fuzzy Hash: B6D05E7490020C8BCB14DFE09A496DDBBB9AB8D711F001455DD0572240DA305441CA65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 486 4143c0-4143f8 GetUserNameA
                      APIs
                      • GetUserNameA.ADVAPI32(?,00000104), ref: 004143EC
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: 19f43c5935948d257337b5cfe167422182bb8e9e8b16b88c7073f3e19bcb2857
                      • Instruction ID: fd22aaf49eebc4deedfa71bce2fb200d05227bfc9b63873cd8cb515d50d954e6
                      • Opcode Fuzzy Hash: 19f43c5935948d257337b5cfe167422182bb8e9e8b16b88c7073f3e19bcb2857
                      • Instruction Fuzzy Hash: 2CE08CB490070CFFCB20EFE4DC49E9CBBB8AB08312F000184FA09E3280DB7056848B91

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 17 405610-4056cb call 416da0 call 404470 call 416d40 * 5 34 4056d4-4056d8 17->34 35 4056cd 17->35 36 405c70-405c98 call 4170d0 call 4094a0 34->36 37 4056de-405856 call 415260 call 416f20 call 416ea0 call 416e00 * 2 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416f20 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416f20 call 416ea0 call 416e00 * 2 34->37 35->34 49 405cd7-405d3f call 415070 * 2 call 416da0 call 416e00 * 5 call 413220 call 416e00 36->49 50 405c9a-405cd2 call 416e20 call 416fb0 call 416ea0 call 416e00 36->50 37->36 123 40585c-40586a 37->123 50->49 124 405878 123->124 125 40586c-405876 123->125 126 405882-4058b5 124->126 125->126 128 405c63-405c69 126->128 129 4058bb-4058d3 call 416fb0 call 416ea0 126->129 128->36 133 4058d8-405bdb call 416e00 call 416f20 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416f20 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416f20 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416fb0 call 416ea0 call 416e00 call 416f20 call 416ea0 call 416e00 call 4170d0 lstrlen call 4170d0 lstrlen call 4170d0 lstrlen call 4170d0 memcpy call 4170d0 lstrlen call 4170d0 * 2 lstrlen memcpy call 4170d0 lstrlen call 4170d0 129->133 240 405be2-405c0c 133->240 242 405c17-405c5c 240->242 243 405c0e-405c15 240->243 242->128 243->242 244 405c19-405c57 call 416fb0 call 416ea0 call 416e00 243->244 244->240
                      APIs
                        • Part of subcall function 00404470: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 004044F6
                        • Part of subcall function 00416FB0: lstrlen.KERNEL32(?,0041D8B0,?,00000000,0041D6E3), ref: 00416FC5
                      • lstrlen.KERNEL32(00000000,00000000,?,?,00000000,?,",00000000,?,00000000,00000000,?,00000000,00000000,?,0041E0D8), ref: 00405B1E
                      • lstrlen.KERNEL32(00000000), ref: 00405B2F
                      • lstrlen.KERNEL32(00000000), ref: 00405B5C
                      • memcpy.MSVCRT ref: 00405B73
                      • lstrlen.KERNEL32(00000000), ref: 00405B85
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00405B9E
                      • memcpy.MSVCRT ref: 00405BAB
                      • lstrlen.KERNEL32(00000000,?,?), ref: 00405BC8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$memcpy
                      • String ID: "$"$------$------$------$-A$-A
                      • API String ID: 2995824467-602752961
                      • Opcode ID: dddef2f3b1b428b329413e3e7d9bc69cc52025673dfceb6067fff80238abe11d
                      • Instruction ID: 38116f3ce93ed53bffdba46f35b2307ef6cb7c9f678a3856a9fc947e80efe624
                      • Opcode Fuzzy Hash: dddef2f3b1b428b329413e3e7d9bc69cc52025673dfceb6067fff80238abe11d
                      • Instruction Fuzzy Hash: A0125175920218AACB14EBA1DC95FDEB739BF14304F41429EF10A63091DF386B89CF68

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 252 226003c-2260047 253 226004c-2260263 call 2260a3f call 2260e0f call 2260d90 VirtualAlloc 252->253 254 2260049 252->254 269 2260265-2260289 call 2260a69 253->269 270 226028b-2260292 253->270 254->253 275 22602ce-22603c2 VirtualProtect call 2260cce call 2260ce7 269->275 272 22602a1-22602b0 270->272 274 22602b2-22602cc 272->274 272->275 274->272 281 22603d1-22603e0 275->281 282 22603e2-2260437 call 2260ce7 281->282 283 2260439-22604b8 VirtualFree 281->283 282->281 285 22605f4-22605fe 283->285 286 22604be-22604cd 283->286 287 2260604-226060d 285->287 288 226077f-2260789 285->288 290 22604d3-22604dd 286->290 287->288 291 2260613-2260637 287->291 294 22607a6-22607b0 288->294 295 226078b-22607a3 288->295 290->285 293 22604e3-2260505 290->293 298 226063e-2260648 291->298 302 2260517-2260520 293->302 303 2260507-2260515 293->303 296 22607b6-22607cb 294->296 297 226086e-22608be LoadLibraryA 294->297 295->294 299 22607d2-22607d5 296->299 307 22608c7-22608f9 297->307 298->288 300 226064e-226065a 298->300 304 22607d7-22607e0 299->304 305 2260824-2260833 299->305 300->288 306 2260660-226066a 300->306 308 2260526-2260547 302->308 303->308 309 22607e4-2260822 304->309 310 22607e2 304->310 312 2260839-226083c 305->312 311 226067a-2260689 306->311 313 2260902-226091d 307->313 314 22608fb-2260901 307->314 315 226054d-2260550 308->315 309->299 310->305 316 2260750-226077a 311->316 317 226068f-22606b2 311->317 312->297 318 226083e-2260847 312->318 314->313 320 2260556-226056b 315->320 321 22605e0-22605ef 315->321 316->298 322 22606b4-22606ed 317->322 323 22606ef-22606fc 317->323 324 226084b-226086c 318->324 325 2260849 318->325 326 226056f-226057a 320->326 327 226056d 320->327 321->290 322->323 328 22606fe-2260748 323->328 329 226074b 323->329 324->312 325->297 330 226057c-2260599 326->330 331 226059b-22605bb 326->331 327->321 328->329 329->311 336 22605bd-22605db 330->336 331->336 336->315
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0226024D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: cess$kernel32.dll
                      • API String ID: 4275171209-1230238691
                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                      • Instruction ID: f0866a4a534265b635c4f48f5103a6679655d60997b2cb50cb092b7cbc6e10b9
                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                      • Instruction Fuzzy Hash: 60527975A11229DFDB64CF98C984BACBBB1BF09304F1480D9E90DAB355DB30AA85DF14

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1830), ref: 00415F11
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1980), ref: 00415F2A
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1758), ref: 00415F42
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A18D8), ref: 00415F5A
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1890), ref: 00415F73
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,00898500), ref: 00415F8B
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,00897610), ref: 00415FA3
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,00897650), ref: 00415FBC
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1848), ref: 00415FD4
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1860), ref: 00415FEC
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1878), ref: 00416005
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1710), ref: 0041601D
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008976D0), ref: 00416035
                        • Part of subcall function 00415ED0: GetProcAddress.KERNEL32(?,008A1998), ref: 0041604E
                        • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011D1
                        • Part of subcall function 00401120: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,004136D7,0041D6E3), ref: 0040112A
                        • Part of subcall function 00401120: ExitProcess.KERNEL32 ref: 0040113E
                        • Part of subcall function 004010D0: VirtualAllocExNuma.KERNELBASE(00000000,?,?,004136DC), ref: 004010F2
                        • Part of subcall function 004010D0: ExitProcess.KERNEL32 ref: 00401103
                        • Part of subcall function 004011E0: GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 004011FE
                        • Part of subcall function 004011E0: __aulldiv.LIBCMT ref: 00401218
                        • Part of subcall function 004011E0: __aulldiv.LIBCMT ref: 00401226
                        • Part of subcall function 004011E0: ExitProcess.KERNEL32 ref: 00401254
                      • GetUserDefaultLangID.KERNELBASE ref: 004136E6
                        • Part of subcall function 00401150: ExitProcess.KERNEL32 ref: 00401186
                        • Part of subcall function 004143C0: GetUserNameA.ADVAPI32(?,00000104), ref: 004143EC
                        • Part of subcall function 00414400: GetComputerNameA.KERNEL32(?,00000104), ref: 0041442C
                        • Part of subcall function 00416FB0: lstrlen.KERNEL32(?,0041D8B0,?,00000000,0041D6E3), ref: 00416FC5
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00898530,?,0041D8AC,?,00000000,?,0041D8B0,?,00000000,0041D6E3), ref: 0041378A
                      • CloseHandle.KERNEL32(00000000), ref: 004137B9
                      • Sleep.KERNEL32(00001770), ref: 004137C4
                      • CloseHandle.KERNEL32(?,00000000,?,00898530,?,0041D8AC,?,00000000,?,0041D8B0,?,00000000,0041D6E3), ref: 004137DA
                      • ExitProcess.KERNEL32 ref: 004137E2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$ExitProcess$CloseHandleNameUser__aulldiv$AllocComputerDefaultEventGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrlen
                      • String ID:
                      • API String ID: 430313853-0
                      • Opcode ID: 19e3f2ad90109acb9ecb49a28c3fe414203e82b8baa863b8814d0b1a2f2bc6c1
                      • Instruction ID: 0037ec1138340b95bb434dc328289296f16cab3c571637fdb93d627daa89b4d0
                      • Opcode Fuzzy Hash: 19e3f2ad90109acb9ecb49a28c3fe414203e82b8baa863b8814d0b1a2f2bc6c1
                      • Instruction Fuzzy Hash: 7E318270A00204AADB04FBF2DC56BEE7779AF08708F10451EF112A61D2DF789A85C7AD

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 394 4011e0-401207 call 415090 GlobalMemoryStatusEx 397 401233-40123a 394->397 398 401209-401231 call 41a0b0 * 2 394->398 400 401241-401245 397->400 398->400 402 401247 400->402 403 40125a-40125d 400->403 405 401252-401254 ExitProcess 402->405 406 401249-401250 402->406 406->403 406->405
                      APIs
                      • GlobalMemoryStatusEx.KERNELBASE(00000040,?,00000000,00000040), ref: 004011FE
                      • __aulldiv.LIBCMT ref: 00401218
                      • __aulldiv.LIBCMT ref: 00401226
                      • ExitProcess.KERNEL32 ref: 00401254
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                      • String ID: @
                      • API String ID: 3404098578-2766056989
                      • Opcode ID: bb81cb4acda70f26030c3c2501203c3bf716c46d07ed01ddf58a3b899f1b5564
                      • Instruction ID: 7bcd30568b3a9749f5c78c38f6ef54fea4689c821e8202ed383253ad67bcf250
                      • Opcode Fuzzy Hash: bb81cb4acda70f26030c3c2501203c3bf716c46d07ed01ddf58a3b899f1b5564
                      • Instruction Fuzzy Hash: 8601FFB0940208EADB10EFD0CD4AB9EBBB8AB54705F204059E705B62D0D6785545875D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 420 4137b3 421 4137ca 420->421 423 41377a-413797 call 4170d0 OpenEventA 421->423 424 4137cc-4137e2 call 4135e0 call 412bb0 CloseHandle ExitProcess 421->424 429 4137b5-4137c4 CloseHandle Sleep 423->429 430 413799-4137b1 call 4170d0 423->430 429->421 430->424
                      APIs
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00898530,?,0041D8AC,?,00000000,?,0041D8B0,?,00000000,0041D6E3), ref: 0041378A
                      • CloseHandle.KERNEL32(00000000), ref: 004137B9
                      • Sleep.KERNEL32(00001770), ref: 004137C4
                      • CloseHandle.KERNEL32(?,00000000,?,00898530,?,0041D8AC,?,00000000,?,0041D8B0,?,00000000,0041D6E3), ref: 004137DA
                      • ExitProcess.KERNEL32 ref: 004137E2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: CloseHandle$EventExitOpenProcessSleep
                      • String ID:
                      • API String ID: 139424489-0
                      • Opcode ID: b72d18ed1bdfc85c434ab68d1be83dc3fedaf905ff30e20f0e2c3bf58e55dee1
                      • Instruction ID: 00ad45554361a1bf9ffb836df5d455c5d00fe00f471bf70531fad30136aebd8c
                      • Opcode Fuzzy Hash: b72d18ed1bdfc85c434ab68d1be83dc3fedaf905ff30e20f0e2c3bf58e55dee1
                      • Instruction Fuzzy Hash: 5FF054B0944206AAE720AFA1DD05BFE7675BB08B46F10851AF612951C0DBB856818A5D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 449 4010d0-4010ff VirtualAllocExNuma 451 401101-401103 ExitProcess 449->451 452 401109-401111 call 401060 449->452
                      APIs
                      • VirtualAllocExNuma.KERNELBASE(00000000,?,?,004136DC), ref: 004010F2
                      • ExitProcess.KERNEL32 ref: 00401103
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocExitNumaProcessVirtual
                      • String ID:
                      • API String ID: 2517686967-0
                      • Opcode ID: b1c8d233814077f36e701fc9dcba40fcf29c53b912e4e1fc8df77dce1fb5e496
                      • Instruction ID: b86936f0f7b92ad6105a5e8d9325c57b614f4cde8fc05540e07f2d0ff83aec39
                      • Opcode Fuzzy Hash: b1c8d233814077f36e701fc9dcba40fcf29c53b912e4e1fc8df77dce1fb5e496
                      • Instruction Fuzzy Hash: 1BE0867098570CBBE7309BA0DD0AB1976689B08B06F101055F7097A1D0C6B425008699

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 458 2260e0f-2260e24 SetErrorMode * 2 459 2260e26 458->459 460 2260e2b-2260e2c 458->460 459->460
                      APIs
                      • SetErrorMode.KERNELBASE(00000400,?,?,02260223,?,?), ref: 02260E19
                      • SetErrorMode.KERNELBASE(00000000,?,?,02260223,?,?), ref: 02260E1E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorMode
                      • String ID:
                      • API String ID: 2340568224-0
                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                      • Instruction ID: 01df04ff48ef7195399de051aa7a3bf3c448f718d79b6c25c3f555e1db7778fa
                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                      • Instruction Fuzzy Hash: F4D0123255512877D7002AD4DC0DBDD7B1CDF09B66F008011FB0DD9080C770964046E5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 461 401060-401080 VirtualAlloc 462 401082-401085 461->462 463 401087-40108f 461->463 462->463 464 401091-4010b7 call 415070 VirtualFree 463->464 465 4010bd-4010c1 463->465 464->465
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,17C841C0,00003000,00000004,?,?,?,0040110E,?,?,004136DC), ref: 00401073
                      • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040110E,?,?,004136DC), ref: 004010B7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Virtual$AllocFree
                      • String ID:
                      • API String ID: 2087232378-0
                      • Opcode ID: 1fafdb83e91c72df66fc5e0dfbe5cc959ff82812f546fe48c521c8e5e261a801
                      • Instruction ID: a2913bed729a6fe358320823385779fc3d8f71f1cc7b0a13f7ab4b92dd49de4a
                      • Opcode Fuzzy Hash: 1fafdb83e91c72df66fc5e0dfbe5cc959ff82812f546fe48c521c8e5e261a801
                      • Instruction Fuzzy Hash: 42F027B1641208BBE724DAF4AC59FAFF79CA745B05F304559F980E3390DA719F00CAA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 468 414400-414434 GetComputerNameA 471 414436-41443b 468->471 472 41443f 468->472 473 414442-414445 471->473 472->473
                      APIs
                      • GetComputerNameA.KERNEL32(?,00000104), ref: 0041442C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ComputerName
                      • String ID:
                      • API String ID: 3545744682-0
                      • Opcode ID: 6e220fa814439a9a47cb0e7b1b891ce31241d7c627682025937d03601ca1af04
                      • Instruction ID: 2ac30a00ccf60c4f43266989ac8565747831d88261cb92d9c694311de33eed43
                      • Opcode Fuzzy Hash: 6e220fa814439a9a47cb0e7b1b891ce31241d7c627682025937d03601ca1af04
                      • Instruction Fuzzy Hash: F1E0D8B0A00608FBCB20DFE4DD48BDD77BCAB04305F100055FA05D3240D7749A458B96

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 474 401150-401159 call 414400 476 40115e-401169 call 415130 474->476 479 40116b-401182 call 4143c0 call 415130 476->479 480 40118c-40118d 476->480 479->480 485 401184-401186 ExitProcess 479->485
                      APIs
                        • Part of subcall function 00414400: GetComputerNameA.KERNEL32(?,00000104), ref: 0041442C
                        • Part of subcall function 004143C0: GetUserNameA.ADVAPI32(?,00000104), ref: 004143EC
                      • ExitProcess.KERNEL32 ref: 00401186
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Name$ComputerExitProcessUser
                      • String ID:
                      • API String ID: 162832415-0
                      • Opcode ID: c5f9d553daa3d293cc675e83c5a49a4e0c2af81821706314cf681e3291f30800
                      • Instruction ID: 69e00d56220517d966a61d162f3bbf9e0969f4784ba4f73569e39f9695f87914
                      • Opcode Fuzzy Hash: c5f9d553daa3d293cc675e83c5a49a4e0c2af81821706314cf681e3291f30800
                      • Instruction Fuzzy Hash: 78E012B5E1070462CA1573B27E06BD7729D5F9930EF40142AFE0497253FD2DE45145BD
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 008A4056
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 008A3000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_8a3000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                      • Instruction ID: 199f9fcb6f0f0a92e9c516c3276bd2ca6ce9b83090f783d191d7f128259a0963
                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                      • Instruction Fuzzy Hash: 24113C79A00208EFDB01DF98C985E98BBF5EF08350F058094FA489B362D371EA50EF80
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 022790AD
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022790C2
                      • UnhandledExceptionFilter.KERNEL32(0041C690), ref: 022790CD
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 022790E9
                      • TerminateProcess.KERNEL32(00000000), ref: 022790F0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: 1485600a89bc27f1a0a21c1cb01dd845070ad6051d0655c0ebfcb599f372d5e6
                      • Instruction ID: a104de4dfc4d612c0f19e6a67c80ccd02dab0ae425f09a20843066b21af47b97
                      • Opcode Fuzzy Hash: 1485600a89bc27f1a0a21c1cb01dd845070ad6051d0655c0ebfcb599f372d5e6
                      • Instruction Fuzzy Hash: 4721EF78A11304EFC320EF64F844B543BB4FB8C305F81907AE65887260E7B456868F9D
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 00418E46
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00418E5B
                      • UnhandledExceptionFilter.KERNEL32(0041C690), ref: 00418E66
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 00418E82
                      • TerminateProcess.KERNEL32(00000000), ref: 00418E89
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: 1485600a89bc27f1a0a21c1cb01dd845070ad6051d0655c0ebfcb599f372d5e6
                      • Instruction ID: 5828a94612e18b022276c58097a982c86e574ee0b254963d5fd3238681fe770b
                      • Opcode Fuzzy Hash: 1485600a89bc27f1a0a21c1cb01dd845070ad6051d0655c0ebfcb599f372d5e6
                      • Instruction Fuzzy Hash: 2D21C274A01304EFC721EF54F944B843BB4FB8C309F91907AE64987260E7B456868F9D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: .$GetProcAddress.$l
                      • API String ID: 0-2784972518
                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                      • Instruction ID: 46277bdeb2be833d4433bb61865e73492ba3e9ff6cef753ff34ece147b5d36ee
                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                      • Instruction Fuzzy Hash: 7B3169B6911609CFDB20CF99C884BAEBBF6FF08724F14414AD441A7354D7B1EA85CBA4
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(00419D85), ref: 0227A033
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 070a293f5fd72a4302476959d8ba9f25930c1a77546e2223ef40415f4a224816
                      • Instruction ID: a2f7eb20247afb77339b0084df5ee2fab041c51b9664aeb6610f0aa757957e44
                      • Opcode Fuzzy Hash: 070a293f5fd72a4302476959d8ba9f25930c1a77546e2223ef40415f4a224816
                      • Instruction Fuzzy Hash: 0290027069124446460057B06C1D6966A95AA8C60679144E5E125C405DEB644448555D
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00019D85), ref: 00419DCC
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 070a293f5fd72a4302476959d8ba9f25930c1a77546e2223ef40415f4a224816
                      • Instruction ID: a2f7eb20247afb77339b0084df5ee2fab041c51b9664aeb6610f0aa757957e44
                      • Opcode Fuzzy Hash: 070a293f5fd72a4302476959d8ba9f25930c1a77546e2223ef40415f4a224816
                      • Instruction Fuzzy Hash: 0290027069124446460057B06C1D6966A95AA8C60679144E5E125C405DEB644448555D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193515267.00000000008A3000.00000040.00000020.00020000.00000000.sdmp, Offset: 008A3000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_8a3000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction ID: 0aec9357faa2ec1ef16d740a5ff65a5dbedb7c5c79760830d5297a6a34bd7ad6
                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                      • Instruction Fuzzy Hash: 89115E72340200AFE744DE59DC85EA673EAFB89330B298055ED04DB712D675ED41C760
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                      • Instruction ID: 371a13851f7bc2430136147e6f126d967e8cbc76b975b0e557f27e01474f70d8
                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                      • Instruction Fuzzy Hash: 6B01F7736206008FDF21CFA0C808FBE33E9FB86205F0541A4E90797285E370AA818B80
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                      • Instruction ID: 36fc7fe13847c8907379b30b108c4ce372182c876a5f8addfd845b575ea14b7f
                      • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                      • Instruction Fuzzy Hash: C971C031825B249ED7623BB1DE13A59FEB37F04320F23C93491B620D349A326865BE5D
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                      • Instruction ID: 5df7b21d12798ad2dd02b2714939a7e9e3589bb161cd2ca89e36415dbd51ea28
                      • Opcode Fuzzy Hash: 55745e4d8ffa3bcd4bae6bd50e23aa08e34946fc70669168e917a1c48e4fa5ed
                      • Instruction Fuzzy Hash: AE71E331494B009BD7633B32DD03ADA7AB27F04304F10596EB1FB20632DA3678E79A59
                      APIs
                      • GetProcAddress.KERNEL32(00625074,00624A00), ref: 02276178
                      • GetProcAddress.KERNEL32(00625074,00624DA4), ref: 02276191
                      • GetProcAddress.KERNEL32(00625074,00624E10), ref: 022761A9
                      • GetProcAddress.KERNEL32(00625074,00624A60), ref: 022761C1
                      • GetProcAddress.KERNEL32(00625074,00624A4C), ref: 022761DA
                      • GetProcAddress.KERNEL32(00625074,00624AEC), ref: 022761F2
                      • GetProcAddress.KERNEL32(00625074,00624CB8), ref: 0227620A
                      • GetProcAddress.KERNEL32(00625074,00624B30), ref: 02276223
                      • GetProcAddress.KERNEL32(00625074,00624D84), ref: 0227623B
                      • GetProcAddress.KERNEL32(00625074,00624D28), ref: 02276253
                      • GetProcAddress.KERNEL32(00625074,00624BAC), ref: 0227626C
                      • GetProcAddress.KERNEL32(00625074,00624AE0), ref: 02276284
                      • GetProcAddress.KERNEL32(00625074,00624DD8), ref: 0227629C
                      • GetProcAddress.KERNEL32(00625074,006248B0), ref: 022762B5
                      • GetProcAddress.KERNEL32(00625074,00624D7C), ref: 022762CD
                      • GetProcAddress.KERNEL32(00625074,00624A20), ref: 022762E5
                      • GetProcAddress.KERNEL32(00625074,00624C08), ref: 022762FE
                      • GetProcAddress.KERNEL32(00625074,00624E00), ref: 02276316
                      • GetProcAddress.KERNEL32(00625074,006248BC), ref: 0227632E
                      • GetProcAddress.KERNEL32(00625074,00624928), ref: 02276347
                      • GetProcAddress.KERNEL32(00625074,00624AAC), ref: 0227635F
                      • LoadLibraryA.KERNEL32(00624D30,?,02273927), ref: 02276371
                      • LoadLibraryA.KERNEL32(00624978,?,02273927), ref: 02276382
                      • LoadLibraryA.KERNEL32(00624900,?,02273927), ref: 02276394
                      • LoadLibraryA.KERNEL32(006249D8,?,02273927), ref: 022763A6
                      • LoadLibraryA.KERNEL32(00624B1C,?,02273927), ref: 022763B7
                      • GetProcAddress.KERNEL32(00624E98,00624C94), ref: 022763D9
                      • GetProcAddress.KERNEL32(00624FB8,00624C14), ref: 022763FA
                      • GetProcAddress.KERNEL32(00624FB8,006249C8), ref: 02276412
                      • GetProcAddress.KERNEL32(006250A8,00624B88), ref: 02276434
                      • GetProcAddress.KERNEL32(00624F6C,00624924), ref: 02276455
                      • GetProcAddress.KERNEL32(00624F9C,00624C04), ref: 02276476
                      • GetProcAddress.KERNEL32(00624F9C,0041D12C), ref: 0227648D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID:
                      • API String ID: 2238633743-0
                      • Opcode ID: 4bf4faa6d80337b6a8c58e308678245154ae8b5c2676724c8d6fcdc68551e2bc
                      • Instruction ID: 0da3fa948a558328a822f73e75036f8ab5887911ada141a94d495682c794e059
                      • Opcode Fuzzy Hash: 4bf4faa6d80337b6a8c58e308678245154ae8b5c2676724c8d6fcdc68551e2bc
                      • Instruction Fuzzy Hash: C5A15FB5910E10AFC374DFA8FE88A1637BBBBCC3117116519A60AC72A4DF759482CF91
                      APIs
                        • Part of subcall function 00416FB0: lstrlen.KERNEL32(?,0041D8B0,?,00000000,0041D6E3), ref: 00416FC5
                        • Part of subcall function 004093A0: CloseHandle.KERNEL32(000000FF), ref: 0040947A
                      • strtok_s.MSVCRT ref: 0040EB5B
                      • lstrlen.KERNEL32(00000000), ref: 0040EBD3
                        • Part of subcall function 00414FA0: malloc.MSVCRT ref: 00414FA8
                        • Part of subcall function 00414FA0: strncpy.MSVCRT ref: 00414FC3
                      • lstrlen.KERNEL32(00000000), ref: 0040EC1D
                      • lstrlen.KERNEL32(00000000), ref: 0040EC67
                      • lstrlen.KERNEL32(00000000), ref: 0040ECB5
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0040ED42
                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0040ED5A
                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0040ED72
                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 0040ED8A
                      • strtok_s.MSVCRT ref: 0040EEB9
                      • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0040EECE
                      • memset.MSVCRT ref: 0040EF17
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$strtok_s$CloseHandlemallocmemsetstrncpy
                      • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                      • API String ID: 62063689-555421843
                      • Opcode ID: 94138ede758836c146890e655253faacc7f37dc3b4ee1b7591c8aaee1c92a62f
                      • Instruction ID: d9186ee441f73b04c887f2efee86d04259a2264df0fa853aa1509dbc15227f06
                      • Opcode Fuzzy Hash: 94138ede758836c146890e655253faacc7f37dc3b4ee1b7591c8aaee1c92a62f
                      • Instruction Fuzzy Hash: 3FD174B5D00208ABCB14EBF1DD56EEE7739AF44304F50851EF106B6095DF38AA85CBA8
                      APIs
                        • Part of subcall function 02277217: lstrlen.KERNEL32(?,006249EC,?,004215A4,0041D7D6), ref: 0227722C
                        • Part of subcall function 02269607: CloseHandle.KERNEL32(000000FF), ref: 022696E1
                      • strtok_s.MSVCRT ref: 0226EDC2
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EE3A
                        • Part of subcall function 02275207: malloc.MSVCRT ref: 0227520F
                        • Part of subcall function 02275207: strncpy.MSVCRT ref: 0227522A
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EE84
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EECE
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EF1C
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EFA9
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EFC1
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EFD9
                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226EFF1
                      • strtok_s.MSVCRT ref: 0226F120
                      • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041D772), ref: 0226F135
                      • memset.MSVCRT ref: 0226F17E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$strtok_s$CloseHandlemallocmemsetstrncpy
                      • String ID:
                      • API String ID: 62063689-0
                      • Opcode ID: b16d59508813708b1d92d6ee10662e8f39c45857b8dfa9bcd2ae4a529fc321c5
                      • Instruction ID: 33588062f827b8af9fd3d2a500138d1a5dc3132c8ee5a3a1c39d2d32f095a015
                      • Opcode Fuzzy Hash: b16d59508813708b1d92d6ee10662e8f39c45857b8dfa9bcd2ae4a529fc321c5
                      • Instruction Fuzzy Hash: 7DD13EB2D14208ABCB14FBE4DD99EFEB73AAF54300F504419F106AA198DF749A45CFA4
                      APIs
                      • __getptd.LIBCMT ref: 02278AB6
                        • Part of subcall function 02277D93: __getptd_noexit.LIBCMT ref: 02277D96
                        • Part of subcall function 02277D93: __amsg_exit.LIBCMT ref: 02277DA3
                      • __amsg_exit.LIBCMT ref: 02278AD6
                      • __lock.LIBCMT ref: 02278AE6
                      • InterlockedDecrement.KERNEL32(?), ref: 02278B03
                      • _free.LIBCMT ref: 02278B16
                      • InterlockedIncrement.KERNEL32(05B), ref: 02278B2E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                      • String ID: 05B$05B
                      • API String ID: 3470314060-1918097640
                      • Opcode ID: 30fd09fcb36eb232e569ea581c467d664f2ee35282cbedbbd802be78d6068a8c
                      • Instruction ID: 58f0b02c77bb3be767a0362c248c48aee1eca5b625d9cdf37a52fa7e1e808265
                      • Opcode Fuzzy Hash: 30fd09fcb36eb232e569ea581c467d664f2ee35282cbedbbd802be78d6068a8c
                      • Instruction Fuzzy Hash: 8101DB71F29722ABC720AFE5980975EBB71FF05721F404025E410A7688CB785581EFD6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: %s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                      • API String ID: 0-2524465048
                      • Opcode ID: a38c34432e6badff7eed53cef2cb006e7e01620f7d465891b9819aabf743dff9
                      • Instruction ID: 56f1237c2d7c520c90c98f1ce5fb3a6d9b51b415e2d0c2f733ce4a2014328567
                      • Opcode Fuzzy Hash: a38c34432e6badff7eed53cef2cb006e7e01620f7d465891b9819aabf743dff9
                      • Instruction Fuzzy Hash: AE9172B19006189BDB24EFA4DC85FEA737DBF88300F044589F61A92191DB789AC5CFA5
                      APIs
                      • ??_U@YAPAXI@Z.MSVCRT ref: 00413D9E
                      • OpenProcess.KERNEL32(001FFFFF,00000000,00413FCD,0041D28B), ref: 00413DDC
                      • memset.MSVCRT ref: 00413E2A
                      • ??_V@YAXPAX@Z.MSVCRT ref: 00413F7E
                      Strings
                      • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 00413E4C
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: OpenProcessmemset
                      • String ID: 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                      • API String ID: 1606381396-4138519520
                      • Opcode ID: 136f340d3def94dd6f6bc6e7af2fbddae3deb45c6c7debbe56f20a408c524ea1
                      • Instruction ID: ba4a912f34a6ab240f03399ec897c117189ceb9282cc0eaf369c81769a73d46f
                      • Opcode Fuzzy Hash: 136f340d3def94dd6f6bc6e7af2fbddae3deb45c6c7debbe56f20a408c524ea1
                      • Instruction Fuzzy Hash: 35513DB0D003189BDB24EF51DC45BEEBB75AB48309F5041AEE11966281DB386BC9CF58
                      APIs
                      • __getptd.LIBCMT ref: 0041884F
                        • Part of subcall function 00417B2C: __getptd_noexit.LIBCMT ref: 00417B2F
                        • Part of subcall function 00417B2C: __amsg_exit.LIBCMT ref: 00417B3C
                      • __amsg_exit.LIBCMT ref: 0041886F
                      • __lock.LIBCMT ref: 0041887F
                      • InterlockedDecrement.KERNEL32(?), ref: 0041889C
                      • _free.LIBCMT ref: 004188AF
                      • InterlockedIncrement.KERNEL32(00423530), ref: 004188C7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                      • String ID: 05B
                      • API String ID: 3470314060-3788103304
                      • Opcode ID: cb1538446801220004b0e94d2aebbf41e1672ae537431284a663a37179733970
                      • Instruction ID: f16d68fd9582ac4125616c5e50f94de62243aa4c7be40d45a23fde697d24a6fa
                      • Opcode Fuzzy Hash: cb1538446801220004b0e94d2aebbf41e1672ae537431284a663a37179733970
                      • Instruction Fuzzy Hash: 4501AD32A05621ABD720BF6A98057CA7770AF04725F90402FF810A3390CB7CA9C2CBDD
                      APIs
                        • Part of subcall function 00404470: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 004044F6
                        • Part of subcall function 00416FB0: lstrlen.KERNEL32(?,0041D8B0,?,00000000,0041D6E3), ref: 00416FC5
                      • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,0041D797,00000000,?,?,00000000,?,",00000000,?,00000000), ref: 00404AA8
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00404AC4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen
                      • String ID: "$"$------$------$------
                      • API String ID: 1659193697-2180234286
                      • Opcode ID: 34ff306594498cb419d8f3a4553490a1d4df36bd29bd2e5878c3e8e9be38561f
                      • Instruction ID: e2fbf7176fc7eb33215a1d8fdd4a82cafc16ed7ff926df7fa74fdc4e30892001
                      • Opcode Fuzzy Hash: 34ff306594498cb419d8f3a4553490a1d4df36bd29bd2e5878c3e8e9be38561f
                      • Instruction Fuzzy Hash: F21252769102189ACB14EB91DC92FDEB739AF54308F51419EF10672491DF38AF89CF68
                      APIs
                        • Part of subcall function 00416FB0: lstrlen.KERNEL32(?,0041D8B0,?,00000000,0041D6E3), ref: 00416FC5
                        • Part of subcall function 004097F0: memcmp.MSVCRT ref: 0040980B
                        • Part of subcall function 004097F0: memset.MSVCRT ref: 0040983E
                      • lstrlen.KERNEL32(00000000), ref: 0040B44D
                      • lstrlen.KERNEL32(00000000), ref: 0040B553
                      • lstrlen.KERNEL32(00000000), ref: 0040B567
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$memcmpmemset
                      • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                      • API String ID: 3317826854-1079375795
                      • Opcode ID: 1ee09189f74538e519833edc0d23ec70a08f9fcf4db5531c31ec3b9a83490509
                      • Instruction ID: df2f8e8a8ca21c55da42a3c6f19f5118b3684059388f817d0631ea5bb79e5354
                      • Opcode Fuzzy Hash: 1ee09189f74538e519833edc0d23ec70a08f9fcf4db5531c31ec3b9a83490509
                      • Instruction Fuzzy Hash: 07A164759102089BCF14FBA1DC52EEE7739BF54308F51416EF506B2191EF38AA85CBA8
                      APIs
                      • strlen.MSVCRT ref: 00413BDF
                      • ??_U@YAPAXI@Z.MSVCRT ref: 00413C0D
                        • Part of subcall function 00413890: strlen.MSVCRT ref: 004138A1
                        • Part of subcall function 00413890: strlen.MSVCRT ref: 004138C5
                      • VirtualQueryEx.KERNEL32(00413FCD,00000000,?,0000001C), ref: 00413C52
                      • ??_V@YAXPAX@Z.MSVCRT ref: 00413D73
                        • Part of subcall function 00413AA0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00413AB8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: strlen$MemoryProcessQueryReadVirtual
                      • String ID: @$Z>A
                      • API String ID: 2950663791-2427737632
                      • Opcode ID: c34cf874e28939f0e2f9d61df82db9ff8d9d9859511bff8662e41e87a2571aa0
                      • Instruction ID: 18b3d1c53e1ab9283c7d4f20bb5e0d2682d9205760932c7229ac25ba092b9e39
                      • Opcode Fuzzy Hash: c34cf874e28939f0e2f9d61df82db9ff8d9d9859511bff8662e41e87a2571aa0
                      • Instruction Fuzzy Hash: 2851F9B5D00109ABDB04CF98E981AEFB7B5FF88305F108119F919A7340D738AA51CBA5
                      APIs
                      • memset.MSVCRT ref: 004012E7
                      • lstrlen.KERNEL32(?), ref: 0040131C
                        • Part of subcall function 00416FB0: lstrlen.KERNEL32(?,0041D8B0,?,00000000,0041D6E3), ref: 00416FC5
                        • Part of subcall function 00415260: GetSystemTime.KERNEL32(?,00000000,0041D129,?,?,?,?,?,?,?,?,?,00404623,?,00000014), ref: 00415286
                        • Part of subcall function 004093A0: CloseHandle.KERNEL32(000000FF), ref: 0040947A
                      • memset.MSVCRT ref: 004014D0
                        • Part of subcall function 00404DC0: lstrlen.KERNEL32(00000000), ref: 00404E4A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$memset$CloseHandleSystemTime
                      • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                      • API String ID: 3513846868-218353709
                      • Opcode ID: 544a29b48099084aee3e2fc4cd677dd114ad60dddebe7d92c1295d5e13c1ab67
                      • Instruction ID: 465d6e3be360dc7981781b6de12631b9db2cd28431e3bfe2701297f35846b4c8
                      • Opcode Fuzzy Hash: 544a29b48099084aee3e2fc4cd677dd114ad60dddebe7d92c1295d5e13c1ab67
                      • Instruction Fuzzy Hash: DD5123B195021897CB15EB61DD92BED773D9F54304F4041EDB60A62091DE385BC5CFA8
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcess
                      • String ID: *
                      • API String ID: 621844428-163128923
                      • Opcode ID: b54c11c67429caad35af0389be56d96782f86342cf804ea28b4a9cbeb8073ebc
                      • Instruction ID: 75b540bad49881e9417c8f8c63d74940121d586cf5f959f7794e893d96f52075
                      • Opcode Fuzzy Hash: b54c11c67429caad35af0389be56d96782f86342cf804ea28b4a9cbeb8073ebc
                      • Instruction Fuzzy Hash: 4BF05830508608EFE364EFE0EF0976CBBB1EB8E703F001195E60A86290CA744A119B65
                      APIs
                        • Part of subcall function 022646D7: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 0226475D
                        • Part of subcall function 02277217: lstrlen.KERNEL32(?,006249EC,?,004215A4,0041D7D6), ref: 0227722C
                      • lstrlen.KERNEL32(00000000,00000000,?,?,00000000,?,0041E0DC,00000000,?,006248EC,00000000,?,00624AE4,00000000,?,0041E0D8), ref: 02265D85
                      • lstrlen.KERNEL32(00000000), ref: 02265D96
                      • lstrlen.KERNEL32(00000000), ref: 02265DC3
                      • memcpy.MSVCRT ref: 02265DDA
                      • lstrlen.KERNEL32(00000000), ref: 02265DEC
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02265E05
                      • memcpy.MSVCRT ref: 02265E12
                      • lstrlen.KERNEL32(00000000,?,?), ref: 02265E2F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen$memcpy
                      • String ID:
                      • API String ID: 2995824467-0
                      • Opcode ID: 8b814884cedf4fc81417a9552fa435a5da42abb82068080e2803263974605ad5
                      • Instruction ID: 893bf26f54e980076f4d6326ae4a9edb398e76d5ca4f7d427ceba5b7afe12e95
                      • Opcode Fuzzy Hash: 8b814884cedf4fc81417a9552fa435a5da42abb82068080e2803263974605ad5
                      • Instruction Fuzzy Hash: BD12DE75924228ABCB15EBE0DC94FEEB37ABF54700F504199E106B21A4EF706E89CF50
                      APIs
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02274005
                      • OpenProcess.KERNEL32(001FFFFF,00000000,02274234,0041D28B), ref: 02274043
                      • memset.MSVCRT ref: 02274091
                      • ??_V@YAXPAX@Z.MSVCRT ref: 022741E5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: OpenProcessmemset
                      • String ID:
                      • API String ID: 1606381396-0
                      • Opcode ID: 1a26b6fa8bdaeb359c51be8f7994c2d1375265ef96f370ef8ce744ae01cba673
                      • Instruction ID: 9e4a7dac6d30e6210e9ca2e099ec1be4c7808242bd42477b32bef382bb7c3a4a
                      • Opcode Fuzzy Hash: 1a26b6fa8bdaeb359c51be8f7994c2d1375265ef96f370ef8ce744ae01cba673
                      • Instruction Fuzzy Hash: D8519FB0C142189FDB24EBD0DC94BEEB775EF58304F1041A9E515B7294EB746A84CF58
                      APIs
                      • __lock.LIBCMT ref: 00417BAE
                        • Part of subcall function 00417641: __mtinitlocknum.LIBCMT ref: 00417657
                        • Part of subcall function 00417641: __amsg_exit.LIBCMT ref: 00417663
                        • Part of subcall function 00417641: EnterCriticalSection.KERNEL32(00000000,00000000,?,00417A49,0000000D,?,?,004173CF,0041726D,?,?,00417158,00000000,00421AC0,0041719F), ref: 0041766B
                      • DecodePointer.KERNEL32(004219C8,00000020,00417CF1,00000000,00000001,00000000,?,00417D13,000000FF,?,00417668,00000011,00000000,?,00417A49,0000000D), ref: 00417BEA
                      • DecodePointer.KERNEL32(?,00417D13,000000FF,?,00417668,00000011,00000000,?,00417A49,0000000D,?,?,004173CF,0041726D), ref: 00417BFB
                        • Part of subcall function 004179C2: EncodePointer.KERNEL32(00000000,004191B2,00423DC8,00000314,00000000,?,?,?,?,?,00417F08,00423DC8,Microsoft Visual C++ Runtime Library,00012010), ref: 004179C4
                      • DecodePointer.KERNEL32(-00000004,?,00417D13,000000FF,?,00417668,00000011,00000000,?,00417A49,0000000D,?,?,004173CF,0041726D), ref: 00417C21
                      • DecodePointer.KERNEL32(?,00417D13,000000FF,?,00417668,00000011,00000000,?,00417A49,0000000D,?,?,004173CF,0041726D), ref: 00417C34
                      • DecodePointer.KERNEL32(?,00417D13,000000FF,?,00417668,00000011,00000000,?,00417A49,0000000D,?,?,004173CF,0041726D), ref: 00417C3E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                      • String ID:
                      • API String ID: 2005412495-0
                      • Opcode ID: 6a1b6e47f482ee4f200ebd968e601a8bdb3106e7e8c25533cbe6d2efabcc28cd
                      • Instruction ID: 2ecc3aad81c9b81e2b27e7e3d170e1f8428b359c85680f8586e03e13f1a28f2c
                      • Opcode Fuzzy Hash: 6a1b6e47f482ee4f200ebd968e601a8bdb3106e7e8c25533cbe6d2efabcc28cd
                      • Instruction Fuzzy Hash: 39314C70A58309DBDF509FA9D8846DDBBF1BB48314F10802BE001A6290EB7C49C5CFAD
                      APIs
                      • strlen.MSVCRT ref: 02273E46
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02273E74
                        • Part of subcall function 02273AF7: strlen.MSVCRT ref: 02273B08
                        • Part of subcall function 02273AF7: strlen.MSVCRT ref: 02273B2C
                      • VirtualQueryEx.KERNEL32(02274234,00000000,?,0000001C), ref: 02273EB9
                      • ??_V@YAXPAX@Z.MSVCRT ref: 02273FDA
                        • Part of subcall function 02273D07: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 02273D1F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: strlen$MemoryProcessQueryReadVirtual
                      • String ID: @
                      • API String ID: 2950663791-2766056989
                      • Opcode ID: c34cf874e28939f0e2f9d61df82db9ff8d9d9859511bff8662e41e87a2571aa0
                      • Instruction ID: 691aba4177d4055ed7756e040e1950957e786b7a143df09ca99d20bb9e2726a0
                      • Opcode Fuzzy Hash: c34cf874e28939f0e2f9d61df82db9ff8d9d9859511bff8662e41e87a2571aa0
                      • Instruction Fuzzy Hash: 1151F4B1A1410AABDB04CFD8D891AEFB7B6FF88300F008159F919A7244D735EA11DBA1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: CodeInfoPageValidmemset
                      • String ID:
                      • API String ID: 703783727-0
                      • Opcode ID: 6951f29c36c94b1d073d54955c1dcc818f8d448c9a4e816d0e34e81470273be2
                      • Instruction ID: 311b67c8d0f25270221705016a49e6793b3f50e9b72a4fad8bca4f1be42d03f9
                      • Opcode Fuzzy Hash: 6951f29c36c94b1d073d54955c1dcc818f8d448c9a4e816d0e34e81470273be2
                      • Instruction Fuzzy Hash: 54313E31A2C2568FD7259FB4C84837ABFA09F45314F1845AEE891DE189C774C405E753
                      APIs
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624A00), ref: 02276178
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624DA4), ref: 02276191
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624E10), ref: 022761A9
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624A60), ref: 022761C1
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624A4C), ref: 022761DA
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624AEC), ref: 022761F2
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624CB8), ref: 0227620A
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624B30), ref: 02276223
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624D84), ref: 0227623B
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624D28), ref: 02276253
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624BAC), ref: 0227626C
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624AE0), ref: 02276284
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,00624DD8), ref: 0227629C
                        • Part of subcall function 02276137: GetProcAddress.KERNEL32(00625074,006248B0), ref: 022762B5
                        • Part of subcall function 022613F7: ExitProcess.KERNEL32 ref: 02261438
                        • Part of subcall function 02261387: GetSystemInfo.KERNEL32(?), ref: 02261391
                        • Part of subcall function 02261387: ExitProcess.KERNEL32 ref: 022613A5
                        • Part of subcall function 02261337: ExitProcess.KERNEL32 ref: 0226136A
                        • Part of subcall function 02261447: __aulldiv.LIBCMT ref: 0226147F
                        • Part of subcall function 02261447: __aulldiv.LIBCMT ref: 0226148D
                        • Part of subcall function 02261447: ExitProcess.KERNEL32 ref: 022614BB
                        • Part of subcall function 022613B7: ExitProcess.KERNEL32 ref: 022613ED
                        • Part of subcall function 02274627: GetUserNameA.ADVAPI32(?,00000104), ref: 02274653
                        • Part of subcall function 02277217: lstrlen.KERNEL32(?,006249EC,?,004215A4,0041D7D6), ref: 0227722C
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00624D20,?,0041D8AC,?,00000000,?,0041D8B0,?,00000000,0041D6E3), ref: 022739F1
                      • CloseHandle.KERNEL32(00000000), ref: 02273A20
                      • Sleep.KERNEL32(00001770), ref: 02273A2B
                      • CloseHandle.KERNEL32(?,00000000,?,00624D20,?,0041D8AC,?,00000000,?,0041D8B0,?,00000000,0041D6E3), ref: 02273A41
                      • ExitProcess.KERNEL32 ref: 02273A49
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressProc$ExitProcess$CloseHandle__aulldiv$EventInfoNameOpenSleepSystemUserlstrlen
                      • String ID:
                      • API String ID: 4169746731-0
                      • Opcode ID: 46515f5eae24d0a6147c7cb61a4b11b40ebb98da62e4e0d1738e1df983633f24
                      • Instruction ID: 28fc4073c6f7635c97123d15eda46860effa48664e08958445920723bb061692
                      • Opcode Fuzzy Hash: 46515f5eae24d0a6147c7cb61a4b11b40ebb98da62e4e0d1738e1df983633f24
                      • Instruction Fuzzy Hash: 7C314C71D68308AADB14FBF0DC59FFDB77AAF54301F004518A112A6298EFB0A905CF61
                      APIs
                      • __getptd.LIBCMT ref: 0227881A
                        • Part of subcall function 02277D93: __getptd_noexit.LIBCMT ref: 02277D96
                        • Part of subcall function 02277D93: __amsg_exit.LIBCMT ref: 02277DA3
                      • __getptd.LIBCMT ref: 02278831
                      • __amsg_exit.LIBCMT ref: 0227883F
                      • __lock.LIBCMT ref: 0227884F
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 02278863
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: cc7480a914060d8b5643a9d0b0f25a761215b1338a518c63d358d0bb6fed0dfa
                      • Instruction ID: 838fc6fb187795c061a9e8f19a0dbc47cd0cacb2e2819e841037598d99bd5852
                      • Opcode Fuzzy Hash: cc7480a914060d8b5643a9d0b0f25a761215b1338a518c63d358d0bb6fed0dfa
                      • Instruction Fuzzy Hash: 76F0B432E2D314EBD721BFF4980975D73A2AF00721F904129E408A72D9CBB85541EE5B
                      APIs
                      • __getptd.LIBCMT ref: 004185B3
                        • Part of subcall function 00417B2C: __getptd_noexit.LIBCMT ref: 00417B2F
                        • Part of subcall function 00417B2C: __amsg_exit.LIBCMT ref: 00417B3C
                      • __getptd.LIBCMT ref: 004185CA
                      • __amsg_exit.LIBCMT ref: 004185D8
                      • __lock.LIBCMT ref: 004185E8
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 004185FC
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: ce05a91ea9c2b8e711ac95fae42e6a284d9b9390d13ac8f67e08820a18d7d66a
                      • Instruction ID: cdd0eec35e4bf80da2317afb9b55000317a90f0185e5a3c9ee5e330d7cc08b67
                      • Opcode Fuzzy Hash: ce05a91ea9c2b8e711ac95fae42e6a284d9b9390d13ac8f67e08820a18d7d66a
                      • Instruction Fuzzy Hash: A4F09632A49710AAD721BBBA9C027CA77B1AF00739F10411FF505A62D2CF6C69C1CA5D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExitProcessstrtok_s
                      • String ID: block
                      • API String ID: 3407564107-2199623458
                      • Opcode ID: 52d09828bd6328d95c269d46c52906f376363bf45c2a71b165d5bab26f2389d9
                      • Instruction ID: 7825bcbe27da9618b603611e1cfecd621835b499ad6dca7fa43ef563d7fd58f0
                      • Opcode Fuzzy Hash: 52d09828bd6328d95c269d46c52906f376363bf45c2a71b165d5bab26f2389d9
                      • Instruction Fuzzy Hash: 0F514074A08209EFDB20DFA1D955BAE77B5BF44305F10807AE802B76C0D778E985CB59
                      APIs
                        • Part of subcall function 00406CA0: memset.MSVCRT ref: 00406CE4
                      • task.LIBCPMTD ref: 004070CB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: memsettask
                      • String ID: : $`v@$h0A
                      • API String ID: 1616412766-3559972273
                      • Opcode ID: 22c65c759e4008ac886b6aeda8a47d70719bcccf3909e077351c77a1654b374d
                      • Instruction ID: d9fe8ddf8edd41d5d79e2c2aa3549d60ad86c8a123fe42dd1537da3b5299582f
                      • Opcode Fuzzy Hash: 22c65c759e4008ac886b6aeda8a47d70719bcccf3909e077351c77a1654b374d
                      • Instruction Fuzzy Hash: 4B318371E05504ABCB14EBA0DD99EFF7B75BF44305B104519F102BB290DA38BD46CB99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv
                      • String ID: %d MB$@
                      • API String ID: 3732870572-3474575989
                      • Opcode ID: f62cb7ad2578be9c21b89e6e1bf921e4f1007482674ad6998ac9b57a816d1492
                      • Instruction ID: f510475f390b20142bb5ad9b480526056b42ea6839ab7368ec165d8bd78ed5c1
                      • Opcode Fuzzy Hash: f62cb7ad2578be9c21b89e6e1bf921e4f1007482674ad6998ac9b57a816d1492
                      • Instruction Fuzzy Hash: 84111EB0D40208ABDB10DFE4CC49FAE77B8BB48704F104549F715BB284D7B8A9418B99
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv$ExitProcess
                      • String ID: @
                      • API String ID: 1471141222-2766056989
                      • Opcode ID: bb81cb4acda70f26030c3c2501203c3bf716c46d07ed01ddf58a3b899f1b5564
                      • Instruction ID: ea0a6e1757c4b1df45eb813508b786e01a5d8f9a6a3870c153cbf5caba005949
                      • Opcode Fuzzy Hash: bb81cb4acda70f26030c3c2501203c3bf716c46d07ed01ddf58a3b899f1b5564
                      • Instruction Fuzzy Hash: E40162B1D54308FAEB10DFD0CC49BADB7B8AB44705F248048E7087B6C4D7B4A5918F64
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: - $%s\%s$?
                      • API String ID: 0-3278919252
                      • Opcode ID: 061d66f760d3494af1987b411ca60ede0f30b30ca504be6e27f42dcbcd4a3eb7
                      • Instruction ID: fbc8112ab3bfbfb2fdc98052a2813d45c496b4d84dbcb1503bfdf8522ef193f5
                      • Opcode Fuzzy Hash: 061d66f760d3494af1987b411ca60ede0f30b30ca504be6e27f42dcbcd4a3eb7
                      • Instruction Fuzzy Hash: F1712A7590021C9BDB64DB60DD91FDA77B9BF88304F0086D9A109A6180DF74AFCACF94
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlen
                      • String ID: %s\%s$%s\*
                      • API String ID: 1659193697-2848263008
                      • Opcode ID: 333eb63e704fa0ab8c5fb78ea37c725d63d8f40c9f6006c56dd0fd91307c0c46
                      • Instruction ID: 68eafe57ffc654504e5fb8166b756e3a47007b1446461b295be9b39175aa6662
                      • Opcode Fuzzy Hash: 333eb63e704fa0ab8c5fb78ea37c725d63d8f40c9f6006c56dd0fd91307c0c46
                      • Instruction Fuzzy Hash: 5551A6B5940618ABCB20EBB0DC89FEE737DAB98300F404689F61A96150DF749BC5CF94
                      APIs
                      • memcmp.MSVCRT ref: 0040980B
                      • memset.MSVCRT ref: 0040983E
                        • Part of subcall function 00416E20: lstrlen.KERNEL32(00000000,?,?,00412BE0,0041D59B,0041D59A,?,?,004137D6,00000000,?,00898530,?,0041D8AC,?,00000000), ref: 00416E2B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: lstrlenmemcmpmemset
                      • String ID: @$v10
                      • API String ID: 2195167648-24753345
                      • Opcode ID: 6d1a1abe6e6826a1ce0dbdd1ef6ea650f8487a8d622505b14063b63e06140071
                      • Instruction ID: 87859f0eaa1cac66c0422607c8296a2f5b7cfd88fdb957a476e5adb471fb7cf1
                      • Opcode Fuzzy Hash: 6d1a1abe6e6826a1ce0dbdd1ef6ea650f8487a8d622505b14063b63e06140071
                      • Instruction Fuzzy Hash: 00414EB0A00208EBDB04DFA5DC55FDE7B75BF44304F108119F909AB295DB78AE85CB98
                      APIs
                      • GetSystemTime.KERNEL32(?), ref: 02273893
                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022738D9
                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022738E7
                      • ExitProcess.KERNEL32 ref: 02273901
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: Time$System$File$ExitProcess
                      • String ID:
                      • API String ID: 56602140-0
                      • Opcode ID: 3210208c9ff9191fbd103aa9c2d0b3e8e7c47af46a118988f5807df95a5cb685
                      • Instruction ID: 60032979ed20b67f37f99fba701157aa0abd4c7707d30e00ddc4d8a978879a8b
                      • Opcode Fuzzy Hash: 3210208c9ff9191fbd103aa9c2d0b3e8e7c47af46a118988f5807df95a5cb685
                      • Instruction Fuzzy Hash: D621DCB5D14209ABCF14DFE4D9459EEB7BABF8C300F04856EE506E3254EB349604CB65
                      APIs
                      • memset.MSVCRT ref: 00406CE4
                      • task.LIBCPMTD ref: 00406F25
                        • Part of subcall function 00408C20: vsprintf_s.MSVCRT ref: 00408C3B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: memsettaskvsprintf_s
                      • String ID: Password
                      • API String ID: 2675463923-3434357891
                      • Opcode ID: e5b433d59e683e3853dabaec4553a197e9f76ed1b5df22dde85a26ca8bf12c56
                      • Instruction ID: 212e66a44237aadac39c144ffd634e87161c2b2b5cb707631054264fe3c499ea
                      • Opcode Fuzzy Hash: e5b433d59e683e3853dabaec4553a197e9f76ed1b5df22dde85a26ca8bf12c56
                      • Instruction Fuzzy Hash: 4F613FB5D042589BDB24DB50CC45BDAB7B8BF44304F0081EAE64AA6281DF746FC9CF95
                      APIs
                      • GetSystemTime.KERNEL32(?,00000000,0041D129,?,?,?,?,?,?,?,?,?,00404623,?,00000014), ref: 00415286
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193162937.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2193162937.0000000000624000.00000040.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2193162937.0000000000636000.00000040.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: SystemTime
                      • String ID: #F@$#F@
                      • API String ID: 2656138-661595268
                      • Opcode ID: 3a859b8b0cbacdc11ebfb3e047a024e7a283962ea90257fbacdd3e9563b3f0f0
                      • Instruction ID: 513f033f75459e748f43dcf9dcce4e772375218857ee2e068f26327ba23d5006
                      • Opcode Fuzzy Hash: 3a859b8b0cbacdc11ebfb3e047a024e7a283962ea90257fbacdd3e9563b3f0f0
                      • Instruction Fuzzy Hash: 8511D636D00108DFCB04EFA9D891AEE7B75EF98304F54C05EE41567251DF38AA85CBA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2193587843.0000000002260000.00000040.00001000.00020000.00000000.sdmp, Offset: 02260000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2260000_LisectAVT_2403002A_20.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv
                      • String ID: @
                      • API String ID: 3732870572-2766056989
                      • Opcode ID: f62cb7ad2578be9c21b89e6e1bf921e4f1007482674ad6998ac9b57a816d1492
                      • Instruction ID: 7c6dea03fda8f28d16e606c39bea8375ae62d7a7ee96e468a19049cfe28b860c
                      • Opcode Fuzzy Hash: f62cb7ad2578be9c21b89e6e1bf921e4f1007482674ad6998ac9b57a816d1492
                      • Instruction Fuzzy Hash: AC111BB0D54708ABEB10EBE4CC49FAEB7B9BB44704F104548F605AB284D7B4A9018FA9