Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Cheat.exe

Overview

General Information

Sample name:Cheat.exe
Analysis ID:1494203
MD5:74d3f720e38b834198fee67e020bb736
SHA1:5fab6ccb0748a2de502b877c34d2409b1118bd30
SHA256:bc3a66a87018863d22a6a7a9afd15f0af5499d021f0ede01466011e0a64a0ce1
Tags:exe
Infos:

Detection

44Caliber Stealer, BlackGuard, Rags Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected 44Caliber Stealer
Yara detected BlackGuard
Yara detected Rags Stealer
AI detected suspicious sample
Contains functionality to capture screen (.Net source)
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Cheat.exe (PID: 1864 cmdline: "C:\Users\user\Desktop\Cheat.exe" MD5: 74D3F720E38B834198FEE67E020BB736)
    • WerFault.exe (PID: 7176 cmdline: C:\Windows\system32\WerFault.exe -u -p 1864 -s 1568 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"Discord Webhook": "https://discord.com/api/webhooks/1254423260591030333/Im8Y-IPgPJTWTloM0jy_llzrxAFZLtGLTGrSJEpTfiSbOm4QV3WSBgCXN7xBYLC5ajH9\u0001vakaka"}
SourceRuleDescriptionAuthorStrings
Cheat.exeJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
    Cheat.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Cheat.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        Cheat.exeJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
          Cheat.exeJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
              00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                  00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                    00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpINDICATOR_SUSPICIOUS_EXE_Discord_RegexDetects executables referencing Discord tokens regular expressionsditekSHen
                    • 0x40fbf:$s1: [a-zA-Z0-9]{24}\.[a-zA-Z0-9]{6}\.[a-zA-Z0-9_\-]{27}|mfa\.[a-zA-Z0-9_\-]{84}
                    Click to see the 8 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.Cheat.exe.29b14490000.0.unpackJoeSecurity_BlackGuardYara detected BlackGuardJoe Security
                      0.0.Cheat.exe.29b14490000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                        0.0.Cheat.exe.29b14490000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                          0.0.Cheat.exe.29b14490000.0.unpackJoeSecurity_RagsStealerYara detected Rags StealerJoe Security
                            0.0.Cheat.exe.29b14490000.0.unpackJoeSecurity_44CaliberStealerYara detected 44Caliber StealerJoe Security
                              Click to see the 3 entries
                              No Sigma rule has matched
                              No Suricata rule has matched

                              Click to jump to signature section

                              Show All Signature Results

                              AV Detection

                              barindex
                              Source: Cheat.exeAvira: detected
                              Source: 0.0.Cheat.exe.29b14490000.0.unpackMalware Configuration Extractor: 44Caliber Stealer {"Discord Webhook": "https://discord.com/api/webhooks/1254423260591030333/Im8Y-IPgPJTWTloM0jy_llzrxAFZLtGLTGrSJEpTfiSbOm4QV3WSBgCXN7xBYLC5ajH9\u0001vakaka"}
                              Source: Cheat.exeVirustotal: Detection: 69%Perma Link
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
                              Source: Cheat.exeJoe Sandbox ML: detected

                              Location Tracking

                              barindex
                              Source: unknownDNS query: name: freegeoip.app
                              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2
                              Source: Cheat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: Binary string: System.Xml.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: .pdbRq source: Cheat.exe, 00000000.00000002.2222955578.0000029B146D9000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: mscorlib.pdb source: Cheat.exe, 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, WER99D1.tmp.dmp.4.dr
                              Source: Binary string: Insidious.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.ni.pdbRSDS source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: lib.pdb source: Cheat.exe, 00000000.00000002.2222955578.0000029B146D9000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: mscorlib.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Core.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Configuration.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: C:\Users\kiril\Desktop\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb source: Cheat.exe
                              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Configuration.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Xml.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Core.ni.pdbRSDS source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Core.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: C:\Users\user\Desktop\Cheat.exeCode function: 4x nop then jmp 00007FF848F35D5Ah0_2_00007FF848F3586B
                              Source: C:\Users\user\Desktop\Cheat.exeCode function: 4x nop then jmp 00007FF848F33D1Fh0_2_00007FF848F33BCD
                              Source: C:\Users\user\Desktop\Cheat.exeCode function: 4x nop then jmp 00007FF848F3694Bh0_2_00007FF848F3689F

                              Networking

                              barindex
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                              Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                              Source: global trafficDNS traffic detected: DNS query: freegeoip.app
                              Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                              Source: cert9.db.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                              Source: cert9.db.0.drString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                              Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                              Source: cert9.db.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                              Source: cert9.db.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                              Source: cert9.db.0.drString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B164B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://freegeoip.app
                              Source: cert9.db.0.drString found in binary or memory: http://ocsp.digicert.com0
                              Source: cert9.db.0.drString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B16440000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                              Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
                              Source: cert9.db.0.drString found in binary or memory: http://x1.c.lencr.org/0
                              Source: cert9.db.0.drString found in binary or memory: http://x1.i.lencr.org/0
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.vimeworld.ru/user/name/
                              Source: Cheat.exeString found in binary or memory: https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                              Source: Cheat.exeString found in binary or memory: https://discord.com/api/webhooks/1254423260591030333/Im8Y-IPgPJTWTloM0jy_llzrxAFZLtGLTGrSJEpTfiSbOm4
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B164A0000.00000004.00000800.00020000.00000000.sdmp, Cheat.exe, 00000000.00000002.2223511365.0000029B16440000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B164B4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app(
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://freegeoip.app/xml/(
                              Source: Cheat.exeString found in binary or memory: https://steamcommunity.com/profiles/ASOFTWARE
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://www.ecosia.org/newtab/
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B2646E000.00000004.00000800.00020000.00000000.sdmp, tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                              Source: tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B2646E000.00000004.00000800.00020000.00000000.sdmp, tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                              Source: Cheat.exe, 00000000.00000002.2224011760.0000029B2646E000.00000004.00000800.00020000.00000000.sdmp, tmp9750.tmp.tmpdb.0.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                              Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49704 version: TLS 1.2

                              Key, Mouse, Clipboard, Microphone and Screen Capturing

                              barindex
                              Source: Cheat.exe, Screen.cs.Net Code: GetScreen

                              E-Banking Fraud

                              barindex
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY

                              System Summary

                              barindex
                              Source: Cheat.exe, type: SAMPLEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: Cheat.exe, type: SAMPLEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                              Source: Cheat.exe, type: SAMPLEMatched rule: Detects A310Logger Author: ditekSHen
                              Source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing many VPN software clients. Observed in infosteslers Author: ditekSHen
                              Source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPEMatched rule: Detects A310Logger Author: ditekSHen
                              Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTRMatched rule: Detects executables referencing Discord tokens regular expressions Author: ditekSHen
                              Source: C:\Users\user\Desktop\Cheat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1864 -s 1568
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameInsidious.exe6 vs Cheat.exe
                              Source: Cheat.exe, 00000000.00000002.2222955578.0000029B1466C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Cheat.exe
                              Source: Cheat.exeBinary or memory string: OriginalFilenameInsidious.exe6 vs Cheat.exe
                              Source: Cheat.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Cheat.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                              Source: Cheat.exe, type: SAMPLEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                              Source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_References_VPN author = ditekSHen, description = Detects executables referencing many VPN software clients. Observed in infosteslers
                              Source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_A310Logger author = ditekSHen, description = Detects A310Logger, snort_sid = 920204-920207
                              Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex author = ditekSHen, description = Detects executables referencing Discord tokens regular expressions
                              Source: Cheat.exe, Help.csSuspicious URL: 'https://api.vimeworld.ru/user/name/'
                              Source: classification engineClassification label: mal100.troj.spyw.winEXE@2/15@1/1
                              Source: C:\Users\user\Desktop\Cheat.exeFile created: C:\Users\user\AppData\Local\44Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeMutant created: NULL
                              Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1864
                              Source: C:\Users\user\Desktop\Cheat.exeFile created: C:\Users\user\AppData\Local\Temp\tmp9750.tmpJump to behavior
                              Source: Cheat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              Source: Cheat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                              Source: C:\Users\user\Desktop\Cheat.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B16569000.00000004.00000800.00020000.00000000.sdmp, Cheat.exe, 00000000.00000002.2223511365.0000029B1649A000.00000004.00000800.00020000.00000000.sdmp, tmp9842.tmp.dat.0.dr, tmp97DF.tmp.dat.0.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                              Source: Cheat.exeVirustotal: Detection: 69%
                              Source: C:\Users\user\Desktop\Cheat.exeFile read: C:\Users\user\Desktop\Cheat.exeJump to behavior
                              Source: unknownProcess created: C:\Users\user\Desktop\Cheat.exe "C:\Users\user\Desktop\Cheat.exe"
                              Source: C:\Users\user\Desktop\Cheat.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 1864 -s 1568
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: mscoree.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: apphelp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: kernel.appcore.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: version.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: windows.storage.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: wldp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: profapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: cryptsp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: rsaenh.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: cryptbase.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: sspicli.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: ntmarta.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: rasapi32.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: rasman.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: rtutils.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: mswsock.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: winhttp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: iphlpapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: dhcpcsvc6.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: dhcpcsvc.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: dnsapi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: winnsi.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: rasadhlp.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: fwpuclnt.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: secur32.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeSection loaded: schannel.dllJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                              Source: Cheat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                              Source: Cheat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Source: Cheat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                              Source: Binary string: System.Xml.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: .pdbRq source: Cheat.exe, 00000000.00000002.2222955578.0000029B146D9000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: mscorlib.pdb source: Cheat.exe, 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, WER99D1.tmp.dmp.4.dr
                              Source: Binary string: Insidious.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.ni.pdbRSDS source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: lib.pdb source: Cheat.exe, 00000000.00000002.2222955578.0000029B146D9000.00000004.00000020.00020000.00000000.sdmp
                              Source: Binary string: mscorlib.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Core.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Configuration.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: C:\Users\kiril\Desktop\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb source: Cheat.exe
                              Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Configuration.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Xml.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Xml.ni.pdbRSDS# source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Core.ni.pdbRSDS source: WER99D1.tmp.dmp.4.dr
                              Source: Binary string: System.Core.ni.pdb source: WER99D1.tmp.dmp.4.dr
                              Source: Cheat.exeStatic PE information: 0x92718E88 [Sat Nov 9 12:33:12 2047 UTC]
                              Source: C:\Users\user\Desktop\Cheat.exeCode function: 0_2_00007FF848F3753A push ebx; iretd 0_2_00007FF848F3756A
                              Source: C:\Users\user\Desktop\Cheat.exeCode function: 0_2_00007FF848F37548 push ebx; iretd 0_2_00007FF848F3756A
                              Source: C:\Users\user\Desktop\Cheat.exeCode function: 0_2_00007FF848F3756B push ebx; iretd 0_2_00007FF848F3756A
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeMemory allocated: 29B14810000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeMemory allocated: 29B2E3C0000 memory reserve | memory write watchJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeThread delayed: delay time: 600000Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exe TID: 7616Thread sleep time: -922337203685477s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exe TID: 7616Thread sleep time: -600000s >= -30000sJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeThread delayed: delay time: 922337203685477Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeThread delayed: delay time: 600000Jump to behavior
                              Source: Amcache.hve.4.drBinary or memory string: VMware
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: global block list test formVMware20,11696428655
                              Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                              Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                              Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: AMC password management pageVMware20,11696428655
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: tasks.office.comVMware20,11696428655o
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                              Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                              Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                              Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                              Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                              Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                              Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                              Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                              Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                              Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                              Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                              Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: discord.comVMware20,11696428655f
                              Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                              Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                              Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                              Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                              Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                              Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                              Source: Cheat.exe, 00000000.00000002.2223300958.0000029B148BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: outlook.office.comVMware20,11696428655s
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                              Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                              Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                              Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: dev.azure.comVMware20,11696428655j
                              Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                              Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                              Source: tmp9831.tmp.dat.0.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                              Source: C:\Users\user\Desktop\Cheat.exeProcess information queried: ProcessInformationJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess queried: DebugPortJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeProcess token adjusted: DebugJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeMemory allocated: page read and write | page guardJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeQueries volume information: C:\Users\user\Desktop\Cheat.exe VolumeInformationJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                              Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                              Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                              Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                              Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                              Stealing of Sensitive Information

                              barindex
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTR
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTR
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Electrum
                              Source: Cheat.exe, 00000000.00000002.2223511365.0000029B164D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 2C:\Users\user\AppData\Roaming\Electrum\wallets\*
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: JaxxDir
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: ExodusDir
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: Ethereum
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: Cheat.exe, 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: %\Wallets\DashCore\)\DashCore\wallet.dat#\Electrum\wallets%\Wallets\Electrum\%\Ethereum\keystore%\Wallets\Ethereum\-\Exodus\exodus.wallet\!\Wallets\Exodus\m\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb\Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                              Source: C:\Users\user\Desktop\Cheat.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file__0.indexeddb.leveldb\Jump to behavior
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTR

                              Remote Access Functionality

                              barindex
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTR
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: Cheat.exe, type: SAMPLE
                              Source: Yara matchFile source: 0.0.Cheat.exe.29b14490000.0.unpack, type: UNPACKEDPE
                              Source: Yara matchFile source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                              Source: Yara matchFile source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                              Source: Yara matchFile source: Process Memory Space: Cheat.exe PID: 1864, type: MEMORYSTR
                              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                              DLL Side-Loading
                              1
                              Process Injection
                              1
                              Masquerading
                              1
                              OS Credential Dumping
                              21
                              Security Software Discovery
                              Remote Services1
                              Screen Capture
                              2
                              Encrypted Channel
                              Exfiltration Over Other Network MediumAbuse Accessibility Features
                              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                              DLL Side-Loading
                              1
                              Disable or Modify Tools
                              LSASS Memory1
                              Process Discovery
                              Remote Desktop Protocol3
                              Data from Local System
                              1
                              Non-Application Layer Protocol
                              Exfiltration Over BluetoothNetwork Denial of Service
                              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                              Virtualization/Sandbox Evasion
                              Security Account Manager41
                              Virtualization/Sandbox Evasion
                              SMB/Windows Admin SharesData from Network Shared Drive2
                              Application Layer Protocol
                              Automated ExfiltrationData Encrypted for Impact
                              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                              Process Injection
                              NTDS12
                              System Information Discovery
                              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                              Obfuscated Files or Information
                              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                              Timestomp
                              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                              DLL Side-Loading
                              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                              Hide Legend

                              Legend:

                              • Process
                              • Signature
                              • Created File
                              • DNS/IP Info
                              • Is Dropped
                              • Is Windows Process
                              • Number of created Registry Values
                              • Number of created Files
                              • Visual Basic
                              • Delphi
                              • Java
                              • .Net C# or VB.NET
                              • C, C++ or other language
                              • Is malicious
                              • Internet

                              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                              windows-stand
                              SourceDetectionScannerLabelLink
                              Cheat.exe69%VirustotalBrowse
                              Cheat.exe100%AviraHEUR/AGEN.1307065
                              Cheat.exe100%Joe Sandbox ML
                              No Antivirus matches
                              No Antivirus matches
                              SourceDetectionScannerLabelLink
                              freegeoip.app0%VirustotalBrowse
                              SourceDetectionScannerLabelLink
                              http://crl.rootca1.amazontrust.com/rootca1.crl00%URL Reputationsafe
                              http://upx.sf.net0%URL Reputationsafe
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                              https://www.ecosia.org/newtab/0%URL Reputationsafe
                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
                              https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                              http://x1.c.lencr.org/00%URL Reputationsafe
                              http://x1.i.lencr.org/00%URL Reputationsafe
                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                              http://crt.rootca1.amazontrust.com/rootca1.cer0?0%URL Reputationsafe
                              https://support.mozilla.org0%URL Reputationsafe
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                              https://steamcommunity.com/profiles/ASOFTWARE0%Avira URL Cloudsafe
                              https://freegeoip.app(0%Avira URL Cloudsafe
                              https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                              https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                              https://freegeoip.app0%Avira URL Cloudsafe
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                              https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                              http://ocsp.rootca1.amazontrust.com0:0%Avira URL Cloudsafe
                              https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                              https://freegeoip.app/xml/(0%Avira URL Cloudsafe
                              https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                              https://discord.com/api/webhooks/1254423260591030333/Im8Y-IPgPJTWTloM0jy_llzrxAFZLtGLTGrSJEpTfiSbOm40%Avira URL Cloudsafe
                              https://steamcommunity.com/profiles/ASOFTWARE0%VirustotalBrowse
                              https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL0%Avira URL Cloudsafe
                              https://freegeoip.app/xml/(1%VirustotalBrowse
                              https://api.vimeworld.ru/user/name/0%Avira URL Cloudsafe
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/0%Avira URL Cloudsafe
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                              http://freegeoip.app0%Avira URL Cloudsafe
                              http://freegeoip.app0%VirustotalBrowse
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/0%VirustotalBrowse
                              https://freegeoip.app0%VirustotalBrowse
                              https://api.vimeworld.ru/user/name/0%VirustotalBrowse
                              NameIPActiveMaliciousAntivirus DetectionReputation
                              freegeoip.app
                              188.114.97.3
                              truetrueunknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://duckduckgo.com/chrome_newtabCheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/ac/?q=Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.google.com/images/branding/product/ico/googleg_lodp.icoCheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://steamcommunity.com/profiles/ASOFTWARECheat.exefalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://freegeoip.app(Cheat.exe, 00000000.00000002.2223511365.0000029B164B4000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://freegeoip.appCheat.exe, 00000000.00000002.2223511365.0000029B164A0000.00000004.00000800.00020000.00000000.sdmp, Cheat.exe, 00000000.00000002.2223511365.0000029B16440000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://crl.rootca1.amazontrust.com/rootca1.crl0cert9.db.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://upx.sf.netAmcache.hve.4.drfalse
                              • URL Reputation: safe
                              unknown
                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.rootca1.amazontrust.com0:cert9.db.0.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://freegeoip.app/xml/(Cheat.exe, 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 1%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.ecosia.org/newtab/Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmp9750.tmp.tmpdb.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://discord.com/api/webhooks/1254423260591030333/Im8Y-IPgPJTWTloM0jy_llzrxAFZLtGLTGrSJEpTfiSbOm4Cheat.exetrue
                              • Avira URL Cloud: safe
                              unknown
                              https://ac.ecosia.org/autocomplete?q=Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://x1.c.lencr.org/0cert9.db.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://x1.i.lencr.org/0cert9.db.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchCheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://crt.rootca1.amazontrust.com/rootca1.cer0?cert9.db.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBLtmp9750.tmp.tmpdb.0.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.vimeworld.ru/user/name/Cheat.exe, 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.vimeworld.ru/user/name/5https://freegeoip.app/xml/Cheat.exefalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://support.mozilla.orgtmp9750.tmp.tmpdb.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCheat.exe, 00000000.00000002.2223511365.0000029B16440000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Cheat.exe, 00000000.00000002.2224011760.0000029B26444000.00000004.00000800.00020000.00000000.sdmp, tmp9761.tmp.dat.0.dr, tmp97F0.tmp.dat.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://freegeoip.appCheat.exe, 00000000.00000002.2223511365.0000029B164B4000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              188.114.97.3
                              freegeoip.appEuropean Union
                              13335CLOUDFLARENETUStrue
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1494203
                              Start date and time:2024-08-17 15:49:05 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 4m 24s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:9
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Cheat.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.winEXE@2/15@1/1
                              EGA Information:Failed
                              HCA Information:
                              • Successful, ratio: 76%
                              • Number of executed functions: 69
                              • Number of non-executed functions: 2
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 52.168.117.173
                              • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                              • Execution Graph export aborted for target Cheat.exe, PID 1864 because it is empty
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              • Report size getting too big, too many NtSetInformationFile calls found.
                              TimeTypeDescription
                              09:50:14API Interceptor1x Sleep call for process: WerFault.exe modified
                              09:50:14API Interceptor1x Sleep call for process: Cheat.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              188.114.97.3FedEx Shipping Document.exeGet hashmaliciousAzorultBrowse
                              • l0h5.shop/CM341/index.php
                              http://binanceevn.com/index/index/lang/ko-kr/Trade/tradelistGet hashmaliciousUnknownBrowse
                              • binanceevn.com/Verify/code
                              rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                              • jiourl.com/anbdld
                              rfq_commercial_order_GMlist_for_Drumedis_tender_august_quater_2024.xlsGet hashmaliciousUnknownBrowse
                              • jiourl.com/anbdld
                              QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • filetransfer.io/data-package/qLW2DYuh/download
                              QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • filetransfer.io/data-package/jSVzi5ju/download
                              QUOTATION_AUGQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • filetransfer.io/data-package/Ry4NfKBu/download
                              http://dpd-hr.receiving-delivery.com/track/5294558215/Get hashmaliciousUnknownBrowse
                              • dpd-hr.receiving-delivery.com/track/5294558215/
                              Payment Advice_pdf.exeGet hashmaliciousFormBookBrowse
                              • www.hanguyenwriter.com/d6sr/?wr0Pj=B6mQBi1XdG6Ip8HjYP8J20Tn9n8w+fm1VWBEYYr6I8xhcx3c/+KR1ZBvapv5UXRO0F08kJtDNJclAYc2CHffI7PBVjFLJU51UUvdjXHprzdYJUZk4jM9p8s=&1d=cfLL
                              UBEGtm2WmN.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                              • 149387cm.n9sh.top/Authuniversaltrackpublic.php
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              freegeoip.appB5U2ccQ8H1.exeGet hashmaliciousRL STEALER, StormKittyBrowse
                              • 188.114.97.3
                              xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                              • 188.114.96.3
                              Pots.exeGet hashmalicious44userber Stealer, Rags StealerBrowse
                              • 104.21.73.97
                              qdHMT36Tn9.exeGet hashmalicious44Caliber Stealer, Njrat, Rags StealerBrowse
                              • 172.67.160.84
                              64drop.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                              • 104.21.73.97
                              123.scr.exeGet hashmaliciousUnknownBrowse
                              • 104.21.73.97
                              123.scr.exeGet hashmaliciousRags StealerBrowse
                              • 104.21.73.97
                              123.scr.exeGet hashmaliciousRags StealerBrowse
                              • 172.67.160.84
                              RP.sfx.exeGet hashmalicious44Caliber Stealer, Rags StealerBrowse
                              • 172.67.160.84
                              i6R4NsEd8t.exeGet hashmaliciousSnake KeyloggerBrowse
                              • 104.21.73.97
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUSoutlook-attachment.exeGet hashmaliciousLummaC, Go InjectorBrowse
                              • 104.21.16.74
                              apzzz-20c7e.kxcdn.com.ps1Get hashmaliciousLummaC, Go InjectorBrowse
                              • 104.21.16.74
                              set-up.exeGet hashmaliciousCryptbotBrowse
                              • 188.114.96.3
                              set-up.exeGet hashmaliciousCryptbotBrowse
                              • 188.114.96.3
                              Setup.exeGet hashmaliciousLummaC, Go InjectorBrowse
                              • 104.21.69.39
                              Setup.exeGet hashmaliciousLummaC, Go InjectorBrowse
                              • 104.21.16.74
                              Setup.exeGet hashmaliciousLummaC, Go InjectorBrowse
                              • 104.21.16.74
                              https://aquafish.net/pagecon/pagecon.cgi?no=13&page=http://aaudio-for-wordpress-131830832858f3d16cef719d9e5e572d8eeda9f5.s3-website-us-west-2.amazonaws.comGet hashmaliciousUnknownBrowse
                              • 104.17.25.14
                              RUN.exeGet hashmaliciousLummaCBrowse
                              • 172.67.178.83
                              https://89be4869.e90cd77623a877cd9e1af5f9.workers.dev/?qrc=michael.girault@xfab.comGet hashmaliciousUnknownBrowse
                              • 188.114.96.3
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0eapzzz-20c7e.kxcdn.com.ps1Get hashmaliciousLummaC, Go InjectorBrowse
                              • 188.114.97.3
                              DHL Receipt_4977049580.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                              • 188.114.97.3
                              file.exeGet hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              file.exeGet hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              http://pub-244e972cad9242be820ac9530c22a242.r2.dev/%EA%B0%90%EC%82%AC%ED%95%A9%EB%8B%88%EB%8B%A4.htmlGet hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              https://gtm.you1.cn/profiles/76561198013673010Get hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              http://pub-5844853ca98a4f61b82797c3efcc684d.r2.dev/wazxrd.htmlGet hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              http://loginkarkeen.gitbook.io/usGet hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              https://blockedwindowsdsgfsdg.pages.dev/Get hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              https://mui.qfv.mybluehost.me/admin1/am/infospage.php/Get hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              No context
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):1.1082934100174906
                              Encrypted:false
                              SSDEEP:192:rFzFFlohyL809c0jQaWxTklEeZBzuiF/Z24lO8QH:rJdohyr9c0jQaGGEmBzuiF/Y4lO8QH
                              MD5:ACEA7D060D0428C7BB5DBC9D1BF666E5
                              SHA1:6EC670B8CD01D3F7AD215DCEEB222AF701DAA4CD
                              SHA-256:016EF435EB45D9F7D9450A0947C9D6A1B073D338B6F8609EFEF5AE59A3EF9B1A
                              SHA-512:9E0C6DD99322A600F16A254E326696C175BABC97850F6F5630FC62DB6185F59E49FF74A7BCACE4B28081ADD24E5550C3FEC51C1369662A4B475F9ADC4E9ABF95
                              Malicious:true
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.8.3.7.6.1.9.1.4.7.1.7.6.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.8.3.7.6.1.9.3.1.5.9.2.7.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.7.1.3.b.3.c.c.-.c.4.d.1.-.4.6.b.8.-.8.b.8.3.-.7.0.6.a.5.3.b.f.b.0.4.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.d.1.4.4.7.e.8.-.c.9.3.1.-.4.a.1.9.-.b.8.5.a.-.7.6.5.a.b.c.3.2.f.d.9.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.C.h.e.a.t...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.n.s.i.d.i.o.u.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.4.8.-.0.0.0.1.-.0.0.1.4.-.c.5.c.1.-.9.1.5.4.a.c.f.0.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.1.1.8.6.e.c.8.a.7.1.b.7.6.8.8.5.0.a.d.2.d.f.e.6.a.d.f.3.7.6.7.0.0.0.0.0.0.0.0.!.0.0.0.0.5.f.a.b.6.c.c.b.0.7.4.8.a.2.d.e.5.0.2.b.8.7.7.c.3.4.d.2.4.0.9.b.1.1.1.8.b.d.3.0.!.C.h.e.a.t...e.x.e.....T.a.r.g.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Mini DuMP crash report, 16 streams, Sat Aug 17 13:49:51 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):560242
                              Entropy (8bit):3.361046861096494
                              Encrypted:false
                              SSDEEP:6144:uJqG+avGoaHAgqSIx3Qbb+s2476J36TPQr2B:DDav5YRq9Qes24eJ36TPQiB
                              MD5:E9AC652F957DF669D4FFC487CE9CFFAA
                              SHA1:6693D37B4F47A37DD7D573A964B497189431BB2D
                              SHA-256:23A0B3DF6EC3B7AAC8F76CE09A97DBA5C368E2B8F330A4DED599D751F2851EED
                              SHA-512:1493F4E2C6C6D5BB0941F12C666D5E4F1DA9564ECEB016A4FD21427A7021BE59C726E6E7B3424462B38A1F9925432CD916E598D598D1831ADDB50380D312888C
                              Malicious:false
                              Reputation:low
                              Preview:MDMP..a..... ..........f........................,...$.......<...P$......t....$......TZ..............l.......8...........T...........pE...G...........7...........8..............................................................................eJ.......9......Lw......................T.......H...~..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):8784
                              Entropy (8bit):3.6975979731830497
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJ5Wvf6YEItcPDXgmfZGiHprt89bgD0f8Am:R6lXJ4vf6YESMDXgmfkiQgwfq
                              MD5:4F690DCC5BABFFB5F2B3F217C9C9545E
                              SHA1:F2C67729EC2C295244BFB0329E07FD2833AA77A6
                              SHA-256:6CACC23A2C917F4B6826A84F9021A6230DAB535AFFE590EA5C9941D37DE5FE8A
                              SHA-512:77608349D2C2C97F28991CB0FAA579A854B6AE31D8B3F33AFCB6CFAD3ABBDA30F2E2BD1DD39C5B56B0F3704FDF087135A356291F4F1DA87B3B8BEFE908731726
                              Malicious:false
                              Reputation:low
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.8.6.4.<./.P.i.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4779
                              Entropy (8bit):4.444395953183569
                              Encrypted:false
                              SSDEEP:48:cvIwWl8zsFJg771I9SVWpW8VY7Ym8M4JQEoFSuHyq8vdE6XClyPqd:uIjffI7Nk7VHJtR8W26XCUPqd
                              MD5:F8C9F9C4DCC6F5A6B1397FE63129375B
                              SHA1:A08A270237AF7D628207E95DC72010C1A3F7EA53
                              SHA-256:0189240E970980D0241EE4B6B053ADE1EC6AC9C315C7360C7CE01E0C2F415338
                              SHA-512:9D2F3FEB45408A54C740CCC7D1712FAC8028219658C565D1EBEBF78D76774B13154B536D09C7989905B7B790B087A66078EB035E56754695B0429B60FCF2E304
                              Malicious:false
                              Reputation:low
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="459652" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 7, database pages 7, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                              Category:dropped
                              Size (bytes):229376
                              Entropy (8bit):0.643383182059925
                              Encrypted:false
                              SSDEEP:384:A1zkVmvQhyn+Zoz67kMMTNlH333JqN8j/LKXu5Uu/:AlM0sCyW
                              MD5:F23F48363C7BAA0709698208A7E833A0
                              SHA1:07D2AEE271A0F2BA14608FE5A9A677E2594D22CC
                              SHA-256:51DFB72705CBEB6AF5A14F2BE20FC39172E86263E25704F50BEB292F776B7713
                              SHA-512:F8F16198A96F047E320EF82026160EBD5A0836B48FC3496C427F90965CF3BF5FAB5EBE0FB9016E3BDE56657EB42627D7286AED3167A422D69F865524892C3DFA
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j......z..{...{.{j{*z.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 32768, file counter 2, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 2
                              Category:dropped
                              Size (bytes):294912
                              Entropy (8bit):0.08438200565341271
                              Encrypted:false
                              SSDEEP:192:5va0zkVmvQhyn+Zoz679fqlQbGhMHPaVAL23v4U:51zkVmvQhyn+Zoz67NU
                              MD5:F7EEE7B0D281E250D1D8E36486F5A2C3
                              SHA1:309736A27E794672BD1BDFBAC69B2C6734FC25CE
                              SHA-256:378DD46FE8A8AAC2C430AE8A7C5C1DC3C2A343534A64A263EC9A4F1CE801985E
                              SHA-512:CE102A41CA4E2A27CCB27F415D2D69A75A0058BA0F600C23F63B89F30FFC982BA48336140714C522B46CC6D13EDACCE3DF0D6685D02844B8DB0AD3378DB9CABB
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:SQLite format 3......@ ..........................................................................j......z<.{...{.{a{.z.z<z.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                              Category:dropped
                              Size (bytes):5242880
                              Entropy (8bit):0.03859996294213402
                              Encrypted:false
                              SSDEEP:192:58rJQaXoMXp0VW9FxWHxDSjENbx56p3DisuwAyHI:58r54w0VW3xWdkEFxcp3y/y
                              MD5:D2A38A463B7925FE3ABE31ECCCE66ACA
                              SHA1:A1824888F9E086439B287DEA497F660F3AA4B397
                              SHA-256:474361353F00E89A9ECB246EC4662682392EBAF4F2A4BE9ABB68BBEBE33FA4A0
                              SHA-512:62DB46A530D952568EFBFF7796106E860D07754530B724E0392862EF76FDF99043DA9538EC0044323C814DF59802C3BB55454D591362CB9B6E39947D11E981F7
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                              Category:dropped
                              Size (bytes):106496
                              Entropy (8bit):1.136413900497188
                              Encrypted:false
                              SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                              MD5:429F49156428FD53EB06FC82088FD324
                              SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                              SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                              SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                              Malicious:false
                              Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                              Category:dropped
                              Size (bytes):40960
                              Entropy (8bit):0.8553638852307782
                              Encrypted:false
                              SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                              MD5:28222628A3465C5F0D4B28F70F97F482
                              SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                              SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                              SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                              Category:dropped
                              Size (bytes):106496
                              Entropy (8bit):1.136413900497188
                              Encrypted:false
                              SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                              MD5:429F49156428FD53EB06FC82088FD324
                              SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                              SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                              SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                              Malicious:false
                              Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                              Category:dropped
                              Size (bytes):98304
                              Entropy (8bit):0.08235737944063153
                              Encrypted:false
                              SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                              MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                              SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                              SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                              SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                              Category:dropped
                              Size (bytes):196608
                              Entropy (8bit):1.121297215059106
                              Encrypted:false
                              SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                              MD5:D87270D0039ED3A5A72E7082EA71E305
                              SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                              SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                              SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                              Malicious:false
                              Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                              Category:dropped
                              Size (bytes):196608
                              Entropy (8bit):1.121297215059106
                              Encrypted:false
                              SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                              MD5:D87270D0039ED3A5A72E7082EA71E305
                              SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                              SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                              SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                              Malicious:false
                              Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Users\user\Desktop\Cheat.exe
                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                              Category:dropped
                              Size (bytes):51200
                              Entropy (8bit):0.8746135976761988
                              Encrypted:false
                              SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                              MD5:9E68EA772705B5EC0C83C2A97BB26324
                              SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                              SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                              SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                              Malicious:false
                              Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.42167132893872
                              Encrypted:false
                              SSDEEP:6144:fSSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNd0uhiTwj:pvloTMW+EZMM6DFy303w
                              MD5:CF3E17C22B183739BCCCF7759EAA4792
                              SHA1:7CBBEDE20C8DA06166A6E1A781D2FC2FE3DE640F
                              SHA-256:A3DBC7CC1AFAAA7C854137EEACC0B6921440767393D14074FA23929EAE5DC44F
                              SHA-512:386E03336B1343D2913E8AE538A8C7D2318A52200C96358BF751CB87D5EF429843B3DF81A52F2FB90B5DC8CFAB69116B9EFE96B24D502D1190FE141ACF943134
                              Malicious:false
                              Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...U...................................................................................................................................................................................................................................................................................................................................................a........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):5.799734603624767
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Win16/32 Executable Delphi generic (2074/23) 0.01%
                              File name:Cheat.exe
                              File size:310'784 bytes
                              MD5:74d3f720e38b834198fee67e020bb736
                              SHA1:5fab6ccb0748a2de502b877c34d2409b1118bd30
                              SHA256:bc3a66a87018863d22a6a7a9afd15f0af5499d021f0ede01466011e0a64a0ce1
                              SHA512:f4ae410699ba0a4cc21fa946e51f5364ab13ac176627509a346bcb7924ae76b23149ba78f643211d64bc59d7eef81d304b477b3310d09eb797c07afdddee0277
                              SSDEEP:6144:b1E0T6MDdbICydeB1MnyCvG/9GzC6jmA1D0Lyf:b1z6yCvGFG+Y1D1f
                              TLSH:6D64490817F88A65F5BE9BBEC0B551608371B462B83FDB4E1EC560EA2D32350CE45B67
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....q..........."...0.................. ........@.. ....................... ............`................................
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x44adbe
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x92718E88 [Sat Nov 9 12:33:12 2047 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              adc byte ptr [ecx], dl
                              adc al, byte ptr [eax]
                              or byte ptr [edi], al
                              or dword ptr [esi], eax
                              or al, byte ptr [030C040Bh]
                              or eax, 0F010E02h
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax+eax], cl
                              or byte ptr [eax], al
                              mov word ptr [eax], es
                              or byte ptr [eax], al
                              dec esp
                              add byte ptr [eax], cl
                              add ah, cl
                              add byte ptr [eax], cl
                              add byte ptr [eax+eax], ch
                              or byte ptr [eax], al
                              lodsb
                              add byte ptr [eax], cl
                              add byte ptr [eax+eax+08h], ch
                              add ah, ch
                              add byte ptr [eax], cl
                              add byte ptr [eax+eax], bl
                              or byte ptr [eax], al
                              pushfd
                              add byte ptr [eax], cl
                              add byte ptr [eax+eax+08h], bl
                              add ah, bl
                              add byte ptr [eax], cl
                              add byte ptr [eax+eax], bh
                              or byte ptr [eax], al
                              mov esp, 7C000800h
                              add byte ptr [eax], cl
                              add ah, bh
                              add byte ptr [eax], cl
                              add byte ptr [edx], al
                              add byte ptr [eax], cl
                              add byte ptr [edx+42000800h], al
                              add byte ptr [eax], cl
                              add dl, al
                              add byte ptr [eax], cl
                              add byte ptr [edx], ah
                              add byte ptr [eax], cl
                              add byte ptr [edx+62000800h], ah
                              add byte ptr [eax], cl
                              add dl, ah
                              add byte ptr [eax], cl
                              add byte ptr [edx], dl
                              add byte ptr [eax], cl
                              add byte ptr [edx+52000800h], dl
                              add byte ptr [eax], cl
                              add dl, dl
                              add byte ptr [eax], cl
                              add byte ptr [edx], dh
                              add byte ptr [eax], cl
                              add byte ptr [edx+72000800h], dh
                              add byte ptr [eax], cl
                              add dl, dh
                              add byte ptr [eax], cl
                              add byte ptr [edx], cl
                              add byte ptr [eax], cl
                              add byte ptr [edx+4A000800h], cl
                              add byte ptr [eax], cl
                              add dl, cl
                              add byte ptr [eax], cl
                              add byte ptr [edx], ch
                              add byte ptr [eax], cl
                              add byte ptr [edx+6A000800h], ch
                              add byte ptr [eax], cl
                              add dl, ch
                              add byte ptr [eax], cl
                              add byte ptr [edx], bl
                              add byte ptr [eax], cl
                              add byte ptr [edx+00000000h], bl
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4ad6c0x4f.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x5f8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x500000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x4acd40x38.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x4b3b80x4b4007d0a3d2fd83873f64a13f230511d28d8False0.401999844269103data5.812727089799374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x4e0000x5f80x600921d375c8efa76f5064b2cab322a95ecFalse0.4381510416666667data4.2678145072196IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x500000xc0x200751451aa8e952786127ac5c993475faaFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_VERSION0x4e0900x368data0.4231651376146789
                              RT_MANIFEST0x4e4080x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              DLLImport
                              mscoree.dll_CorExeMain
                              TimestampSource PortDest PortSource IPDest IP
                              Aug 17, 2024 15:49:52.466991901 CEST49704443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:49:52.467021942 CEST44349704188.114.97.3192.168.2.5
                              Aug 17, 2024 15:49:52.467150927 CEST49704443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:49:52.489664078 CEST49704443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:49:52.489675999 CEST44349704188.114.97.3192.168.2.5
                              Aug 17, 2024 15:49:52.955396891 CEST44349704188.114.97.3192.168.2.5
                              Aug 17, 2024 15:49:52.955703974 CEST49704443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:50:07.860034943 CEST44349704188.114.97.3192.168.2.5
                              Aug 17, 2024 15:50:07.860145092 CEST49704443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:50:15.352428913 CEST49704443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:50:15.352446079 CEST44349704188.114.97.3192.168.2.5
                              Aug 17, 2024 15:50:15.374984980 CEST49721443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:50:15.375068903 CEST44349721188.114.97.3192.168.2.5
                              Aug 17, 2024 15:50:15.375150919 CEST49721443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:50:15.375420094 CEST49721443192.168.2.5188.114.97.3
                              Aug 17, 2024 15:50:15.375447989 CEST44349721188.114.97.3192.168.2.5
                              Aug 17, 2024 15:50:15.758829117 CEST49721443192.168.2.5188.114.97.3
                              TimestampSource PortDest PortSource IPDest IP
                              Aug 17, 2024 15:49:52.452739954 CEST5265653192.168.2.51.1.1.1
                              Aug 17, 2024 15:49:52.461452007 CEST53526561.1.1.1192.168.2.5
                              Aug 17, 2024 15:50:10.659746885 CEST53603461.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Aug 17, 2024 15:49:52.452739954 CEST192.168.2.51.1.1.10x8e2bStandard query (0)freegeoip.appA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Aug 17, 2024 15:49:52.461452007 CEST1.1.1.1192.168.2.50x8e2bNo error (0)freegeoip.app188.114.97.3A (IP address)IN (0x0001)false
                              Aug 17, 2024 15:49:52.461452007 CEST1.1.1.1192.168.2.50x8e2bNo error (0)freegeoip.app188.114.96.3A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:09:49:50
                              Start date:17/08/2024
                              Path:C:\Users\user\Desktop\Cheat.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\Cheat.exe"
                              Imagebase:0x29b14490000
                              File size:310'784 bytes
                              MD5 hash:74D3F720E38B834198FEE67E020BB736
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_BlackGuard, Description: Yara detected BlackGuard, Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_44CaliberStealer, Description: Yara detected 44Caliber Stealer, Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000000.1986296648.0000029B14492000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_RagsStealer, Description: Yara detected Rags Stealer, Source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_44CaliberStealer, Description: Yara detected 44Caliber Stealer, Source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: INDICATOR_SUSPICIOUS_EXE_Discord_Regex, Description: Detects executables referencing Discord tokens regular expressions, Source: 00000000.00000002.2223511365.0000029B163C1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                              Reputation:low
                              Has exited:true

                              Target ID:4
                              Start time:09:49:51
                              Start date:17/08/2024
                              Path:C:\Windows\System32\WerFault.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\WerFault.exe -u -p 1864 -s 1568
                              Imagebase:0x7ff627100000
                              File size:570'736 bytes
                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: H\<&$gv]H$p\<&$x\<&
                                • API String ID: 0-2515355488
                                • Opcode ID: a9fc50ef8d17e9c58053a9378f38617113442fb5cb46e95bb92240b6d4169ae7
                                • Instruction ID: 72be6b3c175b4f0f40f7d5d9464f650b33a8af7505752e05281cfbd0097c41ca
                                • Opcode Fuzzy Hash: a9fc50ef8d17e9c58053a9378f38617113442fb5cb46e95bb92240b6d4169ae7
                                • Instruction Fuzzy Hash: 7841A03080E68A9FD715EBB894966FDBFB0EF06251F4444ABD489D72E2CB285896C704
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: H\<&
                                • API String ID: 0-3149693976
                                • Opcode ID: b0353e04e38838d563c30169d8e2b9694c8459654f49e930a9d2a1361cb92d3f
                                • Instruction ID: d5110d317c26ec26bb7f717eb21b910c24b1df5d9bbf64df38e5bb75bfb88d63
                                • Opcode Fuzzy Hash: b0353e04e38838d563c30169d8e2b9694c8459654f49e930a9d2a1361cb92d3f
                                • Instruction Fuzzy Hash: DAC1C470D0DA298FEBA4EB68D8557E8B7B1FF5A741F5000AAD00DE7292DB356981CF04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: H\<&$P\<&$P\<&$X\<&$`\<&$`\<&$h\<&$h\<&$p\<&$x\<&
                                • API String ID: 0-3190481975
                                • Opcode ID: c028c8af62e754004f3734fbf83c72969dd9eb1840db19128997199c641c1b07
                                • Instruction ID: 63995983580ed66ce89353db0a675487a13c209f82a146210bd1d1367d9df512
                                • Opcode Fuzzy Hash: c028c8af62e754004f3734fbf83c72969dd9eb1840db19128997199c641c1b07
                                • Instruction Fuzzy Hash: BD81042590F5C95FD712A7B898A96E9BFE0EF47211F0842EBE089CB2E3DE081552C305
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: H\<&$P\<&$P\<&$X\<&$`\<&$`\<&$h\<&$h\<&$p\<&$x\<&
                                • API String ID: 0-3190481975
                                • Opcode ID: b0057307aa376fa1930005c29b6d8bdc16037820bb9b7065512b51e95ced24fc
                                • Instruction ID: a5c4a1479f19544cd2f4f92610a3a14050f4fe8360fcbec919fd0492fcf191dd
                                • Opcode Fuzzy Hash: b0057307aa376fa1930005c29b6d8bdc16037820bb9b7065512b51e95ced24fc
                                • Instruction Fuzzy Hash: A481072590F6C95FD712A7B854A96E9BFE0EF47210F0841EFE089DB2E3DD081556C705
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: PNH$PNH$PNH$PNH$\<&$\<&
                                • API String ID: 0-3266589674
                                • Opcode ID: 20931878cd02f03d15f9c0d2e3be8020f16a5003fb5ec5e30a2346f621569cf4
                                • Instruction ID: dbd985047c45a37cd21bee992ce1cecea067e6c70b503fb7d56a0ad9ec38b27a
                                • Opcode Fuzzy Hash: 20931878cd02f03d15f9c0d2e3be8020f16a5003fb5ec5e30a2346f621569cf4
                                • Instruction Fuzzy Hash: 4A511470D0D65D8FEB99EBA884563ECBBB1FF19700F0440AED04DA7682CB385984CB55
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: H]<&$H]<&$`\<&$L_^
                                • API String ID: 0-3815555753
                                • Opcode ID: fa07e9f35876672ea42a6727b8301ba86c1ab8273f58feb682380b6f1145e3e4
                                • Instruction ID: 8ae27d59e1c84bb46fa774f5069e3914a0687eeeb2bc31d7f3c6c88644f34d4a
                                • Opcode Fuzzy Hash: fa07e9f35876672ea42a6727b8301ba86c1ab8273f58feb682380b6f1145e3e4
                                • Instruction Fuzzy Hash: 9F71B030D0EA8D8FDB55EBA8D855AEDBBF1FF59300F0401AAD049EB292CB346841CB54
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: (]<&$8]<&$x9<&
                                • API String ID: 0-2918079463
                                • Opcode ID: 03e735ca6c9d4ab4441bc7ba55cebc1b4ef68d56110cf56dc45524e72616107a
                                • Instruction ID: baec156066e5ffb1b79be232fe3fab9134596968cdd83e1bea9e3b116ce69333
                                • Opcode Fuzzy Hash: 03e735ca6c9d4ab4441bc7ba55cebc1b4ef68d56110cf56dc45524e72616107a
                                • Instruction Fuzzy Hash: 1F713D70909A5D9FDB94EBA8C495BADBBF1EF59300F1441AAD04DE7292CB34AD81CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: ]<&$8]<&$@]<&
                                • API String ID: 0-3841390179
                                • Opcode ID: badc059aa631678d27979439002dcc56feae5017cd14e23e15c26e8b31c931dc
                                • Instruction ID: 10eaf0db702e4c32526f834a1c518be55c684ba928d7ef1d515f13756e1f657d
                                • Opcode Fuzzy Hash: badc059aa631678d27979439002dcc56feae5017cd14e23e15c26e8b31c931dc
                                • Instruction Fuzzy Hash: 15717D7090EA5D9FDB55EB64C495AEDBBB1EF19300F1401BAD04AEB291CB346985CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: PNH$PNH
                                • API String ID: 0-3993136670
                                • Opcode ID: e00ebb28a3576183d2f439633bb4bd38c3d50925a48916ccd1b2cf4c8779827c
                                • Instruction ID: 80ff29d3c9fbd9d603ff86d8af2a0a43dbd204be048733d9c360b044b0348947
                                • Opcode Fuzzy Hash: e00ebb28a3576183d2f439633bb4bd38c3d50925a48916ccd1b2cf4c8779827c
                                • Instruction Fuzzy Hash: FE619170D0892E8EDFA8EB58C855BA8B7B1FF68341F1041BAD00EE3691DB7569C48F04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: `\<&$L_^
                                • API String ID: 0-108588435
                                • Opcode ID: a44415df8e6080d02624dc793805431ab5dab9cf642bea9c7ad5e84bfa50d1b4
                                • Instruction ID: ed36c0659084a5e33a4a42a2f05d9a32bb05a12a310e14c2fb19f2906ceac086
                                • Opcode Fuzzy Hash: a44415df8e6080d02624dc793805431ab5dab9cf642bea9c7ad5e84bfa50d1b4
                                • Instruction Fuzzy Hash: CE411231D0E9D98FD751EB68A8652FDBBB0FF8A310F0801BBD048D7192DB282945C755
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: P]<&$P]<&
                                • API String ID: 0-3734527301
                                • Opcode ID: 4e1e2ea1c933230a97c27192dc8a89a0bf04108c26c0f99e0ead501119fa13f8
                                • Instruction ID: 47819017bc9462ddce5bbd8f61b9e4f55e943697cc2a97c56e2c2b64fdb10a4c
                                • Opcode Fuzzy Hash: 4e1e2ea1c933230a97c27192dc8a89a0bf04108c26c0f99e0ead501119fa13f8
                                • Instruction Fuzzy Hash: F8411570A09A4D8FDF85EBA8C4859EDFBB1FF59340F14516AD00EE7295DB34A842CB50
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: 7<&$7<&
                                • API String ID: 0-1216277236
                                • Opcode ID: 72cf2613591182e46c5ae1a155f0d4b0774471db6cf70642ac718d39bff10b29
                                • Instruction ID: 55b77a9317771ce9935a9d5bdbc1e875e242b1b7f98231a33f7cef074d04e76c
                                • Opcode Fuzzy Hash: 72cf2613591182e46c5ae1a155f0d4b0774471db6cf70642ac718d39bff10b29
                                • Instruction Fuzzy Hash: 1C11AB3080E6CD9FE742EB78C855AA57FF0EF5B240F0404EBE499C7292C6395956C751
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: #$(_<&
                                • API String ID: 0-2804108705
                                • Opcode ID: b5f19f84068afc7b71c739e305cb3521472820f9c142ee6c131592dcf4d25b65
                                • Instruction ID: 696be5472737c0a8686cf857c497b2d78661061dbefa964bb19060464f587059
                                • Opcode Fuzzy Hash: b5f19f84068afc7b71c739e305cb3521472820f9c142ee6c131592dcf4d25b65
                                • Instruction Fuzzy Hash: 0C110671D0E989AFE309B77458591F9BBA0FF56280F4801EBE408C30D3DE24199A8349
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: 9<&
                                • API String ID: 0-2702910315
                                • Opcode ID: 82e9577534c3985e249963e5b0afa5f3e3b3af257059844cd9cd5a314b795cda
                                • Instruction ID: 2a4bf4b7c41862983cb93853bb23e48ed75b123ecde8a150cfada31878548c17
                                • Opcode Fuzzy Hash: 82e9577534c3985e249963e5b0afa5f3e3b3af257059844cd9cd5a314b795cda
                                • Instruction Fuzzy Hash: 45F13470D0995D9FDB95EB688899BEDBBF1EF59301F4041EAD04DE3292CB346981CB40
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: PNH
                                • API String ID: 0-872267368
                                • Opcode ID: 447020c78e5eb91eefcd7037f2840f8e532b07e76ab0ce091b5956a0096fdf59
                                • Instruction ID: d9c7bbe5f7d0cfc79629d7ba682a41d239a944be5e0102572d224c060e33009e
                                • Opcode Fuzzy Hash: 447020c78e5eb91eefcd7037f2840f8e532b07e76ab0ce091b5956a0096fdf59
                                • Instruction Fuzzy Hash: 0AA12670D08A1D8FEBA8EB68C8417EDB7B1FF59351F5001AAD40DE7291DB38A985CB44
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: 6<&
                                • API String ID: 0-2856805462
                                • Opcode ID: 90019426c52413ee20e4d6bd93ac9259bf901a7b27bff0f4cf2d8b71a41a4561
                                • Instruction ID: 314ea22ebfa13c5fc5e10b58c0b3f93954d5824699fee39b4b29f48aae655ac2
                                • Opcode Fuzzy Hash: 90019426c52413ee20e4d6bd93ac9259bf901a7b27bff0f4cf2d8b71a41a4561
                                • Instruction Fuzzy Hash: 0EA1AE30C0E6999FEBA5EB6888556E9BBB0FF15341F5001EAD04D972D3DF386986CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: 9<&
                                • API String ID: 0-2702910315
                                • Opcode ID: d9f12e75c0b98916834d23e3388957e5af2ec4932a3638e43b30a3b76fb75ebc
                                • Instruction ID: 004e391aa0740bcdd33156ff240d4afc468db2b9ff0dcf8ce1bd1235ddcf220c
                                • Opcode Fuzzy Hash: d9f12e75c0b98916834d23e3388957e5af2ec4932a3638e43b30a3b76fb75ebc
                                • Instruction Fuzzy Hash: 9C514870D0EA5D9FDB90EBA8C4556FEBBF1EF58300F14416AD409E7296CB345881CB84
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: PNH
                                • API String ID: 0-872267368
                                • Opcode ID: 78c12f4d4e80a3e0f9edac482667c27994e9010356bf12ee6f88f39e680055db
                                • Instruction ID: 8065707c18d50ac8f56fcbdb8fa555af3689c859448bcd7bc05375295f17b764
                                • Opcode Fuzzy Hash: 78c12f4d4e80a3e0f9edac482667c27994e9010356bf12ee6f88f39e680055db
                                • Instruction Fuzzy Hash: C9519F71C0DA599FDB59EBA8D4957ECBBB0EF49310F0441BEE08997291CB382886CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: (:<&
                                • API String ID: 0-3435185289
                                • Opcode ID: b876d0a0ca0c5ea8cd28f9e3d7af298aaaf2a65b8d13b54e2b802877d93e4056
                                • Instruction ID: 262d08e0a455e1aad3822cd74a6ec9958b14d328e1c88b94d7002c76d02acca7
                                • Opcode Fuzzy Hash: b876d0a0ca0c5ea8cd28f9e3d7af298aaaf2a65b8d13b54e2b802877d93e4056
                                • Instruction Fuzzy Hash: 4C411170919A5D9FDB94EFA8D4546EEBBF0FF58341F40047AE009E3295DB386A81CB80
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: \<&
                                • API String ID: 0-1160666100
                                • Opcode ID: d65afbda21bad8c2c0ec64776e4562b9930947e6e26ee3b23a7f52ad45f00d29
                                • Instruction ID: 0569b9c6c3936286c42e3cd0f0eae7b96aab5b3f6bf7fa7145d88b423e8ecbba
                                • Opcode Fuzzy Hash: d65afbda21bad8c2c0ec64776e4562b9930947e6e26ee3b23a7f52ad45f00d29
                                • Instruction Fuzzy Hash: 3C31C560C1FAC96FE316A7B804566EEBFE0EF06240F5845EBE489CB1D3DE1C25868315
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: 7<&
                                • API String ID: 0-2877623905
                                • Opcode ID: 2b204e11c5bf3d1befa02678607eba650cae62012aaf0fe9269cabd9e40e189d
                                • Instruction ID: ca31ceb8d2e99bcea035eddaf3213de0602b6de99582fd37cd197640970957bc
                                • Opcode Fuzzy Hash: 2b204e11c5bf3d1befa02678607eba650cae62012aaf0fe9269cabd9e40e189d
                                • Instruction Fuzzy Hash: A201817080E68C9FD785EF2898996A9BFE0FF59300F4405EAE448C72D2DB349999C741
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: PNH
                                • API String ID: 0-872267368
                                • Opcode ID: cb7baf739b273cfdb65af2eec902f7768b04b6822504fd68294e96768428ef76
                                • Instruction ID: 5b73fa4f367cac2b1b1ecd6b29852c6703298b7aff2ac404af418b5b69f59249
                                • Opcode Fuzzy Hash: cb7baf739b273cfdb65af2eec902f7768b04b6822504fd68294e96768428ef76
                                • Instruction Fuzzy Hash: AFE0DF93C0E9D55FE2A6737928672B4AFD0EF0A550F0C50FAD5888B693DA680CC68345
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: PNH
                                • API String ID: 0-872267368
                                • Opcode ID: a35abaff44c09b36828da62a9fe5fb0521a868c80f754862e4c4816f1286a199
                                • Instruction ID: 6bf9b30fb5dcd80f18731a0afa7bd2d8eb23194777e26146da5c46384b30cc85
                                • Opcode Fuzzy Hash: a35abaff44c09b36828da62a9fe5fb0521a868c80f754862e4c4816f1286a199
                                • Instruction Fuzzy Hash: 94E0C252D0E8955FE6A6737929672A5AFD0DF0A110F4D61FAE888CB193D9280CD34385
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: 0_<&
                                • API String ID: 0-393327154
                                • Opcode ID: ff2847a01ccdf8b27c6082831849c383a40cef25884e4a3c314eb8e1f70d8c8e
                                • Instruction ID: 3300b604c7eb96fa8a799c8dda31dcd8af7045626bb6abf533a96b063860a4f7
                                • Opcode Fuzzy Hash: ff2847a01ccdf8b27c6082831849c383a40cef25884e4a3c314eb8e1f70d8c8e
                                • Instruction Fuzzy Hash: A9E09271A0B84D8FE799DB2884962E8BBF1FF4A310F4002EAC049C7251CA241981CB00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 093bc4be523779b5596d90b49d1941f6cca7322d6ce7f6a5e0ff792b692b60bd
                                • Instruction ID: 55151c0efde8506992e505748633a09933834bb8c08f45f9f337c4f42de2c21e
                                • Opcode Fuzzy Hash: 093bc4be523779b5596d90b49d1941f6cca7322d6ce7f6a5e0ff792b692b60bd
                                • Instruction Fuzzy Hash: B1F1253180E68A4FE751EB7898655E9BFB0EF46350F1841FBD048DB1E3DB28A84AC355
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7421ba877f9d840543ebe85d8ea46d33b976dccd90576fb9033f83b83d604319
                                • Instruction ID: 4db609740ff23423af3f47f1156095635f7ca2195c13c83e68d1d9c625d90d45
                                • Opcode Fuzzy Hash: 7421ba877f9d840543ebe85d8ea46d33b976dccd90576fb9033f83b83d604319
                                • Instruction Fuzzy Hash: 12F14930D0961D8FDB98EF68C494AADB7B1FF58301F2045BAD40EE7296CB35A981CB54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d2ae2f57d1fae88bbc8447ac4e13509300f7d985b6ad1f716e5bef51440b4d01
                                • Instruction ID: e8fe3882b5756018ab52c69ff211731869812409575dff6eedd67905c3894bb0
                                • Opcode Fuzzy Hash: d2ae2f57d1fae88bbc8447ac4e13509300f7d985b6ad1f716e5bef51440b4d01
                                • Instruction Fuzzy Hash: A191C232D0E5DA8FE756B7A8B8151F97F60FF62360F4901BBD0888B1E7DE1869058349
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8af1010bad7342fdbead143a418d2cb8d730c55bab61f67440d149248233947f
                                • Instruction ID: 6533fd03a37c5648a57b7540d75dae2e24fe4a8abbdb7c6e81685e81c8887973
                                • Opcode Fuzzy Hash: 8af1010bad7342fdbead143a418d2cb8d730c55bab61f67440d149248233947f
                                • Instruction Fuzzy Hash: 8281B571D1D92D8EEBA8EB6888557FCB6B1EF59341F5010BAD00DE3292CB386981CF44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a7ccbd7cf9bf720d104eb592d1c00d3506b667c84b37e4d4b23df351814391f0
                                • Instruction ID: c0f46d01747bdb4feaedd788335d0f0456c86728f86dc2d31a16c6df40943a71
                                • Opcode Fuzzy Hash: a7ccbd7cf9bf720d104eb592d1c00d3506b667c84b37e4d4b23df351814391f0
                                • Instruction Fuzzy Hash: A1511771D0CA5D8FEB98EF68C8557ACBAF1FB69340F10106AD04DE3291CB786885DB48
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 33c6310418b2a4f8e3a89a22953e49bdb109324847fd7b148f6ea9be07beb3dd
                                • Instruction ID: 063877401c5ab8dd0d3aa7a95633a3250a7b8f859cb2c07dee7296f92d3595b0
                                • Opcode Fuzzy Hash: 33c6310418b2a4f8e3a89a22953e49bdb109324847fd7b148f6ea9be07beb3dd
                                • Instruction Fuzzy Hash: 54412831F0D95A0FF398E76C64113B967D2EF98B94F08017AD00DD72C6DE695D424399
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f8cef7a51733712ee55d8935a7641591f576b82f9e860307b6abcaa1f7b51345
                                • Instruction ID: 36211e8cb0d57228fbd71cbfed1a2fffcaceb963ba69d4cc394d421c054aecca
                                • Opcode Fuzzy Hash: f8cef7a51733712ee55d8935a7641591f576b82f9e860307b6abcaa1f7b51345
                                • Instruction Fuzzy Hash: 8D41AB3090D94C8FDB94EBA8D856AEDBBF0FF69311F4401AAD049E72A1DB34A881C744
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fa48917d5465b63ef4a27fbc43fc7e81c93c016b2ac22c1ad8b530fa589ca80c
                                • Instruction ID: 7fa824d9f7588db0702af4999c4260dfb29720c9c2a14acf46f8926016337256
                                • Opcode Fuzzy Hash: fa48917d5465b63ef4a27fbc43fc7e81c93c016b2ac22c1ad8b530fa589ca80c
                                • Instruction Fuzzy Hash: 8F416D70919A8E9FDB84EF58D4547EEBBB1FF58300F10017AE409D7296DF38A8518B54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c91edc2df5e5e73a76a7016bc5308a756f9b4ce8ef7e8b19aad8bcf3d66da599
                                • Instruction ID: 670bb159bbd0d41c5d592778de876a6b7dab28f00dbeb7abe762cfd0d5a2f40e
                                • Opcode Fuzzy Hash: c91edc2df5e5e73a76a7016bc5308a756f9b4ce8ef7e8b19aad8bcf3d66da599
                                • Instruction Fuzzy Hash: F8412B70919A4E9FDB88EF58D4556EEBBB1FF98300F10017AE409D3296DF38A8518B54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: de8dcf6db7b51043bbff247ad9c66056d75a48416e9aa356aa47915aae35f948
                                • Instruction ID: 201e07b8691aa325dce0d96dfca55b09f588ebfb3d685ac91c64edcf73c74afa
                                • Opcode Fuzzy Hash: de8dcf6db7b51043bbff247ad9c66056d75a48416e9aa356aa47915aae35f948
                                • Instruction Fuzzy Hash: 33415B31D1E98A8EE746B7A8A8211FDBBA0FF66250F4505BAD048D71E3CE692D04C718
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6d724831ed8da9eb179c6f03e372d62413a5f71f4c13d7bf7617c9116af8b09a
                                • Instruction ID: 3018dabfcc2ca3888882d5ebfee51d3a0cbd323c7615976733c614ae7cf85b60
                                • Opcode Fuzzy Hash: 6d724831ed8da9eb179c6f03e372d62413a5f71f4c13d7bf7617c9116af8b09a
                                • Instruction Fuzzy Hash: 62417F35D0E51ECEEFA4EB58A8412FCB3A2FF55781F50117AD00EA62C1DF3969458B48
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7081844d26a48d5380c767cf71891ddef1a1eee7feb2d6a619319e34d77a7f88
                                • Instruction ID: b8b6b821823aeccf9c1fd690554b00fb01355b821525443906e42820a4cfdb6c
                                • Opcode Fuzzy Hash: 7081844d26a48d5380c767cf71891ddef1a1eee7feb2d6a619319e34d77a7f88
                                • Instruction Fuzzy Hash: F8413471E0CA5D8EEB94EF6898653BC7AB1FF5A341F00106AD00DD32D2CB786944DB49
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 72c877090f9d441b2fe15401d54864a78302ba3d10c782c5424b889a8b63ae5b
                                • Instruction ID: 3a8ba292b3720168ff3a2a7483c7eab361148b5c586201979e0949f971e80924
                                • Opcode Fuzzy Hash: 72c877090f9d441b2fe15401d54864a78302ba3d10c782c5424b889a8b63ae5b
                                • Instruction Fuzzy Hash: 1941FB70A18A4E9FDB88EF58D4547EEB7B1FF98301F10057AE409E3295DB34A8518B54
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a4b13d2f99a9b1dc55ecde7b55daeb0ab1b1c3f95cad537a25b630c5d03a5e39
                                • Instruction ID: 930dd4f0dd97a3d7c1ff74ac4e8e84d7455efe981f5d6021fac26352cd80bc17
                                • Opcode Fuzzy Hash: a4b13d2f99a9b1dc55ecde7b55daeb0ab1b1c3f95cad537a25b630c5d03a5e39
                                • Instruction Fuzzy Hash: 3D41257188E6C99FD712AB246C124E2BFB4DF02364F0901EBD04CCB0D2DA2D5696CB55
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 4f6686213df063f5c712cab40a43385c8ae2117bba8a1d31e53936be6bf916f9
                                • Instruction ID: cbab3eaaf94bc7e5a2674b63f9625e69dffd30c4a4d167573b195275356c5b61
                                • Opcode Fuzzy Hash: 4f6686213df063f5c712cab40a43385c8ae2117bba8a1d31e53936be6bf916f9
                                • Instruction Fuzzy Hash: 60317C73B1D15595E31077ACF8968EA7714FF917B6F040337E1488F093DE0C545A86A8
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 44593e46b6f81874b9995a76f7e1703af2b3791fab71b98106b867322afc30d7
                                • Instruction ID: 4d71eb03537f7cd0801a8584084762c63a616aa3fba20d234b4ec9936e22157d
                                • Opcode Fuzzy Hash: 44593e46b6f81874b9995a76f7e1703af2b3791fab71b98106b867322afc30d7
                                • Instruction Fuzzy Hash: 81319C35D2DA4E8EEB64AB5494213FDB3A0FF41381F00067BD45E971C2DF396A098689
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a753ea85f10e183fc168eff9e9f1d56f49975c3a76e8a69c1735b3e62a72226d
                                • Instruction ID: 87e06404c3580028548621ca7cb1e5f0d87e07e382572794fe1a17c5b4566e79
                                • Opcode Fuzzy Hash: a753ea85f10e183fc168eff9e9f1d56f49975c3a76e8a69c1735b3e62a72226d
                                • Instruction Fuzzy Hash: 2631D23180968A8FD765DF2898593ADBFB0EF06351F4405EFE048DB1D2DB355985CB41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 69b5efeed5515247d8f80a65827c1c3eb2971320acf25744b399c024fa8428ce
                                • Instruction ID: fb638d9984f06e7f2067b7739d0ad72c31160861cc07103015803fdcae59db21
                                • Opcode Fuzzy Hash: 69b5efeed5515247d8f80a65827c1c3eb2971320acf25744b399c024fa8428ce
                                • Instruction Fuzzy Hash: 4731933480E5C66FD353A7B8885A6A97FE0EF0B600F1804EBD4C5CB2A3CA281557C751
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 50b432c150197bdad510feedf8edeaac84e1d5c5ebe59cb728f6405e373f93e5
                                • Instruction ID: 70aaf44e9a77e3218963c70b5d698aafb2b2f79bd26a1fd28fd402f3f4c6b49c
                                • Opcode Fuzzy Hash: 50b432c150197bdad510feedf8edeaac84e1d5c5ebe59cb728f6405e373f93e5
                                • Instruction Fuzzy Hash: E631AC71E1C61D8EEB24EB94D811BFDB760EF40351F0001BBD45EA62C1DF382A988B85
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dc9b5480df2138a97637d461b7c65ac7e2164a4ac11f001517739426f3dd6a00
                                • Instruction ID: 3b1410892614a91c5e3f4871d490b2e12b9702a79c80f8c3a0b6a87d7e7aa4c3
                                • Opcode Fuzzy Hash: dc9b5480df2138a97637d461b7c65ac7e2164a4ac11f001517739426f3dd6a00
                                • Instruction Fuzzy Hash: FB317831C0DA4D8FDB85EBA8D8542ECBBB1EF5A340F5440BAC008E7292DB38A955CB14
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 11fa3e627ac5307ceaa1e788681c54e8ca2278208ee12632750971ac33d2d4c9
                                • Instruction ID: 6fafa892bac5440fdc4bb2bcc0de5b9e907fbc1495ee81863bc2605d3d83399c
                                • Opcode Fuzzy Hash: 11fa3e627ac5307ceaa1e788681c54e8ca2278208ee12632750971ac33d2d4c9
                                • Instruction Fuzzy Hash: 5B21C73050D5454FEB55AB6884859B67B90EFA5310F2842BAD4489B1EBDA39E882C385
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a67932c5ff5d8e7cd8d30dc6b0079d8053881dafced3e0de4c2cf0d02871ef2e
                                • Instruction ID: cac006b3fc057e7ee4bd332e399f45a1956930395c3091e43be09306ed682fb8
                                • Opcode Fuzzy Hash: a67932c5ff5d8e7cd8d30dc6b0079d8053881dafced3e0de4c2cf0d02871ef2e
                                • Instruction Fuzzy Hash: C4310371D09A6D8EDBA4EF68D8487E9B7F0FB58341F4041EAD00DE3291CB386A858F40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 99184f460f40c6032eeed10619ead9c4377c2e34f6e880a90137aa09ab590e4a
                                • Instruction ID: 8231960359332a417891dceb6335e6cfc50b2b4002a2d4b3e63af4965792519a
                                • Opcode Fuzzy Hash: 99184f460f40c6032eeed10619ead9c4377c2e34f6e880a90137aa09ab590e4a
                                • Instruction Fuzzy Hash: 3E21953490A54D5FC751EB68C495AADBFF1FF4A310B0486DAD489DB362CA34AC96CB40
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a858db1d2b3769e639e308c6d2a2cc55b6c955b86a1f962d088549b360e94a30
                                • Instruction ID: 6333694945a9adb72c009d87bf93578fa98dfdc41f65482d3e5dbfaed33d41fb
                                • Opcode Fuzzy Hash: a858db1d2b3769e639e308c6d2a2cc55b6c955b86a1f962d088549b360e94a30
                                • Instruction Fuzzy Hash: F9216231D0EA1A8EEB65EB15D4027FD73A0EF54380F0145BAD40EA31C1DF3869859B95
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 338e2546bbe3824b79bf54e61e93dd318da1d22cc36cc3d882a3ed391993cedd
                                • Instruction ID: 7a06acb9e3a1a44f5f14fb7fd3712996eb72934d66f0f51e0769495794590a21
                                • Opcode Fuzzy Hash: 338e2546bbe3824b79bf54e61e93dd318da1d22cc36cc3d882a3ed391993cedd
                                • Instruction Fuzzy Hash: 7321A431D0EAC98FE356A778A8251B97FA0FF63251F4901FBD084CB1E7CA581905C705
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ae06e3b38466a0e2293920186852ec498946501a933910c322fd113edfd23e55
                                • Instruction ID: d73af20c0b73d39fcc6105610e8f20d0a117e8c6283b9893257e4dc481f61bc9
                                • Opcode Fuzzy Hash: ae06e3b38466a0e2293920186852ec498946501a933910c322fd113edfd23e55
                                • Instruction Fuzzy Hash: 24218EB188E2C15FD71757302C674E27FA89F03269F0A01E7E0988A8D3C65D6297C3A6
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ba19c2cadfcffe1978b3d94708f8b8d4ef515487eec20806907f1acd7e22a969
                                • Instruction ID: b3c0e3ccf4c524d5f0a4c3dbfe81c583f41f904a61f38e192a1c684ecd0e9359
                                • Opcode Fuzzy Hash: ba19c2cadfcffe1978b3d94708f8b8d4ef515487eec20806907f1acd7e22a969
                                • Instruction Fuzzy Hash: 6011013684E68E4FDB12BB3058550EA7FA4EF02390F0506B7E85CC70C2EB299559C355
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f67aac7c00056f3e92a73d24aa6f87d01c44ca31f9629d82a5d30261d0c4f004
                                • Instruction ID: 9e7d04af7f0e1bcb140871e9b593f7dd4bdcb4f06697ac031ba91dca9eb8d881
                                • Opcode Fuzzy Hash: f67aac7c00056f3e92a73d24aa6f87d01c44ca31f9629d82a5d30261d0c4f004
                                • Instruction Fuzzy Hash: CC214774909A5D8FDB90EBA884597EDBBF0FF59301F5481EAD04DE3292CB345985CB00
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 36f7f9b3099f16f7f4732a5070c3768cdf276d32e403b8e493bb457b403deb3f
                                • Instruction ID: 94b49c412ae10b0e5641ccb2b1dada56031cd5ec41a874c100455d1722fbd501
                                • Opcode Fuzzy Hash: 36f7f9b3099f16f7f4732a5070c3768cdf276d32e403b8e493bb457b403deb3f
                                • Instruction Fuzzy Hash: B011E03184EA899FD766BB3448AA0E97FA0FF43700F0409FBE088975D3EB589419C742
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e458e0209b784ea39843e194db15287f2a865cfc5b38d99f1384e339a82db190
                                • Instruction ID: 4873c2de2ed417f89ae7e3051c50674d5eac92b145dd543d315a4dc606636287
                                • Opcode Fuzzy Hash: e458e0209b784ea39843e194db15287f2a865cfc5b38d99f1384e339a82db190
                                • Instruction Fuzzy Hash: 8911AD3288E7C65FD703673018660E63FA4DF03390F0905F7E8888A4D3DA5D619AC366
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ccc0156cc91d1e2aa2d188f76db6a6a56683581010ac36897aa971a7026435ea
                                • Instruction ID: dd93bc7b2d573810dee3b3daaf64e034221318d354e99e9c65821d0a4e7e7475
                                • Opcode Fuzzy Hash: ccc0156cc91d1e2aa2d188f76db6a6a56683581010ac36897aa971a7026435ea
                                • Instruction Fuzzy Hash: AB11E560A0EAC91FD751E77C48A92E9BFE1DF0B110F0846FBD0C9CB2A2CA2418578704
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 34cc1b3c41dc66bf97db1929ad9cc3ffe394549a2c356f78ed6e79996155cffe
                                • Instruction ID: 5b23a3a449f1c3593b9a2a776c8a53421cf4768bd85ce7b6d34f96f53148fb7f
                                • Opcode Fuzzy Hash: 34cc1b3c41dc66bf97db1929ad9cc3ffe394549a2c356f78ed6e79996155cffe
                                • Instruction Fuzzy Hash: BC015A61A1E7C61FD353A77848A52A57FB1DF471A0B1D05EBD0D9CB0E7C918184BC322
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 06731c50d0fdf73dc0e56827a09fb8316b7270d186d11accbd2d8312dc5d34f5
                                • Instruction ID: c0db23d5fd624ee68bd4e7656fe112559966677620e63cf084fb6d9a3d573df8
                                • Opcode Fuzzy Hash: 06731c50d0fdf73dc0e56827a09fb8316b7270d186d11accbd2d8312dc5d34f5
                                • Instruction Fuzzy Hash: 9D019231D0D79ACEEB52EB1588126ED7BB0AF06390F0501B7D04EA71C3DB381989CB51
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d834a000719966081e34f65a73222c79c8466859744ddd0b4b441b7e9abb0267
                                • Instruction ID: 27e734c428b1a5bad8e0f0a98b2b15c093482027be783ab4e42cbb7df959a420
                                • Opcode Fuzzy Hash: d834a000719966081e34f65a73222c79c8466859744ddd0b4b441b7e9abb0267
                                • Instruction Fuzzy Hash: 4E11B7709095198FEB98EB68C895BA9B7B1FF49305F5041EAD40EE7291CF346982CB05
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 088f0fa2e3b0a30a9dd1aeaf7d0b83a7966dd69fe6d666819b3b52eabb07f7fe
                                • Instruction ID: 6d7116a2f2e46782af5786d64ae1c7fe8cf953eed5378b441ab68a3acfa01391
                                • Opcode Fuzzy Hash: 088f0fa2e3b0a30a9dd1aeaf7d0b83a7966dd69fe6d666819b3b52eabb07f7fe
                                • Instruction Fuzzy Hash: 68010871E1D529CEDB54EB44C460BFDB770EF45341F1040BAD04EA62C5CB382A88DB44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 706605f111769fc41c2c2910fae305f3080d823dc74d438a21a7ed07b2dabc9c
                                • Instruction ID: aaed5fe2f4de4efa97d78098a9b90055b8c9583e3252fd416b27f86c248a9fdf
                                • Opcode Fuzzy Hash: 706605f111769fc41c2c2910fae305f3080d823dc74d438a21a7ed07b2dabc9c
                                • Instruction Fuzzy Hash: 3901A97091E98DAFD741FB7584555EDBFE0EF16241B1401EBD489C7193CE28A8828740
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8584c188bffb87b101fe8a1c076f9e9dc5b52b79ac07c8e1c61bf22ba20b53d9
                                • Instruction ID: 34220d7df66d4814fa0581f990fc8a34b48790a7c4d065b8982742e25cbc79f5
                                • Opcode Fuzzy Hash: 8584c188bffb87b101fe8a1c076f9e9dc5b52b79ac07c8e1c61bf22ba20b53d9
                                • Instruction Fuzzy Hash: B301F270E1D82D8EEB94EB54C851BFCB7B0EF54340F0040BAD00EA2286CF782A888B44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e6a9386dfcd609d2247d9886ac4fcf6d41c0dc754fe3037bfb0ab7db83cc4ae8
                                • Instruction ID: b1196168d176111c6377dfb7967a573c82ea6b862b80f35c17b2546bd31872e6
                                • Opcode Fuzzy Hash: e6a9386dfcd609d2247d9886ac4fcf6d41c0dc754fe3037bfb0ab7db83cc4ae8
                                • Instruction Fuzzy Hash: 80019D71D0861DCFCB58DFA8D480AEDB7B1FF49351F50506AE01AA3280DB39A885CF44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d1e0dfd2a14876893dbbf95243366a200a57786822df0b7320fae4999f0f1296
                                • Instruction ID: 64dc6c3d2eb95835527eca97a31e7868f5c947a4a41e1e0f197517a1696f35fc
                                • Opcode Fuzzy Hash: d1e0dfd2a14876893dbbf95243366a200a57786822df0b7320fae4999f0f1296
                                • Instruction Fuzzy Hash: 96F0543185E28A4FE715BB2088656F67B90FF46380F445AB7F40C860C3DF2CA2648745
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3788f3068713adc91d8fa37483e54ed95ce900dfecbc5de81a4a209b45c7c80a
                                • Instruction ID: 6713a8e3ac04b30a3b8ae8c2080036e9128dfb63246b96ef734db0332d39524d
                                • Opcode Fuzzy Hash: 3788f3068713adc91d8fa37483e54ed95ce900dfecbc5de81a4a209b45c7c80a
                                • Instruction Fuzzy Hash: 00F0E731D5992A8EEB64EB15C8417FDB2A0EF54380F4045B6D00EA21C2DB782A849F84
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 30d421574c360ca32cdbce19d3995933d97a66b5eddb3729060e5d84ce61347b
                                • Instruction ID: 4723234ec075c9b8a4d28477e041fbbf7f085f69c315c8cd99ebce7853c0a779
                                • Opcode Fuzzy Hash: 30d421574c360ca32cdbce19d3995933d97a66b5eddb3729060e5d84ce61347b
                                • Instruction Fuzzy Hash: BBF0F431E2962D8EEB64EB54D4517FDB374EF55340F404076D00EA21C2DF782945CB44
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dba0b6b29e130750f5011c4bd12a9546bcda01be1002a943cd6fbfd935b065d2
                                • Instruction ID: 056f5dd5a5d862c2122ba047d0a6df57538975f9443f75b497b1c60084ec849b
                                • Opcode Fuzzy Hash: dba0b6b29e130750f5011c4bd12a9546bcda01be1002a943cd6fbfd935b065d2
                                • Instruction Fuzzy Hash: 6FF0A751B1E6C61FD321A77888E52E97FA2DF47050F4C06EAD0D58B2A6DA1418438701
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 03aabbc75c622d6391d6026e5eee0005a38c3212c83d5e54abaf0d667f74fc86
                                • Instruction ID: c7d3ede8a5909259b9284c74bb89dd3cb2f60f7ff9861a5b06c5870a76c9acbc
                                • Opcode Fuzzy Hash: 03aabbc75c622d6391d6026e5eee0005a38c3212c83d5e54abaf0d667f74fc86
                                • Instruction Fuzzy Hash: 1EE09232C0C68D8FD716EF2459592E87F60FF01351F0802ABE448865C2EB69D228C742
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: c3e1b713317cb14128448c0e60691eb681d2782951d71cf4a7bba45cd2a13d6b
                                • Instruction ID: 14c7526d4ade09b688f780940bb98b9f66b3468c2ae26514563c4851237220e1
                                • Opcode Fuzzy Hash: c3e1b713317cb14128448c0e60691eb681d2782951d71cf4a7bba45cd2a13d6b
                                • Instruction Fuzzy Hash: EDC012B090A88C2FE741ABB4086A4EA7FE0DF4A20232889CAC4C6CF122C02488878304
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0870477d81d29d05b500630cf242df758ae3099261516303221db3ae05558bf6
                                • Instruction ID: 6cb1d3402fc097a4e1b47386e6fb5b1cb3782c1e89aac7a4132a15befcf27f13
                                • Opcode Fuzzy Hash: 0870477d81d29d05b500630cf242df758ae3099261516303221db3ae05558bf6
                                • Instruction Fuzzy Hash: 9FC04C31C4451D8EDB40EF94A8051FDB370FB45250F001527E41DD3591DB7295648645
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 094eec9ab18682803b7d8400c3fee4d5499d6c75d993d474c306238a4abf4acd
                                • Instruction ID: e4aecf1b1ca5164dc2a9be3654fbccf66cab37fbab00255e2810ff84a29752b7
                                • Opcode Fuzzy Hash: 094eec9ab18682803b7d8400c3fee4d5499d6c75d993d474c306238a4abf4acd
                                • Instruction Fuzzy Hash: 06311630E095298FCB95EF59C891AEDB7F1EF99340F1090AAC04DE7291CA346E85CF54
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2225737273.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff848f30000_Cheat.jbxd
                                Similarity
                                • API ID:
                                • String ID: !39$";9$#C9$$K9
                                • API String ID: 0-1489306562
                                • Opcode ID: 3b55ea2de4759b4f893210c5807808fb01b13b1e8bf104bfc0f684c62f98f10c
                                • Instruction ID: 3793b62b06ed25f807db31ea328a0a32379da88d9737704ed8c60ca9eaadb000
                                • Opcode Fuzzy Hash: 3b55ea2de4759b4f893210c5807808fb01b13b1e8bf104bfc0f684c62f98f10c
                                • Instruction Fuzzy Hash: F6E0860BB3782942940432ADF4000E96358EBDB13A74543F7E558CF1935D497847C2F8