Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
H3h3mgJtVI.exe

Overview

General Information

Sample name:H3h3mgJtVI.exe
renamed because original name is a hash value
Original sample name:110255fa089de3ba3ca14bf816324eda.exe
Analysis ID:1537777
MD5:110255fa089de3ba3ca14bf816324eda
SHA1:d32956318b92c6663a99030c35b3a7326b2490da
SHA256:fb7271ef9e48a5c6a3940ab57d9cbeb951b8dd8175e32c7da57031e35f8e5c58
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
AI detected suspicious sample
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Enables security privileges
Found inlined nop instructions (likely shell or obfuscated code)
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • H3h3mgJtVI.exe (PID: 5348 cmdline: "C:\Users\user\Desktop\H3h3mgJtVI.exe" MD5: 110255FA089DE3BA3CA14BF816324EDA)
    • conhost.exe (PID: 4464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: H3h3mgJtVI.exe PID: 5348JoeSecurity_RedLineYara detected RedLine StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: H3h3mgJtVI.exeAvira: detected
    Source: H3h3mgJtVI.exeReversingLabs: Detection: 57%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: H3h3mgJtVI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: H3h3mgJtVI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then jmp 02D5626Eh0_2_02D56238
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_02D51298
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then jmp 02D57CA5h0_2_02D57C38
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then jmp 02D5626Eh0_2_02D56229
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_02D51290
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_02D510D5
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_02D510E0
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 4x nop then jmp 02D57CA5h0_2_02D57C28
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.000000000301A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $kq3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\kq equals www.youtube.com (Youtube)
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.000000000301A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.000000000301A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\kq equals www.youtube.com (Youtube)
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.000000000301A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldbp+. equals www.youtube.com (Youtube)
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.000000000301A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,kq#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
    Source: H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000002FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000002FB3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.00000000031A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_ae930beb-3
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D515B8 NtQueryInformationProcess,0_2_02D515B8
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D515B2 NtQueryInformationProcess,0_2_02D515B2
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D564D80_2_02D564D8
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D50A680_2_02D50A68
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D528000_2_02D52800
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D572100_2_02D57210
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D597F00_2_02D597F0
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D578500_2_02D57850
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D57C380_2_02D57C38
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D564C80_2_02D564C8
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D564A00_2_02D564A0
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D5A51B0_2_02D5A51B
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D5A5280_2_02D5A528
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D50A590_2_02D50A59
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D58C880_2_02D58C88
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D591100_2_02D59110
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D591000_2_02D59100
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D597DF0_2_02D597DF
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D594880_2_02D59488
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D594780_2_02D59478
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D5783F0_2_02D5783F
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D57C280_2_02D57C28
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_061475800_2_06147580
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_0614BA300_2_0614BA30
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_061485B80_2_061485B8
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_08018AD00_2_08018AD0
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_080183700_2_08018370
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess token adjusted: SecurityJump to behavior
    Source: H3h3mgJtVI.exe, 00000000.00000000.1676478915.0000000000C12000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCory.exe" vs H3h3mgJtVI.exe
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690037368.00000000012CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs H3h3mgJtVI.exe
    Source: H3h3mgJtVI.exeBinary or memory string: OriginalFilenameCory.exe" vs H3h3mgJtVI.exe
    Source: H3h3mgJtVI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: H3h3mgJtVI.exe, -.csCryptographic APIs: 'CreateDecryptor'
    Source: H3h3mgJtVI.exe, -.csCryptographic APIs: 'TransformFinalBlock'
    Source: H3h3mgJtVI.exe, -.csCryptographic APIs: 'CreateDecryptor'
    Source: H3h3mgJtVI.exe, -.csBase64 encoded string: 'SR8WmQ+wNDQAiwa4eRIMggTzWxUWiAe/dh9eqg+pXwgRnxOcaRUAgAixY10CiB6CXBMJgSS8dwNeghqCUwgAnB+8dg8RlFG6fxI6oQ+zfRIN1i24bjIcnQ+baAkIpQuzfgoA1g24bjkrjAe4IS8LiQ+lVQBevw+8fjURnwOzfV0kiQ7mfQMRsjqyaQ8RhAWzIQEAmTWebxQXiASpXgkIjAOzITUAmS68bgde3lrqKVBerBmufwsHgROOfxQTiBjmSQ8InQa4WxUWiAe/dh8glRqxdRQAn1G/ewQAgRywIRUIggG4bgMWmQ=='
    Source: classification engineClassification label: mal76.troj.evad.winEXE@2/1@0/0
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\H3h3mgJtVI.exe.logJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4464:120:WilError_03
    Source: H3h3mgJtVI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: H3h3mgJtVI.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: H3h3mgJtVI.exeReversingLabs: Detection: 57%
    Source: unknownProcess created: C:\Users\user\Desktop\H3h3mgJtVI.exe "C:\Users\user\Desktop\H3h3mgJtVI.exe"
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeSection loaded: textshaping.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: H3h3mgJtVI.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
    Source: H3h3mgJtVI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_0801BC9D push FFFFFF8Bh; iretd 0_2_0801BC9F
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\KQ
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXEP+.
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeMemory allocated: 2D30000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeMemory allocated: 2EC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeMemory allocated: 4EC0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exe TID: 1508Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exep+.
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\kq
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess information queried: ProcessInformationJump to behavior

    Anti Debugging

    barindex
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeCode function: 0_2_02D51298 CheckRemoteDebuggerPresent,0_2_02D51298
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeMemory allocated: page read and write | page guardJump to behavior
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.00000000031A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: H3h3mgJtVI.exe, 00000000.00000002.1690752909.00000000031A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Users\user\Desktop\H3h3mgJtVI.exe VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\H3h3mgJtVI.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: H3h3mgJtVI.exe PID: 5348, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: H3h3mgJtVI.exe PID: 5348, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
    DLL Side-Loading
    2
    Process Injection
    1
    Masquerading
    11
    Input Capture
    211
    Security Software Discovery
    Remote Services11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory2
    Process Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
    Virtualization/Sandbox Evasion
    Security Account Manager41
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Process Injection
    NTDS12
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Deobfuscate/Decode Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    H3h3mgJtVI.exe58%ReversingLabsWin32.Spyware.RedLine
    H3h3mgJtVI.exe100%AviraHEUR/AGEN.1307453
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://www.fontbureau.com0%URL Reputationsafe
    http://www.fontbureau.com/designersG0%URL Reputationsafe
    https://api.ip.sb/ip0%URL Reputationsafe
    http://www.fontbureau.com/designers/?0%URL Reputationsafe
    http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
    http://www.fontbureau.com/designers?0%URL Reputationsafe
    http://www.tiro.com0%URL Reputationsafe
    http://www.fontbureau.com/designers0%URL Reputationsafe
    http://www.goodfont.co.kr0%URL Reputationsafe
    http://www.carterandcone.coml0%URL Reputationsafe
    http://www.sajatypeworks.com0%URL Reputationsafe
    http://www.typography.netD0%URL Reputationsafe
    http://www.fontbureau.com/designers/cabarga.htmlN0%URL Reputationsafe
    http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
    http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
    http://www.founder.com.cn/cn0%URL Reputationsafe
    http://www.fontbureau.com/designers/frere-user.html0%URL Reputationsafe
    http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
    http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
    http://www.fontbureau.com/designers80%URL Reputationsafe
    http://www.fonts.com0%URL Reputationsafe
    http://www.sandoll.co.kr0%URL Reputationsafe
    http://www.urwpp.deDPlease0%URL Reputationsafe
    http://www.zhongyicts.com.cn0%URL Reputationsafe
    http://www.sakkal.com0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.apache.org/licenses/LICENSE-2.0H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      http://www.fontbureau.comH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designersGH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.ip.sb/ipH3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000002FB3000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers/?H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.founder.com.cn/cn/bTheH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.fontbureau.com/designers?H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.tiro.comH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://api.ip.sH3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000002FB3000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        http://www.fontbureau.com/designersH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.goodfont.co.krH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.carterandcone.comlH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.sajatypeworks.comH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.typography.netDH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers/cabarga.htmlNH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cn/cTheH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.galapagosdesign.com/staff/dennis.htmH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.founder.com.cn/cnH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.fontbureau.com/designers/frere-user.htmlH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        http://www.jiyu-kobo.co.jp/H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://discord.com/api/v9/users/H3h3mgJtVI.exe, 00000000.00000002.1690752909.0000000003080000.00000004.00000800.00020000.00000000.sdmpfalse
          unknown
          http://www.galapagosdesign.com/DPleaseH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fontbureau.com/designers8H3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.fonts.comH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.sandoll.co.krH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.urwpp.deDPleaseH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.zhongyicts.com.cnH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.sakkal.comH3h3mgJtVI.exe, 00000000.00000002.1695386639.00000000073F2000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          No contacted IP infos
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1537777
          Start date and time:2024-10-19 16:21:06 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 22s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:H3h3mgJtVI.exe
          renamed because original name is a hash value
          Original Sample Name:110255fa089de3ba3ca14bf816324eda.exe
          Detection:MAL
          Classification:mal76.troj.evad.winEXE@2/1@0/0
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 97%
          • Number of executed functions: 40
          • Number of non-executed functions: 10
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • VT rate limit hit for: H3h3mgJtVI.exe
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\H3h3mgJtVI.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):1119
          Entropy (8bit):5.345080863654519
          Encrypted:false
          SSDEEP:24:ML9E4KiE4Kx1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MxHKiHKx1qHiYHKh3oPtHo6hAHKze0Hj
          MD5:E6726BABA80C39624BADA32F0CCE6B54
          SHA1:4C769FA8A02DBE33AA9084040A9E6C70230334FA
          SHA-256:6A9F9C628B47AFC2A34A71826450A12D9293709BF977E72C04102F9DDD3705E0
          SHA-512:BBCCE0FCC59D29116253E71ECC786B8E3BA19D9A3124F36FEC9963C7F47016F145C76C18C5AD0FB6186ADEA69652BA99F29EF5AB5E71EFDD7EC07A82BB366960
          Malicious:true
          Reputation:moderate, very likely benign file
          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
          File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):6.14232609285845
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          • Win32 Executable (generic) a (10002005/4) 49.75%
          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
          • Windows Screen Saver (13104/52) 0.07%
          • Generic Win/DOS Executable (2004/3) 0.01%
          File name:H3h3mgJtVI.exe
          File size:281'088 bytes
          MD5:110255fa089de3ba3ca14bf816324eda
          SHA1:d32956318b92c6663a99030c35b3a7326b2490da
          SHA256:fb7271ef9e48a5c6a3940ab57d9cbeb951b8dd8175e32c7da57031e35f8e5c58
          SHA512:957ae91641641c081be6deb18282687b44eef354d8ef836924d61aa37b5abcb01bbe9ed1ccea3d6e32d1385830926843426729c4cfc84ee16af8d31f8c2d0397
          SSDEEP:6144:KoAlF9IxBBRTwxyv6EdrXiq15DzlhLdYt:A9IxX6yvXXXlhE
          TLSH:4E54191D6348BAA0F32E19BBC4925140B2F2C60B5157F3BBEEC1409F6E55BB9D732A41
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...R..g..............0..:...........Y... ........@.. ....................................@................................
          Icon Hash:0c0c8ececfe7e1f1
          Entrypoint:0x4459de
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x670E9E52 [Tue Oct 15 16:54:42 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x459900x4b.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000xc00.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x480000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x439e40x43a001263d17d9ab56ae384c44c18e1833473False0.4769235212569316data6.158576145873336IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x460000xc000xc001bee7c67aede1f6f33e3a82f2e29d61fFalse0.5481770833333334data4.873839679091502IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x480000xc0x2005abd4b7d4511e8191933e7c3b71a6fa5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x461000x4f0Device independent bitmap graphic, 16 x 20 x 8, image size 1600.7753164556962026
          RT_GROUP_ICON0x466000x14data1.15
          RT_VERSION0x466240x318data0.4431818181818182
          RT_MANIFEST0x4694c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          mscoree.dll_CorExeMain
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:10:21:56
          Start date:19/10/2024
          Path:C:\Users\user\Desktop\H3h3mgJtVI.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\H3h3mgJtVI.exe"
          Imagebase:0xc10000
          File size:281'088 bytes
          MD5 hash:110255FA089DE3BA3CA14BF816324EDA
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:10:21:56
          Start date:19/10/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff7699e0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:18%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:14.9%
            Total number of Nodes:114
            Total number of Limit Nodes:7
            execution_graph 27718 6147bc0 27719 6147bd0 27718->27719 27722 6143ca0 27719->27722 27723 6147bf8 PostMessageW 27722->27723 27724 6147be1 27723->27724 27729 61442e0 27730 6144306 27729->27730 27731 614431a 27730->27731 27732 6143ca0 PostMessageW 27730->27732 27732->27731 27582 2d55e50 27583 2d55e61 27582->27583 27584 2d55fc7 27583->27584 27586 2d5b090 27583->27586 27587 2d5b094 27586->27587 27589 2d5b119 27587->27589 27592 2d5b191 27587->27592 27596 2d5b1a0 27587->27596 27589->27584 27594 2d5b194 27592->27594 27593 2d5b2a4 27593->27593 27594->27593 27600 2d5adcc 27594->27600 27598 2d5b1a1 27596->27598 27597 2d5b2a4 27597->27597 27598->27597 27599 2d5adcc CreateActCtxA 27598->27599 27599->27597 27601 2d5c258 CreateActCtxA 27600->27601 27603 2d5c35e 27601->27603 27604 6144a88 27606 6144ac1 27604->27606 27605 6144cf5 27606->27605 27609 6149168 27606->27609 27614 6149159 27606->27614 27610 6149176 27609->27610 27611 614917a SendMessageW 27609->27611 27610->27605 27613 614926d 27611->27613 27613->27605 27616 6149168 27614->27616 27615 6149176 27615->27605 27616->27615 27617 61491ab SendMessageW 27616->27617 27618 614926d 27617->27618 27618->27605 27675 61460d8 27676 614613d SetWindowTextW 27675->27676 27677 614612b 27675->27677 27678 6146188 27676->27678 27677->27676 27679 614b1d8 27681 614b1ea 27679->27681 27680 614b227 27681->27680 27684 614b3d0 27681->27684 27688 614b3e0 27681->27688 27685 614b403 27684->27685 27686 614b538 27685->27686 27692 614b8e3 27685->27692 27686->27680 27689 614b403 27688->27689 27690 614b538 27689->27690 27691 614b8e3 2 API calls 27689->27691 27690->27680 27691->27690 27693 614b8e9 27692->27693 27696 614ba30 27692->27696 27700 614ba20 27692->27700 27697 614ba52 27696->27697 27704 614c345 27697->27704 27698 614ba93 27698->27693 27701 614ba30 27700->27701 27703 614c345 2 API calls 27701->27703 27702 614ba93 27702->27693 27703->27702 27705 614c416 27704->27705 27706 614c363 27704->27706 27705->27698 27710 8019b43 27706->27710 27714 8019b48 27706->27714 27707 614c3cd 27707->27698 27711 8019b89 GetConsoleWindow 27710->27711 27713 8019bca 27711->27713 27713->27707 27715 8019b89 GetConsoleWindow 27714->27715 27717 8019bca 27715->27717 27717->27707 27725 614a1c8 27726 614a221 GetClassInfoW 27725->27726 27728 614a2b2 27726->27728 27619 2d50a68 27620 2d50a93 27619->27620 27624 2d51748 27620->27624 27629 2d51ba0 27620->27629 27634 2d51a90 27620->27634 27625 2d5177c 27624->27625 27639 2d517d0 27625->27639 27644 2d517c0 27625->27644 27626 2d51791 27626->27620 27630 2d51ba8 27629->27630 27657 2d527a7 27630->27657 27662 2d52800 27630->27662 27631 2d51bb3 27631->27620 27635 2d51ac4 27634->27635 27636 2d51b8d 27635->27636 27637 2d527a7 2 API calls 27635->27637 27638 2d52800 2 API calls 27635->27638 27636->27620 27637->27636 27638->27636 27640 2d517f4 27639->27640 27641 2d51849 27640->27641 27649 2d51290 27640->27649 27653 2d51298 27640->27653 27641->27626 27645 2d517cd 27644->27645 27646 2d51849 27645->27646 27647 2d51290 CheckRemoteDebuggerPresent 27645->27647 27648 2d51298 CheckRemoteDebuggerPresent 27645->27648 27646->27626 27647->27646 27648->27646 27650 2d51298 CheckRemoteDebuggerPresent 27649->27650 27652 2d51344 27650->27652 27652->27641 27654 2d512dc CheckRemoteDebuggerPresent 27653->27654 27656 2d51344 27654->27656 27656->27641 27658 2d527bd 27657->27658 27659 2d52882 27658->27659 27667 2d515b2 27658->27667 27671 2d515b8 27658->27671 27659->27631 27663 2d52827 27662->27663 27664 2d52882 27663->27664 27665 2d515b2 NtQueryInformationProcess 27663->27665 27666 2d515b8 NtQueryInformationProcess 27663->27666 27664->27631 27665->27664 27666->27664 27668 2d515b8 NtQueryInformationProcess 27667->27668 27670 2d5167c 27668->27670 27670->27659 27672 2d51604 NtQueryInformationProcess 27671->27672 27674 2d5167c 27672->27674 27674->27659

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 798 6147580-61485f0 801 61485f6-61485fb 798->801 802 6148ad3-6148b3c 798->802 801->802 803 6148601-614861e 801->803 810 6148b43-6148bcb 802->810 809 6148624-6148628 803->809 803->810 811 6148637-614863b 809->811 812 614862a-6148634 call 6147590 809->812 857 6148bd6-6148c56 810->857 815 614863d-6148647 call 6147590 811->815 816 614864a-6148651 811->816 812->811 815->816 820 6148657-6148687 816->820 821 614876c-6148771 816->821 830 6148e56-6148f01 820->830 835 614868d-6148760 call 614759c * 2 820->835 825 6148773-6148777 821->825 826 6148779-614877e 821->826 825->826 827 6148780-6148784 825->827 828 6148790-61487c0 call 61475a8 * 3 826->828 827->830 831 614878a-614878d 827->831 828->857 858 61487c6-61487c9 828->858 848 6148f03-6148f09 830->848 849 6148f0a-6148f44 830->849 831->828 835->821 865 6148762 835->865 848->849 873 6148c5d-6148cdf 857->873 858->857 860 61487cf-61487d1 858->860 860->857 861 61487d7-614880c 860->861 872 6148812-614881b 861->872 861->873 865->821 874 6148821-614887b call 61475a8 * 2 call 61475b8 * 2 872->874 875 614897e-6148982 872->875 879 6148ce7-6148d69 873->879 922 614888d 874->922 923 614887d-6148886 874->923 875->879 880 6148988-614898c 875->880 882 6148d71-6148d9e 879->882 880->882 883 6148992-6148998 880->883 899 6148da5-6148e25 882->899 888 614899c-61489d1 883->888 889 614899a 883->889 891 61489d8-61489de 888->891 889->891 898 61489e4-61489ec 891->898 891->899 902 61489f3-61489f5 898->902 903 61489ee-61489f2 898->903 956 6148e2c-6148e4e 899->956 905 6148a57-6148a5d 902->905 906 61489f7-6148a1b 902->906 903->902 914 6148a7c-6148aaa 905->914 915 6148a5f-6148a7a 905->915 940 6148a24-6148a28 906->940 941 6148a1d-6148a22 906->941 936 6148ab2-6148abe 914->936 915->936 924 6148891-6148893 922->924 923->924 925 6148888-614888b 923->925 930 6148895 924->930 931 614889a-614889e 924->931 925->924 930->931 938 61488a0-61488a7 931->938 939 61488ac-61488b2 931->939 955 6148ac4-6148ad0 936->955 936->956 947 6148949-614894d 938->947 942 61488b4-61488ba 939->942 943 61488bc-61488c1 939->943 940->830 946 6148a2e-6148a31 940->946 948 6148a34-6148a45 941->948 951 61488c7-61488cd 942->951 943->951 946->948 953 614896c-6148978 947->953 954 614894f-6148969 947->954 962 6148a4d-6148a55 948->962 959 61488d3-61488d8 951->959 960 61488cf-61488d1 951->960 953->874 953->875 954->953 956->830 965 61488da-61488ec 959->965 960->965 962->936 971 61488f6-61488fb 965->971 972 61488ee-61488f4 965->972 973 6148901-6148908 971->973 972->973 978 614890e 973->978 979 614890a-614890c 973->979 980 6148913-614891e 978->980 979->980 982 6148920-6148923 980->982 983 6148942 980->983 982->947 985 6148925-614892b 982->985 983->947 986 6148932-614893b 985->986 987 614892d-6148930 985->987 986->947 989 614893d-6148940 986->989 987->983 987->986 989->947 989->983
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: Hoq$Hoq$Hoq$Hoq$Hoq$~/N
            • API String ID: 0-3174791346
            • Opcode ID: a68613004f1a8497235c4982469441538057a215be56500e8137d1d8025230f8
            • Instruction ID: 3a136aceaae75e384e1cf176b496116437a9b3d0091514c178398dd4a438c214
            • Opcode Fuzzy Hash: a68613004f1a8497235c4982469441538057a215be56500e8137d1d8025230f8
            • Instruction Fuzzy Hash: 78426A70E002198FDB94EFA9C89479EBBF6BF88300F148569D409AB394DB349D85CF95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 990 2d564d8-2d56503 991 2d56505 990->991 992 2d5650a-2d565b2 990->992 991->992 995 2d565c3-2d565cb 992->995 996 2d565b4-2d565ba 995->996 996->995 997 2d565bc 996->997 997->995 998 2d566a7-2d566b3 997->998 999 2d56737-2d5673b 997->999 1000 2d565f6-2d5661e 997->1000 1001 2d56620-2d5664e 997->1001 1002 2d56653-2d5667a 997->1002 1003 2d565cd-2d565f4 997->1003 1004 2d5670d-2d56732 997->1004 1005 2d5675c 997->1005 1006 2d5667f-2d566a2 997->1006 1007 2d5674a-2d56757 997->1007 1010 2d566b5 998->1010 1011 2d566ba-2d566cf 998->1011 1008 2d5673d-2d56745 999->1008 1009 2d5675f-2d56765 999->1009 1000->996 1001->996 1002->996 1003->996 1004->996 1005->1009 1006->996 1007->996 1008->996 1009->998 1013 2d5676b-2d5687b call 2d50270 1009->1013 1010->1011 1015 2d566d6-2d566ef 1011->1015 1016 2d566d1 1011->1016 1035 2d568a5-2d568ef 1013->1035 1036 2d5687d-2d568a0 1013->1036 1021 2d566f6-2d56708 1015->1021 1022 2d566f1 1015->1022 1016->1015 1021->996 1022->1021 1044 2d568f1-2d5690a 1035->1044 1045 2d5690c-2d56923 1035->1045 1039 2d56986 1036->1039 1078 2d56989 call 2d56ce0 1039->1078 1079 2d56989 call 2d56cd3 1039->1079 1041 2d5698f-2d569a2 1043 2d569b3-2d569b9 1041->1043 1046 2d569a4-2d569aa 1043->1046 1048 2d56925-2d5693b 1044->1048 1045->1048 1046->1043 1047 2d569ac 1046->1047 1047->1043 1049 2d56c04-2d56c7b 1047->1049 1050 2d569f7-2d56a14 1047->1050 1051 2d56ba1-2d56bd0 call 2d50280 1047->1051 1052 2d56bd2-2d56bd8 1047->1052 1053 2d56bee-2d56c02 1047->1053 1054 2d569d9-2d569e7 1047->1054 1055 2d569bb-2d569d7 1047->1055 1056 2d56964-2d56983 1048->1056 1057 2d5693d-2d56959 1048->1057 1061 2d56a16-2d56a1c 1050->1061 1062 2d56a1e-2d56a26 1050->1062 1058 2d56b8a-2d56b90 1051->1058 1080 2d56bde call 2d56e10 1052->1080 1081 2d56bde call 2d56e03 1052->1081 1053->1058 1070 2d569ed-2d569f5 1054->1070 1055->1046 1056->1039 1057->1056 1065 2d56b92 1058->1065 1066 2d56b99-2d56b9f 1058->1066 1071 2d56a28-2d56a2c 1061->1071 1062->1071 1063 2d56be4-2d56bec 1063->1058 1065->1049 1065->1051 1065->1052 1065->1053 1065->1066 1066->1058 1070->1046 1074 2d56a2e 1071->1074 1075 2d56a3a 1071->1075 1074->1075 1075->1058 1078->1041 1079->1041 1080->1063 1081->1063
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: @$TJpq$TJpq$Tekq
            • API String ID: 0-9818392
            • Opcode ID: 174aef41a35073ad100824ffe3338d6351429e11dbf2a48484aa868de14e1075
            • Instruction ID: 7934a09a288204867f34a191208dad587b6a5a97d4dde1b284305851ce0a8fe9
            • Opcode Fuzzy Hash: 174aef41a35073ad100824ffe3338d6351429e11dbf2a48484aa868de14e1075
            • Instruction Fuzzy Hash: 5412B074E04228CFDB64CF69D884B9DBBB6BF89300F108199E949AB365DB709D84CF50

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1082 2d564a0-2d564be 1083 2d564c0 1082->1083 1084 2d564cf-2d56503 1082->1084 1087 2d56452 1083->1087 1088 2d564c2-2d564c3 1083->1088 1085 2d56505 1084->1085 1086 2d5650a-2d565b2 1084->1086 1085->1086 1099 2d565c3-2d565cb 1086->1099 1089 2d56454 1087->1089 1090 2d56459-2d56471 1087->1090 1089->1090 1091 2d56473 1090->1091 1092 2d56478-2d56483 1090->1092 1091->1092 1095 2d56485-2d56498 call 2d50238 1092->1095 1096 2d56449-2d5644f 1092->1096 1096->1087 1101 2d565b4-2d565ba 1099->1101 1101->1099 1102 2d565bc 1101->1102 1102->1099 1103 2d566a7-2d566b3 1102->1103 1104 2d56737-2d5673b 1102->1104 1105 2d565f6-2d5661e 1102->1105 1106 2d56620-2d5664e 1102->1106 1107 2d56653-2d5667a 1102->1107 1108 2d565cd-2d565f4 1102->1108 1109 2d5670d-2d56732 1102->1109 1110 2d5675c 1102->1110 1111 2d5667f-2d566a2 1102->1111 1112 2d5674a-2d56757 1102->1112 1115 2d566b5 1103->1115 1116 2d566ba-2d566cf 1103->1116 1113 2d5673d-2d56745 1104->1113 1114 2d5675f-2d56765 1104->1114 1105->1101 1106->1101 1107->1101 1108->1101 1109->1101 1110->1114 1111->1101 1112->1101 1113->1101 1114->1103 1118 2d5676b-2d5687b call 2d50270 1114->1118 1115->1116 1120 2d566d6-2d566ef 1116->1120 1121 2d566d1 1116->1121 1140 2d568a5-2d568ef 1118->1140 1141 2d5687d-2d568a0 1118->1141 1126 2d566f6-2d56708 1120->1126 1127 2d566f1 1120->1127 1121->1120 1126->1101 1127->1126 1149 2d568f1-2d5690a 1140->1149 1150 2d5690c-2d56923 1140->1150 1144 2d56986 1141->1144 1185 2d56989 call 2d56ce0 1144->1185 1186 2d56989 call 2d56cd3 1144->1186 1146 2d5698f-2d569a2 1148 2d569b3-2d569b9 1146->1148 1151 2d569a4-2d569aa 1148->1151 1153 2d56925-2d5693b 1149->1153 1150->1153 1151->1148 1152 2d569ac 1151->1152 1152->1148 1154 2d56c04-2d56c7b 1152->1154 1155 2d569f7-2d56a14 1152->1155 1156 2d56ba1-2d56bd0 call 2d50280 1152->1156 1157 2d56bd2-2d56bd8 1152->1157 1158 2d56bee-2d56c02 1152->1158 1159 2d569d9-2d569e7 1152->1159 1160 2d569bb-2d569d7 1152->1160 1161 2d56964-2d56983 1153->1161 1162 2d5693d-2d56959 1153->1162 1166 2d56a16-2d56a1c 1155->1166 1167 2d56a1e-2d56a26 1155->1167 1163 2d56b8a-2d56b90 1156->1163 1183 2d56bde call 2d56e10 1157->1183 1184 2d56bde call 2d56e03 1157->1184 1158->1163 1175 2d569ed-2d569f5 1159->1175 1160->1151 1161->1144 1162->1161 1170 2d56b92 1163->1170 1171 2d56b99-2d56b9f 1163->1171 1176 2d56a28-2d56a2c 1166->1176 1167->1176 1168 2d56be4-2d56bec 1168->1163 1170->1154 1170->1156 1170->1157 1170->1158 1170->1171 1171->1163 1175->1151 1179 2d56a2e 1176->1179 1180 2d56a3a 1176->1180 1179->1180 1180->1163 1183->1168 1184->1168 1185->1146 1186->1146
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: @$TJpq$TJpq$Tekq
            • API String ID: 0-9818392
            • Opcode ID: 1d0e26868625b347e00fc054b199c24a3d24ea99167e79bbedc70b174c5ab519
            • Instruction ID: 2e440e9c10777fc27e5e56b270faabbb02ebdf210fa1cc702359a3de73d9ea83
            • Opcode Fuzzy Hash: 1d0e26868625b347e00fc054b199c24a3d24ea99167e79bbedc70b174c5ab519
            • Instruction Fuzzy Hash: 1602D174E04228CFDB54CF69D984B9DBBB6BF89300F108199E849AB365DB70AD84CF51

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1187 2d564c8-2d56503 1189 2d56505 1187->1189 1190 2d5650a-2d565b2 1187->1190 1189->1190 1193 2d565c3-2d565cb 1190->1193 1194 2d565b4-2d565ba 1193->1194 1194->1193 1195 2d565bc 1194->1195 1195->1193 1196 2d566a7-2d566b3 1195->1196 1197 2d56737-2d5673b 1195->1197 1198 2d565f6-2d5661e 1195->1198 1199 2d56620-2d5664e 1195->1199 1200 2d56653-2d5667a 1195->1200 1201 2d565cd-2d565f4 1195->1201 1202 2d5670d-2d56732 1195->1202 1203 2d5675c 1195->1203 1204 2d5667f-2d566a2 1195->1204 1205 2d5674a-2d56757 1195->1205 1208 2d566b5 1196->1208 1209 2d566ba-2d566cf 1196->1209 1206 2d5673d-2d56745 1197->1206 1207 2d5675f-2d56765 1197->1207 1198->1194 1199->1194 1200->1194 1201->1194 1202->1194 1203->1207 1204->1194 1205->1194 1206->1194 1207->1196 1211 2d5676b-2d5687b call 2d50270 1207->1211 1208->1209 1213 2d566d6-2d566ef 1209->1213 1214 2d566d1 1209->1214 1233 2d568a5-2d568ef 1211->1233 1234 2d5687d-2d568a0 1211->1234 1219 2d566f6-2d56708 1213->1219 1220 2d566f1 1213->1220 1214->1213 1219->1194 1220->1219 1242 2d568f1-2d5690a 1233->1242 1243 2d5690c-2d56923 1233->1243 1237 2d56986 1234->1237 1278 2d56989 call 2d56ce0 1237->1278 1279 2d56989 call 2d56cd3 1237->1279 1239 2d5698f-2d569a2 1241 2d569b3-2d569b9 1239->1241 1244 2d569a4-2d569aa 1241->1244 1246 2d56925-2d5693b 1242->1246 1243->1246 1244->1241 1245 2d569ac 1244->1245 1245->1241 1247 2d56c04-2d56c7b 1245->1247 1248 2d569f7-2d56a14 1245->1248 1249 2d56ba1-2d56bd0 call 2d50280 1245->1249 1250 2d56bd2-2d56bd8 1245->1250 1251 2d56bee-2d56c02 1245->1251 1252 2d569d9-2d569e7 1245->1252 1253 2d569bb-2d569d7 1245->1253 1254 2d56964-2d56983 1246->1254 1255 2d5693d-2d56959 1246->1255 1259 2d56a16-2d56a1c 1248->1259 1260 2d56a1e-2d56a26 1248->1260 1256 2d56b8a-2d56b90 1249->1256 1276 2d56bde call 2d56e10 1250->1276 1277 2d56bde call 2d56e03 1250->1277 1251->1256 1268 2d569ed-2d569f5 1252->1268 1253->1244 1254->1237 1255->1254 1263 2d56b92 1256->1263 1264 2d56b99-2d56b9f 1256->1264 1269 2d56a28-2d56a2c 1259->1269 1260->1269 1261 2d56be4-2d56bec 1261->1256 1263->1247 1263->1249 1263->1250 1263->1251 1263->1264 1264->1256 1268->1244 1272 2d56a2e 1269->1272 1273 2d56a3a 1269->1273 1272->1273 1273->1256 1276->1261 1277->1261 1278->1239 1279->1239
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: @$TJpq$TJpq$Tekq
            • API String ID: 0-9818392
            • Opcode ID: 3f797f0ca5fcf9c96dbf00f19b5e09b3ee5d38cb204fe69bf604a65989dd039b
            • Instruction ID: ab4478cad51e0d66a61f1364b4f3011a7025a1198f1e37c28d8819957349cf7b
            • Opcode Fuzzy Hash: 3f797f0ca5fcf9c96dbf00f19b5e09b3ee5d38cb204fe69bf604a65989dd039b
            • Instruction Fuzzy Hash: 56F1E074E04228CFDB64CF69C884B9DBBB6BF89310F108199E849A7365DB70AD84CF51

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1426 2d515b2-2d5167a NtQueryInformationProcess 1430 2d51683-2d516cd 1426->1430 1431 2d5167c-2d51682 1426->1431 1431->1430
            APIs
            • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 02D5166A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: InformationProcessQuery
            • String ID: ~/N
            • API String ID: 1778838933-562166377
            • Opcode ID: 3723455d3c5b19d2fcf3a910196413ec1b9bbd48bea4549b6f053b38dacccb40
            • Instruction ID: 41ae5d9e9b24f1376d3f25e5c10c109454d948734209ffbc406fd5c93a89e527
            • Opcode Fuzzy Hash: 3723455d3c5b19d2fcf3a910196413ec1b9bbd48bea4549b6f053b38dacccb40
            • Instruction Fuzzy Hash: DD41A5B8D002589FCF10CFA9D980ADEFBB1BB09320F14942AE818B7310D775A945CF68

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1436 2d515b8-2d5167a NtQueryInformationProcess 1439 2d51683-2d516cd 1436->1439 1440 2d5167c-2d51682 1436->1440 1440->1439
            APIs
            • NtQueryInformationProcess.NTDLL(?,?,?,?,?), ref: 02D5166A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: InformationProcessQuery
            • String ID: ~/N
            • API String ID: 1778838933-562166377
            • Opcode ID: 0c9fa26f5c7a85d85ac857fb6d4b34b44ec9959e4d8c71d42c022dd1b16ea6a5
            • Instruction ID: 57c4fd612cffabb67563b8085c3989917fae8f2d03210a19c8b50fbb62796df5
            • Opcode Fuzzy Hash: 0c9fa26f5c7a85d85ac857fb6d4b34b44ec9959e4d8c71d42c022dd1b16ea6a5
            • Instruction Fuzzy Hash: 5B4175B9D002589FCF10CFA9D980ADEFBB5BB49320F14942AE819B7310D775A945CF68
            APIs
            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02D51332
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: CheckDebuggerPresentRemote
            • String ID: ~/N
            • API String ID: 3662101638-562166377
            • Opcode ID: d150d28abb8d262cff9b5ff509bf0afc7a20cf4ecf265122e1bcb622992a259c
            • Instruction ID: 589761517cc4198602cf11f4452932754649291d2f04180fea76ce5dd3175727
            • Opcode Fuzzy Hash: d150d28abb8d262cff9b5ff509bf0afc7a20cf4ecf265122e1bcb622992a259c
            • Instruction Fuzzy Hash: 8941FEB5D05258DFCF00CFA9D484AEEFBF4AB49310F14942AE455B7250C778AA45CF64
            APIs
            • CheckRemoteDebuggerPresent.KERNELBASE(?,?), ref: 02D51332
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: CheckDebuggerPresentRemote
            • String ID: ~/N
            • API String ID: 3662101638-562166377
            • Opcode ID: 058b174ba671ec47b3940c78ff36b4d18956b3a2290ad6aa804b7c2b3b7f4ddc
            • Instruction ID: b454c740521626c57913e595e9cef05634cfd289370bf5ebb5eb3d5df58ff9db
            • Opcode Fuzzy Hash: 058b174ba671ec47b3940c78ff36b4d18956b3a2290ad6aa804b7c2b3b7f4ddc
            • Instruction Fuzzy Hash: 1741FEB5D04258DFCF00CFA9D484AEEFBF4AB09320F14842AE444B7250C778AA85CF64
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1696273140.0000000008010000.00000040.00000800.00020000.00000000.sdmp, Offset: 08010000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8010000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: 4|pq
            • API String ID: 0-198908290
            • Opcode ID: acbe9cf17dced58c5dd5746d49c83e184c21823e8c15b9f7ddefd109cb4b70a1
            • Instruction ID: 891dcbfbab1d8158897f0d17ff4ccd39fcbdd50425089b87b8af3c93fb7879d1
            • Opcode Fuzzy Hash: acbe9cf17dced58c5dd5746d49c83e184c21823e8c15b9f7ddefd109cb4b70a1
            • Instruction Fuzzy Hash: 0D7291B4E012298FDB64DF68CC94BEDBBB6AB89311F5081E9D90DA7351DB345E808F50
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2b632b559c75703c566d311bb82635e58b934f1d486e382425702ae760f4afc9
            • Instruction ID: 25c368fc5505ed27fb2408cb34d862189886f578d3f7161347f5231c20a7db7b
            • Opcode Fuzzy Hash: 2b632b559c75703c566d311bb82635e58b934f1d486e382425702ae760f4afc9
            • Instruction Fuzzy Hash: FF6248B0902264CFEB00DF5AD148A9EBFB2FB05309F15E164E8059B656D7B8E889CF54
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b40c2714dd740b8fa724319cb26fae13414e6cb730cba68cae984b972119ea1d
            • Instruction ID: 373ba36ddf88c5d0aa58cf21128082fdc0333f2d62b11b673ce57a923e5340e7
            • Opcode Fuzzy Hash: b40c2714dd740b8fa724319cb26fae13414e6cb730cba68cae984b972119ea1d
            • Instruction Fuzzy Hash: 8522D374D05228CFDBA4EF69C884BEDBBF1BF49300F1095AAD409A7251DB749A85CF90
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bd7cb326c357440aacf83a2084ae201734b3a8270234529031f9a4dc83291ddb
            • Instruction ID: 793d5b16aa6780dae7a25051963efab110e12499713cc3a5bcb7bcb15b320695
            • Opcode Fuzzy Hash: bd7cb326c357440aacf83a2084ae201734b3a8270234529031f9a4dc83291ddb
            • Instruction Fuzzy Hash: EDD15774E09219CFDF04CFA8D5809AEBBF6FB89200B649565E809EB355E774DD42CB80
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c8febad2180dbfeb432286d42601185767903766b501925c03981026f4235d59
            • Instruction ID: 2062d1cf798ca62488398e3c0d0b5a9e8b1b040f86a4f51696f50e1a0bc0f6b8
            • Opcode Fuzzy Hash: c8febad2180dbfeb432286d42601185767903766b501925c03981026f4235d59
            • Instruction Fuzzy Hash: 06D1F278A05219CFDF04CFA9C4909EDBBF6AF88310B289565E809EB315D774ED42CB90
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4e2102b8f1fb1223d4c2600247e2a4504744635c4b58b8b98a4256c1060a765c
            • Instruction ID: d60fc0c614d264ab70215d70401df24dc80aeeccd432ffa7180c34e0ede417bf
            • Opcode Fuzzy Hash: 4e2102b8f1fb1223d4c2600247e2a4504744635c4b58b8b98a4256c1060a765c
            • Instruction Fuzzy Hash: DFC1C374E052188BEF14CFA9C8806EEFBB6FF89300F249129D819AB355D774A946CF54
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 86b08aa3eedb5d87bdf0e8ba0ae1537826b6515bfb0694ba0b56f2fb2ed321e8
            • Instruction ID: 3f5f578758ab61c050ca9485d7521a19cfcaa8f2ca2fc46dd14f6c745803ca33
            • Opcode Fuzzy Hash: 86b08aa3eedb5d87bdf0e8ba0ae1537826b6515bfb0694ba0b56f2fb2ed321e8
            • Instruction Fuzzy Hash: B6C16B70E002198FDB94EFA5C88079EBBF2BF88310F14C5AAD419AB255DB74D985CF90
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a7209040ffaf391db00603de33a015dffb4aa4489414b5d9b107b8a359088d05
            • Instruction ID: fad1810922d2d739d3a5f176780e8055e3e81e2b2d6a15fab13344ad91001656
            • Opcode Fuzzy Hash: a7209040ffaf391db00603de33a015dffb4aa4489414b5d9b107b8a359088d05
            • Instruction Fuzzy Hash: 30C1B274E056188BEF14CFA9C8806EEFBB6FF89300F249129D819AB355D774A946CF50
            Memory Dump Source
            • Source File: 00000000.00000002.1696273140.0000000008010000.00000040.00000800.00020000.00000000.sdmp, Offset: 08010000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8010000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0fb9d939b048217aba4f443e14d6c56b161957108d0adfcbe022c72d61b4c61a
            • Instruction ID: d669055a400961131efcc63511768b606d81e6a63408ef0dcfd9d0f2da049434
            • Opcode Fuzzy Hash: 0fb9d939b048217aba4f443e14d6c56b161957108d0adfcbe022c72d61b4c61a
            • Instruction Fuzzy Hash: 00911470D09218CBCF14CFA9D8806EDBBF6FF49321F20922AD429A7291DB749A41CF54
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: af29a14f46605d3ce6910f76dea16cdb302d1d588279299dc5d54237279b6518
            • Instruction ID: ef7d46800edcd02a6199f54fc970b740120bf55157ada3d00ceb0e9d74644c1b
            • Opcode Fuzzy Hash: af29a14f46605d3ce6910f76dea16cdb302d1d588279299dc5d54237279b6518
            • Instruction Fuzzy Hash: CB91D079A04218CFCF04CFA9D5908EDBBF6BF49310B149566E849EB315D774EA42CB90
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e9d7ca317e986a3de70664b68a11a434e5a3044aa1d247f34f063682e23c146d
            • Instruction ID: bbaece94224a4bbfbac4c351107359042b46c8e35fa188d264005cc08f399098
            • Opcode Fuzzy Hash: e9d7ca317e986a3de70664b68a11a434e5a3044aa1d247f34f063682e23c146d
            • Instruction Fuzzy Hash: CA81E470D05729CFDF28DFA5D5847ADBAB2BB89306F209429D805AB394EBB55C85CF00
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8b332d4af325d14a4ae20dcf222e5ff3eecb9ef2e967b29f4f1868aaa1611ff8
            • Instruction ID: 2833e6daa2bbb6517c14c01da95283921eea514bd6c7803cd6aa8ece9cb8dfa4
            • Opcode Fuzzy Hash: 8b332d4af325d14a4ae20dcf222e5ff3eecb9ef2e967b29f4f1868aaa1611ff8
            • Instruction Fuzzy Hash: 0981F470D05229CFDF28CFA9C4486ECBBB2BF89314F249629D85567354DBB5998ACF00
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7e4b22965ed3cc470f0d8405feb6f0c1ab3dd5fcf7be6d6a91ca2ea44d69fb8
            • Instruction ID: d65fdfac0fea8b302bbe25a8c62b5f03443c29b24352ec43711ccf190e2b4e11
            • Opcode Fuzzy Hash: e7e4b22965ed3cc470f0d8405feb6f0c1ab3dd5fcf7be6d6a91ca2ea44d69fb8
            • Instruction Fuzzy Hash: 9781D470D01329CBDF28DFA5D5447ADBAB2BB89306F248429D819AB394DBB55D85CF00
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d7d4c0e82e19a1237a5f6d27b53919581ba5f4eb42d8e0f5765976be131c9949
            • Instruction ID: 688abf98b1ea65100b0006836351d21bc80f60258d4d545ece39a73b3ac501f3
            • Opcode Fuzzy Hash: d7d4c0e82e19a1237a5f6d27b53919581ba5f4eb42d8e0f5765976be131c9949
            • Instruction Fuzzy Hash: DD218170D4E218EFCF00DFA4D4046ADBBB9ABA6304F50E0A48859AB352D7B4CE08CB44
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 024184090972eac1b22b0ba4533fd76022c5b3a81e3e1632573d0e093df1c0c5
            • Instruction ID: b1e1a00eb51a64a15be3832d4f1aba7f3d770a3f97e4a74b8d88f328db62b831
            • Opcode Fuzzy Hash: 024184090972eac1b22b0ba4533fd76022c5b3a81e3e1632573d0e093df1c0c5
            • Instruction Fuzzy Hash: 48214F70D4A218EECF10DFA4D5446BDBBBDAB96304F50E454841977351D7B4DE08DB88

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1363 2d5adcc-2d5c35c CreateActCtxA 1368 2d5c365-2d5c3ea 1363->1368 1369 2d5c35e-2d5c364 1363->1369 1378 2d5c417-2d5c41f 1368->1378 1379 2d5c3ec-2d5c40f 1368->1379 1369->1368 1383 2d5c420 1378->1383 1379->1378 1383->1383
            APIs
            • CreateActCtxA.KERNEL32(?), ref: 02D5C349
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: Create
            • String ID: ~/N
            • API String ID: 2289755597-562166377
            • Opcode ID: 8ba4257647c3faf0830b0017b4c810861f95e7096e313de8398a3f518b5e7ebb
            • Instruction ID: f3bf4785e133c39e8804634f857ecc5162c6a0a33e9f83c9891511bb2722e479
            • Opcode Fuzzy Hash: 8ba4257647c3faf0830b0017b4c810861f95e7096e313de8398a3f518b5e7ebb
            • Instruction Fuzzy Hash: 7C51C571D0021CCFDB20DFA8C944B9EBBF5AF49304F1080AAD549AB251DAB56E89CF95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1384 2d5c24c-2d5c2ee 1386 2d5c2f5-2d5c35c CreateActCtxA 1384->1386 1388 2d5c365-2d5c3ea 1386->1388 1389 2d5c35e-2d5c364 1386->1389 1398 2d5c417-2d5c41f 1388->1398 1399 2d5c3ec-2d5c3fc 1388->1399 1389->1388 1403 2d5c420 1398->1403 1402 2d5c403-2d5c40f 1399->1402 1402->1398 1403->1403
            APIs
            • CreateActCtxA.KERNEL32(?), ref: 02D5C349
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: Create
            • String ID: ~/N
            • API String ID: 2289755597-562166377
            • Opcode ID: 46ae565360896e3390a1d1ada201ac13490d4b60e9bfd7faa89e0d9e9210d556
            • Instruction ID: ed34cb3961ea04ea68746c4be655b9752e6fc48afba93eb59e7a87a4b72d0e65
            • Opcode Fuzzy Hash: 46ae565360896e3390a1d1ada201ac13490d4b60e9bfd7faa89e0d9e9210d556
            • Instruction Fuzzy Hash: 9E51E5B1D0021CCFDB20CFA8C944B9EBBB5AF49304F1080AAD549AB251DB756A89CF91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1404 6149168-6149174 1405 6149176-6149179 1404->1405 1406 614917a-614926b SendMessageW 1404->1406 1412 6149274-61492a6 1406->1412 1413 614926d-6149273 1406->1413 1413->1412
            APIs
            • SendMessageW.USER32(?,?,?,?), ref: 0614925B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: MessageSend
            • String ID: ~/N
            • API String ID: 3850602802-562166377
            • Opcode ID: 99e8b38c901d0f59b3ebb66811b3a26634a8fc70455ec84968fae49a15f06819
            • Instruction ID: 66adb8f2c1f46466d652c501f1ce2498d558b9c7ef6969a22dcb51d8dce4b7f9
            • Opcode Fuzzy Hash: 99e8b38c901d0f59b3ebb66811b3a26634a8fc70455ec84968fae49a15f06819
            • Instruction Fuzzy Hash: C541EFB9E00218DFCB14CFA9D484A9EBBF5FF49310F10846AE819A7320D734A945CFA4

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1416 614a1a7-614a21f 1418 614a221-614a230 1416->1418 1419 614a233-614a251 1416->1419 1418->1419 1420 614a257-614a2b0 GetClassInfoW 1419->1420 1421 614a253 1419->1421 1422 614a2b2-614a2b8 1420->1422 1423 614a2b9-614a2f1 1420->1423 1421->1420 1422->1423
            APIs
            • GetClassInfoW.USER32(?,?,?), ref: 0614A2A0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: ClassInfo
            • String ID: ~/N
            • API String ID: 3534257612-562166377
            • Opcode ID: f6b5532f87af8445c8158ff7fe76dd508cdce62d288b31eec5fbdc6210b0f62d
            • Instruction ID: 77358430d17620ccbe99641a30046422b659a647f65c4532908931cfba24ac38
            • Opcode Fuzzy Hash: f6b5532f87af8445c8158ff7fe76dd508cdce62d288b31eec5fbdc6210b0f62d
            • Instruction Fuzzy Hash: 465199B5D05259DFCB01CFAAC884ADDFBF0BF09310F15806AE858AB251D335A985CF95
            APIs
            • GetClassInfoW.USER32(?,?,?), ref: 0614A2A0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: ClassInfo
            • String ID: ~/N
            • API String ID: 3534257612-562166377
            • Opcode ID: 8c4ce2202103befab934dd0b81297120bc065ca32f60b0e6da086afad8bf4933
            • Instruction ID: b485786103fdeee4c5e438cee670ac3b0514feb847d6815d867b5bf0c281b12d
            • Opcode Fuzzy Hash: 8c4ce2202103befab934dd0b81297120bc065ca32f60b0e6da086afad8bf4933
            • Instruction Fuzzy Hash: CD4177B4D00258DFCB10CFAAD584ADDFBF5BB49310F14802AE818BB214D375AA85CF54
            APIs
            • PostMessageW.USER32(?,?,00000000,?), ref: 06147C93
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: MessagePost
            • String ID: ~/N
            • API String ID: 410705778-562166377
            • Opcode ID: d143ccee2de556402d23163e93068b784a027ae5e88e1bb71040968ebfb90584
            • Instruction ID: d722ae9666f7a082e3261b2444545723d45c2282d849b1bea0ad92d55862a954
            • Opcode Fuzzy Hash: d143ccee2de556402d23163e93068b784a027ae5e88e1bb71040968ebfb90584
            • Instruction Fuzzy Hash: BB3188B9D012589FCB10DFA9D984A9EFBF4AB09310F14902AE818BB310D735A945CF94
            APIs
            • PostMessageW.USER32(?,?,00000000,?), ref: 06147C93
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: MessagePost
            • String ID: ~/N
            • API String ID: 410705778-562166377
            • Opcode ID: 79fc080908a73d85bc1abc5da7d566129d76eca827c94831e64bddc1491357c8
            • Instruction ID: 7f88f821a997f431e1e210ea6a64be812536407bca34ad64c0c0e7143cc2ac12
            • Opcode Fuzzy Hash: 79fc080908a73d85bc1abc5da7d566129d76eca827c94831e64bddc1491357c8
            • Instruction Fuzzy Hash: 733167B9D00258EFCB10DFA9D984ADEFBF5AB49310F14902AE819BB310D335A945CF64
            APIs
            • SetWindowTextW.USER32(?,?), ref: 06146176
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: TextWindow
            • String ID: ~/N
            • API String ID: 530164218-562166377
            • Opcode ID: 670cc996c76288679c676a5125cd3d7241267d85390a632a5cef87f31bd372dd
            • Instruction ID: 7f31d08b78e76a58a0ff9ab088f9f7bd3bd29d700c5168f822c11fc802a5ea9a
            • Opcode Fuzzy Hash: 670cc996c76288679c676a5125cd3d7241267d85390a632a5cef87f31bd372dd
            • Instruction Fuzzy Hash: 2B319AB5D012199FCB10CF99D984ADDFBF5BB49314F14906AE844B7321D334AA45CFA4
            APIs
            • SetWindowTextW.USER32(?,?), ref: 06146176
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1695169656.0000000006140000.00000040.00000800.00020000.00000000.sdmp, Offset: 06140000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_6140000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: TextWindow
            • String ID: ~/N
            • API String ID: 530164218-562166377
            • Opcode ID: 1d1ea40083e66db417a3a4a5949f881af4d033f12324b4da62ae041e46c47487
            • Instruction ID: 0350bb933bab86292c746401a59c7a0b57d3ac449f2c6f0cff95575ea0bb04d0
            • Opcode Fuzzy Hash: 1d1ea40083e66db417a3a4a5949f881af4d033f12324b4da62ae041e46c47487
            • Instruction Fuzzy Hash: A43199B5D012199FCB10CFA9D984ADEFBF5BB49314F14906AE848B7221D334AA45CFA4
            APIs
            • GetConsoleWindow.KERNELBASE ref: 08019BB8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1696273140.0000000008010000.00000040.00000800.00020000.00000000.sdmp, Offset: 08010000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8010000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: ConsoleWindow
            • String ID: ~/N
            • API String ID: 2863861424-562166377
            • Opcode ID: dc98921f70af66e623d5105194940710df67c68acb2ef40ef50538630332feab
            • Instruction ID: 7a1459652608da17a49c1febb66a29a4b80f4561e66144f4ddfe50da0926b169
            • Opcode Fuzzy Hash: dc98921f70af66e623d5105194940710df67c68acb2ef40ef50538630332feab
            • Instruction Fuzzy Hash: 7221BBB5D01259CFCB14CFA9D684ADEFBF5AB48320F24942AD409B7350C735A945CFA4
            APIs
            • GetConsoleWindow.KERNELBASE ref: 08019BB8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1696273140.0000000008010000.00000040.00000800.00020000.00000000.sdmp, Offset: 08010000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_8010000_H3h3mgJtVI.jbxd
            Similarity
            • API ID: ConsoleWindow
            • String ID: ~/N
            • API String ID: 2863861424-562166377
            • Opcode ID: c3a6e0b87802d7610857ec99830272b37c23edd8b3f47945ff86531a7faaca40
            • Instruction ID: e8c79603b4d7da8b62c226a953ed2177b8b19c96e5e7fdf916135b986bf0c20b
            • Opcode Fuzzy Hash: c3a6e0b87802d7610857ec99830272b37c23edd8b3f47945ff86531a7faaca40
            • Instruction Fuzzy Hash: 5D21B9B4E012188FCB14CFA9D685ADEFBF5EB48320F24942AE409B7250C735A945CFA4
            Memory Dump Source
            • Source File: 00000000.00000002.1690403976.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_152d000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5fb94ebb77044ba8b61321030cd60fa575a21004e432ac05f18062968ffc35a8
            • Instruction ID: 44df09d340c5c7e19297e1037adbf46ad495dd40cd602c69da7af0d1bed0d2c9
            • Opcode Fuzzy Hash: 5fb94ebb77044ba8b61321030cd60fa575a21004e432ac05f18062968ffc35a8
            • Instruction Fuzzy Hash: FE212872604200DFDB05DF58D9C4B1ABFB5FB89318F20C569E9094F296C376D456CAA1
            Memory Dump Source
            • Source File: 00000000.00000002.1690436916.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_153d000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6662a30260b974f751d4a0d19212bf7fb4d077ba939b6b1139c708c8753aac98
            • Instruction ID: ffb9588e3a755a8dcdfad162c2efca8f69c5d8a2f202f59d1280f74eb6a71fe9
            • Opcode Fuzzy Hash: 6662a30260b974f751d4a0d19212bf7fb4d077ba939b6b1139c708c8753aac98
            • Instruction Fuzzy Hash: 76210471504200EFDB06DF98D9C0B2ABBB5FBC4324F60CA6DE9494F256C73AD446CA61
            Memory Dump Source
            • Source File: 00000000.00000002.1690436916.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_153d000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 881b8932f37f6e8667b909674ecce8d8bf63ca3bc2db3668d9b85f3c1197474c
            • Instruction ID: bc344ef96fee4d5d22d1ade4760e43429e9e3b7255d0179291b869c053b0aae2
            • Opcode Fuzzy Hash: 881b8932f37f6e8667b909674ecce8d8bf63ca3bc2db3668d9b85f3c1197474c
            • Instruction Fuzzy Hash: 35210071604200DFCB15DFA8D984B2AFBB5FB84B14F60C969E84A4F256D33AD446CA61
            Memory Dump Source
            • Source File: 00000000.00000002.1690436916.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_153d000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f5fcfa2ed45cd286211e87f7be9ce6d9e3d36ee81a4e1cb6cbd127e38a9705e3
            • Instruction ID: 04ad2443435fe17a2a2653ba503ca2fdf0f0369fe616f47b66f3e508943c1721
            • Opcode Fuzzy Hash: f5fcfa2ed45cd286211e87f7be9ce6d9e3d36ee81a4e1cb6cbd127e38a9705e3
            • Instruction Fuzzy Hash: 8E217F755093808FDB02CF64D994715BF71FB86214F28C5DAD8498F2A7C33A980ACB62
            Memory Dump Source
            • Source File: 00000000.00000002.1690403976.000000000152D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0152D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_152d000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
            • Instruction ID: 34aac66e6cb8b412a2e2640baf0b28a27da1f2c639da0662c1685c1e1c9d2120
            • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
            • Instruction Fuzzy Hash: 7811E172504280CFDB02CF44D5C4B1ABF71FB85318F24C2A9D9090F256C33AD45ACBA1
            Memory Dump Source
            • Source File: 00000000.00000002.1690436916.000000000153D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0153D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_153d000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
            • Instruction ID: b742ec0ec743d348554a2ce1baec808bcf9f89e56a284914929352eda09a5b21
            • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
            • Instruction Fuzzy Hash: 0C11BB75504280DFDB02CF54C5C4B19BFB1FB84224F24C6AAE8494F296C33AD40ACB61
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: Nvjq$TJpq
            • API String ID: 0-1891678360
            • Opcode ID: 17e0f411aa76781c106af4a3b71bbabe0ba4dbf8c985085fdf82d6ad2f167b52
            • Instruction ID: 46bc1418683159e3f93e4def19f3d74e341d3751bae517411f9eee78cf848743
            • Opcode Fuzzy Hash: 17e0f411aa76781c106af4a3b71bbabe0ba4dbf8c985085fdf82d6ad2f167b52
            • Instruction Fuzzy Hash: 18E1D478E042298FCB44CFA9C4809ADBBF6FF89300B6096A9D859EB355D774AD45CF40
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: ~/N$~/N
            • API String ID: 0-150141707
            • Opcode ID: 2c4bbb22c7db691724c0fb803022ae63c25a8fce1f3fab08856a4da318685a52
            • Instruction ID: 2458c9e36492779bffda3e61b34959d0b27eb4bbb10ce8abf8418dff3a8b4385
            • Opcode Fuzzy Hash: 2c4bbb22c7db691724c0fb803022ae63c25a8fce1f3fab08856a4da318685a52
            • Instruction Fuzzy Hash: A241DFB4D003589FDF14CFA9D985BADBBF1BB09314F209129E819AB350D7B49885CF45
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: ~/N$~/N
            • API String ID: 0-150141707
            • Opcode ID: 7502f50242bd408eb6afed3392d6fc264ee2970322f323c10ca73484fac168ea
            • Instruction ID: 58df5da73439305fe363a7d0aec94a33b5735263b3afccab1a20a537b909a578
            • Opcode Fuzzy Hash: 7502f50242bd408eb6afed3392d6fc264ee2970322f323c10ca73484fac168ea
            • Instruction Fuzzy Hash: C941DDB4D002589FDF10CFA9D985BAEBBF1BB0A314F209129E819AB350D7B49885CF45
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID: TJpq
            • API String ID: 0-270235555
            • Opcode ID: de3a31d00d70357477b2e26b5e71fd4b907da3e8ba8f9535c58b50acc98a19fc
            • Instruction ID: 66f1d34ebef614d61791f9117a2d1ab37474b2f627e731cc2c24791aa859ce7c
            • Opcode Fuzzy Hash: de3a31d00d70357477b2e26b5e71fd4b907da3e8ba8f9535c58b50acc98a19fc
            • Instruction Fuzzy Hash: E6710578E041298FDF04CEA9C8406AEB7B6FF89300F509A6AD81AEB354D7749D42CF40
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9dd29e6697b9c2d1c7e3e9866bc49cda36832d71f55a7f250fab2f93de4084a2
            • Instruction ID: 9eaf3129d8e61dae19110c34467abd3e2b7003e8a650486c13725447adfcb208
            • Opcode Fuzzy Hash: 9dd29e6697b9c2d1c7e3e9866bc49cda36832d71f55a7f250fab2f93de4084a2
            • Instruction Fuzzy Hash: 88C155B0902214CFFB04DF6AD148A9EFFB6EB04305F15E068E4045F6A6DBB9A895CF54
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 94aab690e4481f110012eca6f834c074e2fd9008d90066126c4353574c97ae12
            • Instruction ID: 94ad3863155d7f7d2d27f6ebeabb4cb8359b09490102f5e240fb5501176d7d7e
            • Opcode Fuzzy Hash: 94aab690e4481f110012eca6f834c074e2fd9008d90066126c4353574c97ae12
            • Instruction Fuzzy Hash: ECB1F370D04129DBDB04CF9AD494AEEFBF6BF88300F54D165E805AB345D7B4A886CBA4
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0bee6db3e0cb4b76e04db3665363a62205348645f09c37b01b0c63dfc51ae39b
            • Instruction ID: 0399550a8e3d22bcd9b8fba8a1c28d56972b807f2ed6176849795880aee62ec0
            • Opcode Fuzzy Hash: 0bee6db3e0cb4b76e04db3665363a62205348645f09c37b01b0c63dfc51ae39b
            • Instruction Fuzzy Hash: B5B1F270D04229DBDB04CF9AD494AEEBBF6BF88304F54D115E805AB345D7B4A886CBA4
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6b4b96218c4a0cb4b128b6f2f9bee2335d993f6a6478804665ddde1147100b9d
            • Instruction ID: 7b5cd5df825c91c42a5780c6602d90c42e432f063a92ab4884ca700bc6e5862b
            • Opcode Fuzzy Hash: 6b4b96218c4a0cb4b128b6f2f9bee2335d993f6a6478804665ddde1147100b9d
            • Instruction Fuzzy Hash: BAA1CF70D04219DFDB04DF99C480AEEBBF6BF89304F149115D809AB355E7B0AA86CBA0
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3ba50953b5ebdef57bb7317de9b611a7a8e8eeb502b8c10d58a65b9b0b6b5eee
            • Instruction ID: b195c31d0efd350f3a81800416127adaab435a491e9fc11ec612367182557f19
            • Opcode Fuzzy Hash: 3ba50953b5ebdef57bb7317de9b611a7a8e8eeb502b8c10d58a65b9b0b6b5eee
            • Instruction Fuzzy Hash: 3B81E2B0D05269CBDF04CFA9C4906EDBBF6FB89300F10956AD815A7305D7B49946CF90
            Memory Dump Source
            • Source File: 00000000.00000002.1690661710.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2d50000_H3h3mgJtVI.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 13f500ec1e5c65e24a277a4aca239370f6878e4dd6433f00c32828a0645a3696
            • Instruction ID: d9607134ead49df5cab0f170be37ec4c7b04a78fa93b3421ded8b2d528867307
            • Opcode Fuzzy Hash: 13f500ec1e5c65e24a277a4aca239370f6878e4dd6433f00c32828a0645a3696
            • Instruction Fuzzy Hash: 0361EFB0D05219CBDF04CFAAC4906EEBBB6EB88300F24D46AD815A7305D7B4A956CF94